Upload
revathi-ravi
View
13
Download
0
Tags:
Embed Size (px)
Citation preview
Diffusion of Mobile Commerce Application in the Market
ABSTRACT
The rapid growth of mobile applications has given rise to a new term—
mobile commerce, or m-commerce. Due to the fact that m-commerce is still at its
initial stage, there is no unified definition of it. Any transaction or economic values
managed through at least one kind of mobile terminal equipment on the mobile
telecommunication network are considered a part of mobile commerce. In general
mobile commerce is defined as the application of wireless communications
networks and devices to the execution of transactions with monetary value either
direct or indirect.
Mobile applications have become especially valued in an age where time is
precious and the weight attached to convenience is high. Also, the rapid
proliferation of wireless devices, including mobile phones, personal digital
assistants (PDAs), and other handheld devices, has made mobile commerce a
major driving force for the next wave of electronic commerce. In addition, mobile
commerce is expected to have an even greater impact on organizations, as wireless
technologies and application begin to challenge the existing process, strategies,
structures, roles of individuals, and even cultures of organizations.
Many scholars and analysts have asserted that there is a huge market
potential for mobile commerce applications. It is becoming one of the major topics
of interest for the IS research community and a key priority for many business
organizations. The eyes of scholars and industry representatives are now on the
Diffusion of Mobile Commerce Application in the Market
opportunities offered by wireless media, envisaging that the next –or the real phase
of e-business growth will be in the area of mobile commerce.
Nowadays, our world is characterized by the development of communication
technologies. World of information is a reality through the evolution of the Internet
and people can have access to a vast amount of data by just clicking on their
personal computer. Moreover, as the standard of living becomes higher, people
want efficient and effective access of information anytime and anywhere. Mobile
phones and other mobile devices contribute to the effective and efficient access to
information. People can call a call center and get informed about what they want.
However, handling routine phone requests can consume a substantial amount of
staff time and money. For this reason many companies have replaced live operators
with an automated system which is based on IVR (interactive voice response)
technology. More advanced IVR systems allow callers to retrieve customized
information. A system with text-to-speech recognition can read aloud information
that is stored in a database. Banks and credit card companies use IVR systems as
well, so that their customers can receive up-to-date account information instantly
and easily without having to speak directly to a person. IVR technology is also
used to gather information, as in the case of telephone surveys in which the user is
prompted to answer questions by pushing the numbers on a touch-tone telephone.
VoiceXML is a substantial element for the implementation of IVR systems. The
typical VoiceXML browser runs on a specialized voice gateway node that is
connected both to the public switched telephone network and to the Internet. These
voice gateways extend the power of the web to the world’s 1,300,000,000 phones.
Diffusion of Mobile Commerce Application in the Market
Here a web based application, in particular a dynamic voice portal which
allows users to access dynamic cultural content that is stored in a database. This
application is based on IVR systems and is designed with VoiceXML and JSP.
Diffusion of Mobile Commerce Application in the Market
CONTENTS
1. Introduction
2. Literature Survey
2.1. Classification of Mobile Commerce Application
2.2. Diffusion of Mobile Commerce Application
3. Project Description
3.1. Job Hunting
3.2. Mobile Voting
3.3. Programming Modules
4. System Specification
4.1. Hardware Specification
4.2. Software Specification
5. Architecture
5.1. Architecture for Job Hunting
5.2. Architecture for Mobile Voting
6. Code
6.1 .Job Hunting
6.2 .Mobile Voting
7. Implementation
Diffusion of Mobile Commerce Application in the Market
7.1. Implementation of job hunting
7.2. Data flow diagram for job hunting
7.3. Use case diagram for job hunting
7.4. Implementation of mobile job hunting
7.5. Mobile voting speech process
7.6. Data flow diagram for vote casting
7.7. Use case diagram for voter login
8. Testing
8.1. Testing for mobile system
9. Snapshot
9.1. Snapshot for job hunting
9.2. Snapshot of mobile voting
10. Performance analysis
10.1. Building the house of quality model mobile commerce to improve performance
10.2. performance analysis of mobile voting
11. Future Enhancement
11.1. Wireless use equipment and system
11.2 .radio frequency Identification
11.3. Location determination
11.4. Software defined radio
11.5. Adaptive modulation and coding
11.6. Digital signal compression
Diffusion of Mobile Commerce Application in the Market
11.7. Biometrics
12. Conclusion
13. Bibliography
Diffusion of Mobile Commerce Application in the Market
CHAPTER 1
INTRODUCTION
The rapid growth of mobile applications has given rise to a new term—mobile
commerce, or m-commerce. Due to the fact that m-commerce is still at its initial
stage, there is no unified definition of it. Any transaction or economic values
managed through at least one kind of mobile terminal equipment on the mobile
telecommunication network are considered a part of mobile commerce. In
general mobile commerce is defined as the application of wireless
communications networks and devices to the execution of transactions with
monetary value either direct or indirect.
Mobile applications have become especially valued in an age where time is
precious and the weight attached to convenience is high. Also, the rapid
proliferation of wireless devices, including mobile phones, personal digital
assistants (PDAs), and other handheld devices, has made mobile commerce a
major driving force for the next wave of electronic commerce. In addition, mobile
commerce is expected to have an even greater impact on organizations, as
wireless technologies and application begin to challenge the existing process,
strategies, structures, roles of individuals, and even cultures of organizations.
Many scholars and analysts have asserted that there is a huge market
potential for mobile commerce applications. It is becoming one of the major
topics of interest for the IS research community and a key priority for many
Diffusion of Mobile Commerce Application in the Market
business organizations. The eyes of scholars and industry representatives are now
on the opportunities offered by wireless media, envisaging that the next –or the
real phase of e-business growth will be in the area of mobile commerce.
Nowadays, our world is characterized by the development of
communication technologies. World of information is a reality through the
evolution of the Internet and people can have access to a vast amount of data by
just clicking on their personal computer. Moreover, as the standard of living
becomes higher, people want efficient and effective access of information
anytime and anywhere. Mobile phones and other mobile devices contribute to
the effective and efficient access to information. People can call a call center and
get informed about what they want. However, handling routine phone requests
can consume a substantial amount of staff time and money. For this reason many
companies have replaced live operators with an automated system which is based
on IVR (interactive voice response) technology. More advanced IVR systems allow
callers to retrieve customized information. A system with text-to-speech
recognition can read aloud information that is stored in a database. Banks and
credit card companies use IVR systems as well, so that their customers can
receive up-to-date account information instantly and easily without having to
speak directly to a person. IVR technology is also used to gather information, as in
the case of telephone surveys in which the user is prompted to answer questions
by pushing the numbers on a touch-tone telephone. VoiceXML is a substantial
element for the implementation of IVR systems. The typical VoiceXML browser
runs on a specialized voice gateway node that is connected both to the public
Diffusion of Mobile Commerce Application in the Market
switched telephone network and to the Internet. These voice gateways extend
the power of the web to the world’s 1,300,000,000 phones.
Here a web based application, in particular a dynamic voice portal which
allows users to access dynamic cultural content that is stored in a database. This
application is based on IVR systems and is designed with VoiceXML and JSP.
Diffusion of Mobile Commerce Application in the Market
CHAPTER 2
LITERATURE SURVEY
Several applications based on VoiceXML have been developed in following
different approaches. Many companies have invested in this technology. We
present some of them. One popular company which is one of the prevalent
companies in the world and is based on IVR systems is Nuance. Nuance is one of
many providers of speech and imaging solutions for businesses and consumers
around the world. Nuance 8.5 supports voice automation services that are built
using VoiceXML 2, the open, standards-based voice application programming
language. With the VoiceXML 2.0 standard and Nuance 8.5 speech recognition
software, carriers and enterprises can leverage their existing expertise and
investments in Web infrastructure to reduce the cost and effort of deploying
voice-driven services. Hearsay is a non-visual Web browser developed at Stony
Brook University in collaboration with the Helen Keller Services for the Blind in
Hempstead, NY. hearsay features a flexible dialog interface and innovative
context-directed browsing not used by any existing screen - readers. HearSay
helps visually impaired and blind users browse the Web more efficiently and
quickly by identifying relevant information on Web pages. The technology
underlying hearsay brings together the fields of content analysis, natural language
processing, and machine learning.
In the past, voice-enabled applications were based upon prerecorded
audio. New information models and speech synthesis tools have boosted the
development of voice enabled applications. The text-to-speech synthesis feature
Diffusion of Mobile Commerce Application in the Market
of advanced VoiceXML tools has opened new perspectives in the fields of e-
commerce and e-learning too. We are no longer restricted to prerecorded audio
but can bring any text to the ear of the user - a user that could be visually
impaired and needs a voice channel to communicate - or a user who can read but
who prefers to listen. Voice-enabled applications can support e-learning in many
ways. They can open e-learning systems to visually impaired users.
A bank can let its customers access their account balances, obtain
information on interest rates and mortgages, calculate loan payments, or transfer
funds, all using voice response applications. Using a voice response application,
brokerage firms can make current stock prices, quotations, and portfolio balances
available over the telephone. Clients can perform complex transactions without
the intervention of a broker. The design of the Voice XML dialogues which enable
the interaction is informed by the experience of workers on the Age Resource
Desk at Age concern Oxford shire and comments from their clients who
experimented with a VoiceXML system. A synthesis of work was carried out by
tutors at Age Concern Oxford shire and research work from the Speech Project at
Oxford Brookes University. It describes the Voice Access Booking System (VABS)
which enables clients at Age Concern Oxford shire to organize their IT taster
session by booking, cancelling or rearranging them using a speech dialogue over
the telephone from their own homes.
2.1 CLASSIFICATION OF MOBILE COMMERCE APPLICATION
There are potentially an unlimited number of mobile commerce applications,
which leads to a demand for classification, since currently, it is almost impossible
Diffusion of Mobile Commerce Application in the Market
to cover the whole range of potential mobile commerce application. To help
understand mobile commerce, we reviewed the classification of mobile
commerce application. It will allow developers and providers to strategize and
effectively design and implement mobile commerce applications.
In general, mobile commerce applications have two major attributes:
mobility and reachability. According these attributes, mobile commerce
application can be classified into the following six categories: Time critical services
(e.g. SMS-based notifications or alerts);
Location-aware and location-sensitive service (e.g. mobile advertising, product
location tracking); Identity enacted service (e.g. mobile bank, mobile
micropayments); Ubiquitous communications and content delivery services (e.g.
video-on-demand, interactive game); Business process streamlining; Mobile
office. Senn classified mobile commerce applications into three main categories:
transaction management (e.g. payment, shopping), digital content delivery (e.g. E-
mail, short messages) and telemetry services (e.g. status monitoring, smart
messaging). Varshney and Vetter developed a more detailed class of mobile
commerce applications roughly categorized by mobile commerce models based
on mobile characteristics. The applications are classified into 11 categories,
including mobile financial applications, mobile advertising, mobile inventory
management, locating and shopping for products, proactive service management,
wireless re-engineering, mobile auctions or reverse auctions, mobile
entertainment services and games, mobile offices, mobile distance education, and
wireless data centers .Yuan and Zhang argue that value propositions in mobile
commerce which define the relationship between seller offerings and buyer
Diffusion of Mobile Commerce Application in the Market
purchases by identifying how the seller achieves the buyer’s needs originate from
mobility and location awareness and are contrary to Internet-based ecommerce.
Therefore, they group various mobile commerce applications based on these
value propositions into six categories (Ubiquitous communication, Emergency and
time critical information services, Location-sensitive service, Pocket e-wallet,
portable entertainment, Improving productivity of mobile workforce).
From the perspective of marketing, Nysveen, Pedersen, and Thorbjornsen
propose a grid of mobile Internet service classification that employs four primary
axes: person-interactive versus machine interactive, and goal-oriented versus
experiential service. “Person interactivity” occurs between people through a
medium, while “machine interactivity” refers to the interaction between people
and the medium. In the latter, users can freely modify the content and form of a
mediated environment. A goal-oriented process is defined by utilitarian benefits,
while an experiential process provides hedonic benefits. From the perspective of
market, we could perceive the diffusion trend of mobile commerce application in
market, from communication service, information service to transaction service
and interaction service. In this paper, we incorporated the diffusion of mobile
commerce application with perspective of marketing as a new analytic framework
(Figure 2.1).
Diffusion of Mobile Commerce Application in the Market
Fig 2.1: Diffusion of m-commerce application in market
2.2 DIFFUSION OF MOBILE COMMERCE APPLICATION
To promote mobile commerce, there should be less focus on increasing the
speeds of wireless data networks now and more on developing compelling
applications. With an increasingly mobile society, more and more people are one
the move. Many interesting services can be offered to these people through
mobile device and wireless networks. This includes mobile communication
service, mobile information service, mobile transaction service, and mobile
interaction service.
2.2.1 Mobile Communication Services
Mobile communications facilitate personal contact anytime, anywhere. While
voice and short messages are currently the primary form of mobile
communication, future mobile devices such as 3G phones are capable of handling
much more information and providing broader bandwidth. As a result, ubiquitous
communications can become an important application in m-commerce.
Diffusion of Mobile Commerce Application in the Market
Some researchers seem to agree that e-mail services will become an initial
killer wireless application for mobile commerce. Gordon Xu.et.al carried out a
Delphi survey and the result indicated that short message service (SMS) was most
likely killer application of m-commerce. They also identified four features of SMS
and the critical success factors in m-commerce.
2.2.2 Mobile Information Services
Since people have different information needs and preferences, one of the
challenges for mobile information systems is to take advantage of the
convenience of handheld devices and provide personalized information to the
right person in a preferred format. Dongsong Zhang proposed a generic
framework for delivering personalized and adaptive content to mobile users. It
introduced a variety of enabling technologies and highlights important
issues in this area.
Finding the geographic location of a person is commercially valuable
because, in a mobile society, people and goods are in motion, and tend to
become lost in this mobile environment. If a service could help pinpoint the
location of a mobile device to the degree of precision appropriate for different
applications, significant value could be added.
Location–based services (LBS) are services that generate commercial
activity by using geographic location (i.e., place-related) information of the mobile
Diffusion of Mobile Commerce Application in the Market
devices, along with information about services and products available in (certain
degree of) physical proximity. LBS include locate-info service, mobile advertising,
product location tracking service, locate-a friend service, mobile inventory
management, and patient monitoring service. These services generated great
interest among researchers and developers, primarily due to the presumed
potential for: (1) user empowerment, (2) the estimated market for location based
advertising, (3) and the ability to handle many emergency situations(e.g., airline
flight schedule changes, stock price alerts and quotations, home burglar alarms).
Varshney presented integrated location management architecture to
support the diverse location requirements of m-commerce applications. The
proposed architecture is capable of supporting a range of location accuracies,
wider network coverage, wireless multicast, and infrastructure dependability for
m-commerce applications. Varshney (2005) also identified and discussed several
vehicular mobile commerce applications as well as wireless and networking
challenges. He presented possible solutions for vehicular mobile commerce and
defined several research problems that should be undertaken.
Mobile adverting can also be a very important part of mobile commerce
applications. Using demographic information collected by wireless service
providers and the information on the current location of mobile users, much
targeted advertising can be done. The advertisements sent to a user can also be
location sensitive to inform a user about various on-going specials (shops, malls,
and restaurants) in surrounding areas.
Diffusion of Mobile Commerce Application in the Market
2.2.3 Mobile Transaction Services
The power of mobile commerce is primarily due to the anytime-anywhere
connectivity of wireless devices, which provides enormous opportunities for
business process innovation. Mobile services can also be used to enhance the
efficiency of business processes and reduce transaction costs or improve service
quality.
Mobile financial applications are likely to be one of the most important
components of mobile commerce. These could involve a variety of applications
such as mobile banking and brokerage service, mobile money transfer, and
mobile micro-payment. These services could turn a mobile device into a business
tool, replacing bank, ATM, and credit cards by mobile money. Certainly more
work is needed in providing transaction support in the applications and network
infrastructure. Secure transactions are required before any of these applications
are widely deployed.
Herzberg believed the use of secure and convenient mobile personal
devices could revolutionize the payment, banking, and investment industries
worldwide. He also discussed some of the challenges and opportunities involved
in their use for making secure payments and authorizing banking transactions.
Clayton.et.al presented a classification scheme of m-commerce, examined the
relative strengths and weaknesses of the models, and discussed developing
trends and their implications for mobile commerce in the brokerage industry.
Niina.et.al investigated some mobile financial applications, including both mobile
payments and banking services, showing how the new financial services can be
Diffusion of Mobile Commerce Application in the Market
deployed in mobile networks and identifying the main players in the mobile
financing value chain. They used examples from the European context to highlight
the features of the new services as they explored the players’ particular strengths
and weaknesses in providing the services.
2.2.4 Mobile Interaction Services
Entertainment is an important interactive service that mobile commerce could
provide. It includes mobile games, mobile music, video-on-demand and other
services. The convergence of entertainment, Internet and telecommunication
industries has taken steps towards creating completely new ways to spend time,
so mobile games are revolutionizing entertainment. Mobile games are interactive
in nature and it allows players to experience virtual worlds far more exciting than
everyday life. In Japan the downloadable wireless entertainment is become
extremely popular. It has changed the way people wait for transportation or just
kill time. This development has begun also in western world and China.
Kleijnen.et.al published an interesting study of mobile gaming adoption in
the Netherlands. They applied a series of sophisticated multivariate analyses to
examine mobile gamers’ profiles. Pavlos and Adam investigated customers’
preferences and attitudes towards mobile music services in Europe through an
exploratory research approach. Their findings suggested mobile music providers
should design tailored marketing mix programs towards sufficiently meeting the
needs of customers in the emerging mobile music industry.
Diffusion of Mobile Commerce Application in the Market
Diffusion of Mobile Commerce Application in the Market
CHAPTER 3
PROJECT DESCRIPTION
Our project’s ideal goal is to enable the mobile phone to Vote and hunt for a job
Mobile communication systems of today provide increased availability,
miniaturization and enhanced data rates. This emergence is expected to enhance
the deployment of mobile systems in many services.
3.1 JOB HUNTING
In India all earlier job Hunt the employer and the jobseeker need to depend fully
on the website and text based information display is there. In this voice based job
hunt the job seekers can easily get the information through the landline or mobile
with the help of IVRS based system through voice xml.
3.1.1 Existing System
Job Hunter can get the job information only if they have internet connection or
only through newspaper and its fully text based information system.
3.1.2 Drawbacks of Existing System
If internet is not available say some remote area the job hunters won’t get
the correct information at correct time. So there is a major chance of losing
their interviews.
The job hunter cannot always read all the papers which and displaying all
job related rules.
Diffusion of Mobile Commerce Application in the Market
There are lot web site and newspapers are available so they cannot predict
in which paper or in which website they may get the correct information.
3.1.3 Proposed System
Our system is purely based on voice and it can be transmitted to both mobile and
landline phones. Existing systems were mainly based on text but in the proposed
system the main aim is to deliver the service through speech.
3.1.4 Features of the Proposed System
Nowadays Telecommunication is the basic for all people.
Delivering a job hunt based on IVRS through telecommunication will easily
reach the jobseeker.
3.1.5 Advantages of the Proposed System
The jobseeker can easily get the information only if they have a mobile or
landline.
This increases the number of candidates attending interview so it will be
helpful for the company to get the right candidate.
3.2 MOBILE VOTING
In this Project, Mobile technology-IVR is used for election polling.
3.2.1 Existing System
Voting is done in voting stations where voters cast their votes using electronic
Diffusion of Mobile Commerce Application in the Market
voting device.
3.2.2 Drawbacks of Existing System
Voting station might be far and the voters cannot go there.
Voters will have to stand in long queues to cast their votes.
3.2.3 Proposed System
A Person needs to call a Number authorized by the Election Committee. First the
person will be evaluated asking for the biometric election card number. An
algorithm is implemented for security reasons. Once the person is authorized, he
can continue with the polling process. After that, IVR will play the various parties
contesting in elections. Based on the User inputs, polling will be recorded. User
inputs can either be DTMF or Speech Recognition.
3.2.4 Features of Proposed System
If voters want to vote through Mobile, they have to be registered in
Election Commission or they can register online provided they must have a
unique identification number like pan card number, license number etc.
This means that the voters have already registered their real names and
addresses by presenting their eligible credentials at the time of
subscription.
The mobile users have to dial a designated phone number and follow the
instructions using a password already provided.
Privacy: All votes remain secret while voting takes place and each individual
3.2.5 Advantages of Proposed System
Mobile Voting can be used in cases where it is physically impossible for the
Diffusion of Mobile Commerce Application in the Market
voter to travel to the polling station to vote.
Mobile Voting for persons who are physically disabled or who cannot
come to the polling station for other valid reasons.
1. Blind peoples.
2. Handicapped peoples.
To achieve democracy, Voters need to be properly registered and
authenticated, and then there should be a convenient way for them to cast
their votes, for example, availability of different language choices, special
aid for disabled voters, and proper ways for absentee voting and early
voting.
Voters can also choose not to vote.
3.3 PROGRAM MODULES
3.3.1 Sip Phone
Sip phone is an emulator with the help of which user can call IVRS. Here there is
more than one line. So based on their application which they want to contact, the
customer can call that particular line. In this, emulator is used to receive the user
input in the format of DTMF or Speech and it also delivers the output to the user
in the form of speech.
3.3.2 Call Routing
You may have one or many inbound telephone numbers. Set up a call route to
specify which application to play when a call is placed to a specific telephone
number or DID. You can also define a default application to play when an
Diffusion of Mobile Commerce Application in the Market
unassigned number is dialed. Here in our application we have set the routing by
giving our default local server URL.
3.3.3 Voice Browser
Voice Browser is a web Browser in which the voice xml (VXML) is embedded in
Java Server Pages(JSP) and its is ready to get the user input in the format of
DTMF or Speech mode and it analyze the user input and based on that it will
deliver the output in the format of voice.
Diffusion of Mobile Commerce Application in the Market
CHAPTER 4
SYSTEM SPECIFICATION
4.1 HARDWARE SPECIFICATION
Processor : Pentium IV
Processor Speed : 1.8 GHz
Hard Disk Capacity : 40 GB
Clock Speed : 650 MHz
RAM Capacity : 1GB
4.2 SOFTWARE SPECIFICATION
Operating System : Windows XP
Front End : JSP, VXML, SIP Phone Emulator
Back End : MYSQL SERVER
Diffusion of Mobile Commerce Application in the Market
CHAPTER 5
ARCHITECTURE
5.1 ARCHITECTURE FOR JOB HUNT
The Architecture for job hunt is as per the figure 5.1 shown below.
The customer can call IVRS using a mobile or a Landline phone which
connects to the host IVRS server with the help of PSTN (public switched telephone
network). In the server there will be an option to route more than one call with
the call Router. This helps to run more than one IVRS application simultaneously
in time sharing basis.
Diffusion of Mobile Commerce Application in the Market
Fig 5.1: Architecture for Job Hunt
In the IVRS server, our server program containing jsp and voice xml will be
embedded and it is useful for getting the input from the user as well as delivering
output to the user through sip phone emulator. Our server application will
contact the particular database and it will get all the resources and deliver to the
end user in the form of voice.
5.1.1 Interactive Voice Response System (IVRS)
IVRS is a technology that allows a computer to detect voice and Dual Tone Multi
Frequency signaling (DTMF) keypad inputs. IVR technology is used extensively in
telecommunication, but is also being introduced into automobile systems for
hands-free operation. Current deployment in automobiles revolves around
satellite navigation, audio and mobile phone systems. In telecommunications, IVR
allows customers to access a company’s database via a telephone keypad or by
Diffusion of Mobile Commerce Application in the Market
speech recognition, after which they can service their own inquiries by following
the instructions.
IVR systems can respond with pre-recorded or dynamically generated audio
to further direct users on how to proceed. IVR systems can be used to control
almost any function where the interface can be broken down into a series of
simple menu choices. In telecommunications applications, such as customer
support lines, IVR systems generally scale well to handle large call volumes.
5.1.2 Public Switched Telephone Network (PSTN)
The PSTN is the network of the world's public circuit switched telephone
networks. Originally a network of fixed-line analog telephone systems, the PSTN is
now almost entirely digital in its PSTN operators.
Regulation of the PSTN
In most countries, the government has a dedicated to monitoring the provision of
PSTN services in that country. Their tasks may be for example to ensure that end
customers are not over-charged for services where monopolies may exist. They
may also regulate the prices charged between the operators to carry each other’s
traffic.
Technology in the PSTN
Network Topology
The PSTN network architecture had to evolve over the years to support increasing
numbers of subscribers, calls, connections to other countries, direct dialing and so
on. The model developed by the US and Canada was adopted by other nations,
with adaptations for local markets.
Diffusion of Mobile Commerce Application in the Market
The original concept was that the telephone exchanges are arranged into
hierarchies, so that if a call cannot be handled in a local cluster, it is passed to one
higher up for onward routing. This reduced the number of connecting trunks
required between operators over long distances and also kept local traffic
separate.
However, in modern networks the cost of transmission and equipment is
lower and, although hierarchies still exist, they are much flatter, with perhaps
only two layers.
Digital channels
Most automated telephone exchanges now use digital switching rather than
mechanical or analog switching. The trunks connecting the exchanges are also
digital, called circuits or channels. However analog two-wire circuits are still used
to connect the last mile from the exchange to the telephone in the home (also
called the local loop). To carry a typical phone call from a calling party to a called
party, the analog audio signal is digitized at an 8 kHz sample rate using 8-bit pulse
code modulation (PCM). The call is then transmitted from one end to another via
telephone exchanges. The call is switched using a call set up protocol (usually
ISUP) between the telephone exchanges under an overall routing strategy.
The call is carried over the PSTN using a 64 Kbit/s channel, originally
designed by Bell Labs. The name given to this channel is Digital Signal 0 (DS0). The
DS0 circuit is the basic granularity of circuit switching in a telephone exchange. A
DS0 is also known as a timeslot because DS0s are aggregated in time-division
multiplexing (TDM) equipment to form higher capacity communication links. A
Digital Signal 1 (DS1) circuit carries 24 DS0s on a North American or Japanese T-
Diffusion of Mobile Commerce Application in the Market
carrier (T1) line, or 32 DS0s (30 for calls plus two for framing and signaling) on an
E-carrier (E1) line used in most other countries. In modern networks, the
multiplexing function is moved as close to the end user as possible, usually into
cabinets at the roadside in residential areas, or into large business premises.
These aggregated circuits are conveyed from the initial multiplexer to the
exchange over a set of equipment collectively known as the access network. The
access network and inter-exchange transport use synchronous optical
transmission, for example, SONET and Synchronous Digital Hierarchy (SDH)
technologies, although some parts still use the older PDH technology. Within the
access network, there are a number of reference points defined. Most of these
are of interest mainly to ISDN but one – the V reference point – is of more general
interest. This is the reference point between a primary multiplexer and an
exchange. The protocols at this reference point were standardized in ETSI areas as
the V5 interface core and includes mobile as well as fixed telephones.
5.1.3 Dual Tone Multi Frequency Signals (DTMF)
DTMF signals (entered via the telephone keypad) and natural language speech
recognition interpret the caller's response to voice prompts. Other technologies
include the ability to speak complex and dynamic information, such as an e-mail,
news report or weather information using Text-To-Speech (TTS). TTS is computer
generated synthesized speech that is no longer the robotic voice generally
associated with computers. Real voices create the speech in fragments
(phonemes) that are spliced together (concatenated) before being played to the
caller.
An IVR can be utilized in several different ways:
Diffusion of Mobile Commerce Application in the Market
1. Equipment installed on the customer premise
2. Equipment installed in the PSTN (Public Switched Telephone Network)
3. Application service provider (ASP).
4. Hosted IVR
A simple voice mail system is different from IVR in that it is person-to-
person, whereas an IVR is person to computer. IVR voice forms can be used to
provide a more complex voice mail experience to the caller. For example, the IVR
could ask if the caller wishes to hear, edit, forward or remove a message that was
just recorded.
An automatic call distributor (ACD) is often the first point of contact when
calling many larger businesses. An ACD uses digital storage devices to play
greetings or announcements, but typically routes a caller without prompting for
input. An IVR can play announcements and request an input from the caller. This
information can be used to profile the caller and route the call to an agent with a
particular skill set. (A skill set is a function applied to a group of call-center agents
with a particular skill.)
Interactive voice response can be used to front-end a call center operation
by identifying the needs of the caller. Information can be obtained from the caller
such as account numbers. Answers to simple questions such as account balances
or pre-recorded information can be provided without operator intervention.
Account numbers from the IVR are often compared to caller ID data for security
reasons and additional IVR responses are required if the caller ID data do not
match the account record.
Diffusion of Mobile Commerce Application in the Market
IVR call flows are created in a variety of ways. A traditional IVR depended
upon proprietary programming or scripting languages, whereas modern IVR
applications are structured similar to Web pages, using VoiceXML, CCXML, SRGS,
SALT or T-XML languages. The ability to use XML developed applications allows a
Web server to act as an application server, freeing the developer to focus on the
call flow. It was widely believed that developers would no longer require
specialized programming skills; however this has been proven to be misguided as
IVR applications need to understand the human reaction to the application dialog.
This is the difference between a good user experience and IVR hell. Higher level
IVR development tools are available in recent years to further simplify the
application development process. A call flow diagram can be drawn with a GUI
tool and the application code (VoiceXML or SALT) can be automatically generated.
In addition, these tools normally provide extension mechanisms for software
integration, such as HTTP interface to Web site and Java interface for connecting
to a database.
In telecommunications, an audio response unit (ARU) is a device that
provides synthesized voice responses to DTMF key presses by processing calls
based on (a) the call-originator input, (b) information received from a database,
and (c) information in the incoming call, such as the time of day. ARUs increase
the number of information calls handled and to provide consistent quality in
information retrieval.
5.1.4 VoIP
Diffusion of Mobile Commerce Application in the Market
The increased usage of VoIP in voice networks is likely to affect how IVR will be
used in voice networks, this is due to the introduction of protocols such as Session
Initiation Protocol (SIP). The introduction of SIP means that point to point
communications is no longer restricted to voice calls but can now be extended to
multimedia technologies such as video. This will bring a new meaning to
automated services as IVR extends its reach to video calls. Many IVR
manufacturers are currently working on IVVR (Interactive Voice and Video
Response) systems, especially for the mobile phone networks.
The use of video will give IVR systems the ability to use graphical and video
information to assist the caller. The introduction of video IVR may allow systems
in the future the ability to read emotions and facial expressions. It may be used to
identify the caller, using technology such as Iris scan or other biometric means.
Recordings of the caller may be stored to monitor certain transactions, and may
be used to reduce identity fraud.
Unified communications in the SIP contact center
With the introduction of SIP contact centers, automation has finally come of age.
Calls arriving at a SIP contact center must now be queued against a SIP IVR
system. Call control in a SIP contact center is controlled by VXML scripting which
is an extension of the language used to write modern IVR Applications. As calls
are queued in the SIP contact center, the IVR system can provide treatment,
automation, wait for a fixed period, or play music. Inbound calls to a SIP contact
center must be queued or terminated against a SIP end point. In addition SIP IVR
Diffusion of Mobile Commerce Application in the Market
systems can be used to replace agents directly by the use of BBUA (Back to Back
User Agents).
Interactive Messaging Response (IMR)
As communications have migrated to multimedia so has Automation. The
introduction of Instant Messaging (IM) in Contact Centers is starting to take off.
Agents can handle up to 6 different IM conversations at the same time and so
agent productivity is increasing. IVR systems are now starting to handle IM
conversations using existing Speech Recognition Technology. This is different from
email handling as email automated response is based on key word spotting. IM
conversations are different to email as IM is conversational. The use of text
messaging abbreviations and simile’s requires different grammars than those
currently used for speech recognition. IM is also starting to replace text
messaging on Multimedia Mobile handsets and is expected to become more
widely used.
5.1.5 Virtual Private Network (VPN)
VPN is a computer network that is layered on top of an underlying computer
network. The private nature of a VPN means that the data travelling over the VPN
is not generally visible to, or is encapsulated from, the underlying network traffic.
Similarly, the traffic within the VPN appears to the underlying network as just
another traffic stream to be passed. A VPN connection can be envisioned as a
"pipe within a pipe", with the outer pipe being the underlying network
connection.
Diffusion of Mobile Commerce Application in the Market
The term VPN can be used to describe many different network
configurations and protocols. As such, it can become complex when trying to
generalize about the characteristics of a VPN. Some of the more common uses of
VPNs are described below, along with more detail about the various classification
schemes and VPN models.
Fig 5.2: Virtual Private Network
Mobile VPNs handle the special circumstances when an endpoint of the
VPN is not fixed to a single IP address, but instead roams across various networks
such as data networks from cellular carriers or between multiple Wi-Fi access
points. Mobile VPNs have been widely used in public safety, where they give law
enforcement officers access to mission-critical applications, such as computer-
assisted dispatch and criminal databases, as they travel between different
subnets of a mobile network. They are also used in field service management and
by healthcare organizations, among other industries.
Increasingly, mobile VPNs are being adopted by mobile professionals and
white-collar workers who need reliable connections. They allow users to roam
seamlessly across networks and in and out of wireless-coverage areas without
Diffusion of Mobile Commerce Application in the Market
losing application sessions or dropping the secure VPN session. A conventional
VPN cannot survive such events because the network tunnel is disrupted, causing
applications to disconnect, time out, or fail, or even cause the computing device
itself to crash.
Instead of logically tying the endpoint of the network tunnel to the physical
IP address, each tunnel is bound to a permanently associated IP address at the
device. The mobile VPN software handles the necessary network authentication
and maintains the network sessions in a manner transparent to the application
and the user. The Host Identity Protocol (HIP), under study by the Internet
Engineering Task Force, is designed to support mobility of hosts by separating the
role of IP addresses for host identification from their locator functionality in an IP
network. With HIP a mobile host maintains its logical connections established via
the host identity identifier while associating with different IP addresses when
roaming between access networks.
5.1.6 Hypertext Transfer Protocol (HTTP)
HTTP is an Application Layer protocol for distributed, collaborative, hypermedia
information systems. HTTP is a request-response standard typical of client-server
computing. In HTTP, web browsers or spiders typically act as clients, while an
application running on the computer hosting the web site acts as a server. The
client, which submits HTTP requests, is also referred to as the user agent. The
responding server, which stores or creates resources such as HTML files and
images, may be called the origin server. In between the user agent and origin
server may be several intermediaries, such as proxies, gateways, and tunnels.
Diffusion of Mobile Commerce Application in the Market
HTTP is not constrained in principle to using TCP/IP, although this is its most
popular implementation platform. Indeed HTTP can be "implemented on top of
any other protocol on the Internet, or on other networks." HTTP only presumes a
reliable transport; any protocol that provides such guarantees can be used.
5.1.7 Transmission Control Protocol (TCP)
TCP is one of the core protocols of the Internet Protocol Suite. TCP is one of the
two original components of the suite (the other being Internet Protocol, or IP), so
the entire suite is commonly referred to as TCP/IP. Whereas IP handles lower-
level transmissions from computer to computer as a message makes its way
across the Internet, TCP operates at a higher level, concerned only with the two
end systems, for example a Web browser and a Web server. In particular, TCP
provides reliable, ordered delivery of a stream of bytes from a program on one
computer to another program on another computer. Besides the Web, other
common applications of TCP include e-mail and file transfer. Among its other
management tasks, TCP controls segment size, flow control, the rate at which
data is exchanged, and network traffic congestion.
TCP provides a communication service at an intermediate level between an
application program and the Internet Protocol (IP). That is, when an application
program desires to send a large chunk of data across the Internet using IP, instead
of breaking the data into IP-sized pieces and issuing a series of IP requests, the
software can issue a single request to TCP and let TCP handle the IP details.
Diffusion of Mobile Commerce Application in the Market
IP works by exchanging pieces of information called packets. A packet is a
sequence of bytes and consists of a header followed by a body. The header
describes the packet's destination and, optionally, the routers to use for
forwarding until it arrives at its final destination. The body contains the data
which IP is transmitting.
Due to network congestion, traffic load balancing, or other unpredictable
network behavior, IP packets can be lost, duplicated, or delivered out of order.
TCP detects these problems, requests retransmission of lost packets, rearranges
out-of-order packets, and even helps minimize network congestion to reduce the
occurrence of the other problems. Once the TCP receiver has finally reassembled
a perfect copy of the data originally transmitted, it passes that datagram to the
application program. Thus, TCP abstracts the application's communication from
the underlying networking details.
TCP is used extensively by many of the Internet's most popular applications,
including the World Wide Web (WWW), E-mail, File Transfer Protocol, Secure
Shell, peer-to-peer file sharing, and some streaming media applications.
TCP is optimized for accurate delivery rather than timely delivery, and
therefore, TCP sometimes incurs relatively long delays (in the order of seconds)
while waiting for out-of-order messages or retransmissions of lost messages. It is
not particularly suitable for real-time applications such as Voice over IP. For such
applications, protocols like the Real-time Transport Protocol (RTP) running over
the User Datagram Protocol (UDP) are usually recommended instead.
Diffusion of Mobile Commerce Application in the Market
TCP is a reliable stream delivery service that guarantees delivery of a data
stream sent from one host to another without duplication or losing data. Since
packet transfer is not reliable, a technique known as positive acknowledgment
with retransmission is used to guarantee reliability of packet transfers. This
fundamental technique requires the receiver to respond with an acknowledgment
message as it receives the data. The sender keeps a record of each packet it
sends, and waits for acknowledgment before sending the next packet. The sender
also keeps a timer from when the packet was sent, and retransmits a packet if the
timer expires. The timer is needed in case a packet gets lost or corrupted.
TCP consists of a set of rules: for the protocol, that are used with the
Internet Protocol, and for the IP, to send data "in a form of message units"
between computers over the Internet. At the same time that IP takes care of
handling the actual delivery of the data, TCP takes care of keeping track of the
individual units of data transmission, called segments that a message is divided
into for efficient routing through the network. For example, when an HTML file is
sent from a Web server, the TCP software layer of that server divides the
sequence of bytes of the file into segments and forwards them individually to the
IP software layer (Internet Layer).
The Internet Layer encapsulates each TCP segment into an IP packet by
adding a header which includes (among other data) the destination IP address.
Even though every packet has the same destination address, they can be routed
on different paths through the network. When the client program on the
destination computer receives them, the TCP layer (Transport Layer) reassembles
Diffusion of Mobile Commerce Application in the Market
the individual segments and ensures they are correctly ordered and error free as
it streams them to an application.
5.2 ARCHITECTURE FOR MOBILE VOTING
The Architecture for Mobile Voting is as shown in figure 5.3.
Fig.5.3: Architecture for Mobile Voting
5.2.1 Server Module Description
Voting Device (Mobile/Land Phone)
In our scheme, the voting device corresponds to the mobile equipment (ME),
which consists of a SIM card. The device needs to provide a platform to run the
Diffusion of Mobile Commerce Application in the Market
voting application, which consists of the candidate information, the key storage
and generation functions.
Authentication Centre (AC)
AC is an entity within the GSM network. AC generates the authentication
parameters and authenticates the mobile equipment. Apart from authenticating
the mobile equipment, AC is also an important information distribution server in
the proposed scheme. AC needs to be trusted to transfer the messages as
required.
Verification Server (VS)
VS belong to the voting authority, who organizes the voting event. It verifies the
legitimacy of the voter and issues a voting token to the voter. VS also publish a list
of voter information.
Collecting and Counting Server (CS)
CS is the server that collects and counts the votes to give the final result. CS’s
action need to be audited by all candidate parties.
Diffusion of Mobile Commerce Application in the Market
CHAPTER 6
CODE
6.1 JOB HUNT
DTMF Mode
//Main.jsp
<?xml version="1.0" encoding="UTF-8" ?>
<vxml version="2.0">
<nomatch>
No Match! I'm sorry, I didn't understand you. Could you please try that again?
<reprompt />
</nomatch>
<noinput>
No Input! I'm sorry, I didn't hear anything. Could you please try that again?
<reprompt />
</noinput>
<menu id="menu">
<property name="inputmodes" value="dtmf"/>
Diffusion of Mobile Commerce Application in the Market
<prompt bargein="false">Welcome to mobile. Job Hunting.
select the category of job. from the following options.
Please press the related number. to choose the job category.
</prompt>
<prompt>
<enumerate>
<value expr="_prompt"/> press <value expr="_dtmf"/>,
</enumerate>
</prompt>
<choice next="http://localhost:8080/jobHunt/jobCategory/ComputerIT.jsp" dtmf="1">
.Computers and I T.
</choice>
<choice next="http://localhost:8080/jobHunt/jobCategory/Medical.jsp" dtmf="2">
.Medical.
</choice>
<choice next="http://localhost:8080/jobHunt/jobCategory/Sales.jsp" dtmf="3">
.Sales and Marketing.
</choice>
Diffusion of Mobile Commerce Application in the Market
<choice next="http://localhost:8080/jobHunt/jobCategory/BPO.jsp" dtmf="4">
.B.P.O.
</choice>
<choice next="http://localhost:8080/jobHunt/jobCategory/Accounting.jsp" dtmf="5">
.Accounting and Tax.
</choice>
<choice next="http://localhost:8080/jobHunt/jobCategory/HR.jsp" dtmf="6">
.H. R and Top management.
</choice>
</menu>
</vxml>
//ComputerIT.jsp
<?xml version="1.0" encoding="UTF-8" ?>
<%@ page language="java" import="java.sql.*,java.util.*,com.matrix.*" %>
<%@ page import="java.io.*,java.util.*,java.net.*,java.sql.*"%>
<vxml version="2.0">
Diffusion of Mobile Commerce Application in the Market
<nomatch>
No Match! I'm sorry, I didn't understand you. Could you please try that again?
<reprompt />
</nomatch>
<noinput>
No Input! I'm sorry, I didn't hear anything. Could you please try that again?
<reprompt />
</noinput>
<menu id="menuCategory">
<property name="inputmodes" value="dtmf"/>
<prompt bargein="false">
..please press the related number. to choose the job role. from the following list.
</prompt>
<prompt>
<enumerate>
<value expr="_prompt"/> press <value expr="_dtmf"/>,
</enumerate>
</prompt>
<choice next="#hardware" dtmf="1">Hardware and Networking.</choice>
<choice next="#web" dtmf="2">Web Designing and Graphics.</choice>
Diffusion of Mobile Commerce Application in the Market
<choice next="#software" dtmf="3">Software Development and Programming.</choice>
<choice next="#testing" dtmf="5">Software Testing.</choice>
</menu>
<%
String driver = "com.mysql.jdbc.Driver";
Class.forName(driver).newInstance();
Connection con = null;
ResultSet rst = null;
Statement stmt = null;
String dbUname = "root";
String dbPass = "root";
try {
String url = "jdbc:mysql://localhost:3306/jobhunt?user=root&password=root";
con = DriverManager.getConnection(url);
stmt = con.createStatement();
rst = stmt.executeQuery("SELECT DATE_FORMAT(date,'%e-%m-%Y'),companyname,position,eligibility,location FROM networking");
while (rst.next()) {
%>
}
Diffusion of Mobile Commerce Application in the Market
<form id="hardware">
<block>
<prompt>...Date...<%=rst.getString(1)%></prompt>
<prompt>...Company...<%=rst.getString(2)%></prompt>
<prompt>...Position...<%=rst.getString(3)%></prompt>
<prompt>...Elegibility...<%=rst.getString(4)%></prompt>
<prompt>...Location...<%=rst.getString(5)%></prompt>
<goto next="#gotomenu"/>
</block>
</form>
<%}
rst.close();
con.close();
stmt.close();
} catch (Exception e) {
System.out.println(e.getMessage());
}%>
<%
String driver1 = "com.mysql.jdbc.Driver";
Class.forName(driver1).newInstance();
Connection con1 = null;
Diffusion of Mobile Commerce Application in the Market
ResultSet rst1 = null;
Statement stmt1 = null;
try {
String url1 = "jdbc:mysql://localhost:3306/jobhunt?user=root&password=root";
con1 = DriverManager.getConnection(url1);
stmt1 = con1.createStatement();
rst1 = stmt1.executeQuery("SELECT DATE_FORMAT(date,'%e-%m-%Y'),companyname,position,eligibility,location FROM web");
while (rst1.next()) {
%>
<form id="web">
<block>
<prompt>...Date...<%=rst1.getString(1)%></prompt>
<prompt>...Company...<%=rst1.getString(2)%></prompt>
<prompt>...Position...<%=rst1.getString(3)%></prompt>
<prompt>...Elegibility...<%=rst1.getString(4)%></prompt>
<prompt>...Location...<%=rst1.getString(5)%></prompt>
<goto next="#gotomenu"/>
</block>
</form>
<%}
rst1.close();
Diffusion of Mobile Commerce Application in the Market
con1.close();
stmt1.close();
} catch (Exception e) {
System.out.println(e.getMessage());
}%>
<%
String driver2 = "com.mysql.jdbc.Driver";
Class.forName(driver2).newInstance();
Connection con2 = null;
ResultSet rst2 = null;
Statement stmt2 = null;
try {
String url2 = "jdbc:mysql://localhost:3306/jobhunt?user=root&password=root";
con2 = DriverManager.getConnection(url2);
stmt2 = con2.createStatement();
rst2 = stmt2.executeQuery("SELECT DATE_FORMAT(date,'%e-%m-%Y'),companyname,position,eligibility,location FROM software");
while (rst2.next()) {
%>
Diffusion of Mobile Commerce Application in the Market
<form id="software">
<block>
<prompt>...Date...<%=rst2.getString(1)%></prompt>
<prompt>...Company...<%=rst2.getString(2)%></prompt>
<prompt>...Position...<%=rst2.getString(3)%></prompt>
<prompt>...Elegibility...<%=rst2.getString(4)%></prompt>
<prompt>...Location...<%=rst2.getString(5)%></prompt>
<goto next="#gotomenu"/>
</block>
</form>
<%}
rst2.close();
con2.close();
stmt2.close();
} catch (Exception e) {
System.out.println(e.getMessage());
}%>
<%
String driver3 = "com.mysql.jdbc.Driver";
Class.forName(driver3).newInstance();
Connection con3 = null;
Diffusion of Mobile Commerce Application in the Market
ResultSet rst3 = null;
Statement stmt3 = null;
try {
String url3 = "jdbc:mysql://localhost:3306/jobhunt?user=root&password=root";
con3 = DriverManager.getConnection(url3);
stmt3 = con3.createStatement();
rst3 = stmt3.executeQuery("SELECT DATE_FORMAT(date,'%e-%m-%Y'),companyname,position,eligibility,location FROM testing");
while (rst3.next()) {
%>
<form id="testing">
<block>
<prompt>...Date...<%=rst3.getString(1)%></prompt>
<prompt>...Company...<%=rst3.getString(2)%></prompt>
<prompt>...Position...<%=rst3.getString(3)%></prompt>
<prompt>...Elegibility...<%=rst3.getString(4)%></prompt>
<prompt>...Location...<%=rst3.getString(5)%></prompt>
<goto next="#gotomenu"/>
</block>
</form>
<%}
rst3.close();
Diffusion of Mobile Commerce Application in the Market
con3.close();
stmt3.close();
} catch (Exception e) {
System.out.println(e.getMessage());
}%>
<menu id="gotomenu">
<property name="inputmodes" value="dtmf"/>
<prompt bargein="false">
.Goto.
</prompt>
<prompt>
<enumerate>
<value expr="_prompt"/> press <value expr="_dtmf"/>,
</enumerate>
</prompt>
<!--<choice next="http://localhost:8084/jobHunt/JRole/trainingCIT.vxml" dtmf="1">-->
<choice next="http://localhost:8080/jobHunt/jobCategory/ComputerIT.jsp" dtmf="7">
Previous Menu.
</choice>
<!--<choice next="http://localhost:8084/jobHunt/JRole/trainingCIT.vxml" dtmf="1">-->
Diffusion of Mobile Commerce Application in the Market
<choice next="http://localhost:8080/jobHunt/Main.jsp" dtmf="8">
Main Menu.
</choice>
</menu>
</vxml>
//HR.jsp
<?xml version="1.0" encoding="UTF-8" ?>
<%@ page language="java" import="java.sql.*,java.util.*,com.matrix.*" %>
<%@ page import="java.io.*,java.util.*,java.net.*,java.sql.*"%>
<vxml version="2.0">
<nomatch>
No Match! I'm sorry, I didn't understand you. Could you please try that again?
<reprompt />
</nomatch>
<noinput>
No Input! I'm sorry, I didn't hear anything. Could you please try that again?
<reprompt />
</noinput>
<menu id="menuCategory">
<property name="inputmodes" value="dtmf"/>
Diffusion of Mobile Commerce Application in the Market
<prompt bargein="false">
..please press the related number. to choose the job role. from the following list.
</prompt>
<prompt>
<enumerate>
<value expr="_prompt"/> press <value expr="_dtmf"/>,
</enumerate>
</prompt>
<choice next="#hardware" dtmf="1">Admin Excecutive.</choice>
<choice next="#web" dtmf="2">H.R.manager.</choice>
<choice next="#software" dtmf="3">payroll.</choice>
</menu>
<%
String driver = "com.mysql.jdbc.Driver";
Class.forName(driver).newInstance();
Connection con = null;
ResultSet rst = null;
Statement stmt = null;
String dbUname = "root";
String dbPass = "root";
try {
Diffusion of Mobile Commerce Application in the Market
String url = "jdbc:mysql://localhost:3306/jobhunt?user=root&password=root";
con = DriverManager.getConnection(url);
stmt = con.createStatement();
rst = stmt.executeQuery("SELECT DATE_FORMAT(date,'%e-%m-%Y'),companyname,position,eligibility,location FROM admin");
while (rst.next()) {
%>
}
<form id="hardware">
<block>
<prompt>...Date...<%=rst.getString(1)%></prompt>
<prompt>...Company...<%=rst.getString(2)%></prompt>
<prompt>...Position...<%=rst.getString(3)%></prompt>
<prompt>...Elegibility...<%=rst.getString(4)%></prompt>
<prompt>...Location...<%=rst.getString(5)%></prompt>
<goto next="#gotomenu"/>
</block>
</form>
<%}
rst.close();
con.close();
stmt.close();
Diffusion of Mobile Commerce Application in the Market
} catch (Exception e) {
System.out.println(e.getMessage());
}%>
<%
String driver1 = "com.mysql.jdbc.Driver";
Class.forName(driver1).newInstance();
Connection con1 = null;
ResultSet rst1 = null;
Statement stmt1 = null;
try {
String url1 = "jdbc:mysql://localhost:3306/jobhunt?user=root&password=root";
con1 = DriverManager.getConnection(url1);
stmt1 = con1.createStatement();
rst1 = stmt1.executeQuery("SELECT DATE_FORMAT(date,'%e-%m-%Y'),companyname,position,eligibility,location FROM hr");
while (rst1.next()) {
%>
<form id="web">
<block>
<prompt>...Date...<%=rst1.getString(1)%></prompt>
Diffusion of Mobile Commerce Application in the Market
<prompt>...Company...<%=rst1.getString(2)%></prompt>
<prompt>...Position...<%=rst1.getString(3)%></prompt>
<prompt>...Elegibility...<%=rst1.getString(4)%></prompt>
<prompt>...Location...<%=rst1.getString(5)%></prompt>
<goto next="#gotomenu"/>
</block>
</form>
<%}
rst1.close();
con1.close();
stmt1.close();
} catch (Exception e) {
System.out.println(e.getMessage());
}%>
<%
String driver2 = "com.mysql.jdbc.Driver";
Class.forName(driver2).newInstance();
Connection con2 = null;
ResultSet rst2 = null;
Statement stmt2 = null;
Diffusion of Mobile Commerce Application in the Market
try {
String url2 = "jdbc:mysql://localhost:3306/jobhunt?user=root&password=root";
con2 = DriverManager.getConnection(url2);
stmt2 = con2.createStatement();
rst2 = stmt2.executeQuery("SELECT DATE_FORMAT(date,'%e-%m-%Y'),companyname,position,eligibility,location FROM payroll");
while (rst2.next()) {
%>
<form id="software">
<block>
<prompt>...Date...<%=rst2.getString(1)%></prompt>
<prompt>...Company...<%=rst2.getString(2)%></prompt>
<prompt>...Position...<%=rst2.getString(3)%></prompt>
<prompt>...Elegibility...<%=rst2.getString(4)%></prompt>
<prompt>...Location...<%=rst2.getString(5)%></prompt>
<goto next="#gotomenu"/>
</block>
</form>
<%}
rst2.close();
con2.close();
stmt2.close();
Diffusion of Mobile Commerce Application in the Market
} catch (Exception e) {
System.out.println(e.getMessage());
}%>
<menu id="gotomenu">
<property name="inputmodes" value="dtmf"/>
<prompt bargein="false">
.Goto.
</prompt>
<prompt>
<enumerate>
<value expr="_prompt"/> press <value expr="_dtmf"/>,
</enumerate>
</prompt>
<!--<choice next="http://localhost:8084/jobHunt/JRole/trainingCIT.vxml" dtmf="1">-->
<choice next="http://localhost:8080/jobHunt/jobCategory/ComputerIT.jsp" dtmf="7">
Previous Menu.
</choice>
<!--<choice next="http://localhost:8084/jobHunt/JRole/trainingCIT.vxml" dtmf="1">-->
<choice next="http://localhost:8080/jobHunt/Main.jsp" dtmf="8">
Diffusion of Mobile Commerce Application in the Market
Main Menu.
</choice>
</menu>
</vxml>
//Medical.jsp
<?xml version="1.0" encoding="UTF-8" ?>
<%@ page language="java" import="java.sql.*,java.util.*,com.matrix.*" %>
<%@ page import="java.io.*,java.util.*,java.net.*,java.sql.*"%>
<vxml version="2.0">
<nomatch>
No Match! I'm sorry, I didn't understand you. Could you please try that again?
<reprompt />
</nomatch>
<noinput>
No Input! I'm sorry, I didn't hear anything. Could you please try that again?
<reprompt />
</noinput>
<menu id="menuCategory">
<property name="inputmodes" value="dtmf"/>
<prompt bargein="false">
Diffusion of Mobile Commerce Application in the Market
..please press the related number. to choose the job role. from the following list.
</prompt>
<prompt>
<enumerate>
<value expr="_prompt"/> press <value expr="_dtmf"/>,
</enumerate>
</prompt>
<choice next="#hardware" dtmf="1">general nursing.</choice>
<choice next="#web" dtmf="2">lab technician.</choice>
<choice next="#software" dtmf="3">orthopaedist.</choice>
<choice next="#testing" dtmf="5">Surgeon.</choice>
</menu>
<%
String driver = "com.mysql.jdbc.Driver";
Class.forName(driver).newInstance();
Connection con = null;
ResultSet rst = null;
Statement stmt = null;
String dbUname = "root";
String dbPass = "root";
try {
Diffusion of Mobile Commerce Application in the Market
String url = "jdbc:mysql://localhost:3306/jobhunt?user=root&password=root";
con = DriverManager.getConnection(url);
stmt = con.createStatement();
rst = stmt.executeQuery("SELECT DATE_FORMAT(date,'%e-%m-%Y'),companyname,position,eligibility,location FROM general");
while (rst.next()) {
%>
}
<form id="hardware">
<block>
<prompt>...Date...<%=rst.getString(1)%></prompt>
<prompt>...Company...<%=rst.getString(2)%></prompt>
<prompt>...Position...<%=rst.getString(3)%></prompt>
<prompt>...Elegibility...<%=rst.getString(4)%></prompt>
<prompt>...Location...<%=rst.getString(5)%></prompt>
<goto next="#gotomenu"/>
</block>
</form>
<%}
rst.close();
con.close();
stmt.close();
Diffusion of Mobile Commerce Application in the Market
} catch (Exception e) {
System.out.println(e.getMessage());
}%>
<%
String driver1 = "com.mysql.jdbc.Driver";
Class.forName(driver1).newInstance();
Connection con1 = null;
ResultSet rst1 = null;
Statement stmt1 = null;
try {
String url1 = "jdbc:mysql://localhost:3306/jobhunt?user=root&password=root";
con1 = DriverManager.getConnection(url1);
stmt1 = con1.createStatement();
rst1 = stmt1.executeQuery("SELECT DATE_FORMAT(date,'%e-%m-%Y'),companyname,position,eligibility,location FROM lab");
while (rst1.next()) {
%>
<form id="web">
<block>
<prompt>...Date...<%=rst1.getString(1)%></prompt>
<prompt>...Company...<%=rst1.getString(2)%></prompt>
<prompt>...Position...<%=rst1.getString(3)%></prompt>
Diffusion of Mobile Commerce Application in the Market
<prompt>...Elegibility...<%=rst1.getString(4)%></prompt>
<prompt>...Location...<%=rst1.getString(5)%></prompt>
<goto next="#gotomenu"/>
</block>
</form>
<%}
rst1.close();
con1.close();
stmt1.close();
} catch (Exception e) {
System.out.println(e.getMessage());
}%>
<%
String driver2 = "com.mysql.jdbc.Driver";
Class.forName(driver2).newInstance();
Connection con2 = null;
ResultSet rst2 = null;
Statement stmt2 = null;
try {
String url2 = "jdbc:mysql://localhost:3306/jobhunt?user=root&password=root";
con2 = DriverManager.getConnection(url2);
Diffusion of Mobile Commerce Application in the Market
stmt2 = con2.createStatement();
rst2 = stmt2.executeQuery("SELECT DATE_FORMAT(date,'%e-%m-%Y'),companyname,position,eligibility,location FROM ortho");
while (rst2.next()) {
%>
<form id="software">
<block>
<prompt>...Date...<%=rst2.getString(1)%></prompt>
<prompt>...Company...<%=rst2.getString(2)%></prompt>
<prompt>...Position...<%=rst2.getString(3)%></prompt>
<prompt>...Elegibility...<%=rst2.getString(4)%></prompt>
<prompt>...Location...<%=rst2.getString(5)%></prompt>
<goto next="#gotomenu"/>
</block>
</form>
<%}
rst2.close();
con2.close();
stmt2.close();
} catch (Exception e) {
System.out.println(e.getMessage());
}%>
Diffusion of Mobile Commerce Application in the Market
<%
String driver3 = "com.mysql.jdbc.Driver";
Class.forName(driver3).newInstance();
Connection con3 = null;
ResultSet rst3 = null;
Statement stmt3 = null;
try {
String url3 = "jdbc:mysql://localhost:3306/jobhunt?user=root&password=root";
con3 = DriverManager.getConnection(url3);
stmt3 = con3.createStatement();
rst3 = stmt3.executeQuery("SELECT DATE_FORMAT(date,'%e-%m-%Y'),companyname,position,eligibility,location FROM surgeon");
while (rst3.next()) {
%>
<form id="testing">
<block>
<prompt>...Date...<%=rst3.getString(1)%></prompt>
<prompt>...Company...<%=rst3.getString(2)%></prompt>
<prompt>...Position...<%=rst3.getString(3)%></prompt>
<prompt>...Elegibility...<%=rst3.getString(4)%></prompt>
<prompt>...Location...<%=rst3.getString(5)%></prompt>
<goto next="#gotomenu"/>
Diffusion of Mobile Commerce Application in the Market
</block>
</form>
<%}
rst3.close();
con3.close();
stmt3.close();
} catch (Exception e) {
System.out.println(e.getMessage());
}%>
<menu id="gotomenu">
<property name="inputmodes" value="dtmf"/>
<prompt bargein="false">
.Goto.
</prompt>
<prompt>
<enumerate>
<value expr="_prompt"/> press <value expr="_dtmf"/>,
</enumerate>
</prompt>
<!--<choice next="http://localhost:8084/jobHunt/JRole/trainingCIT.vxml" dtmf="1">-->
<choice next="http://localhost:8080/jobHunt/jobCategory/ComputerIT.jsp" dtmf="7">
Diffusion of Mobile Commerce Application in the Market
Previous Menu.
</choice>
<!--<choice next="http://localhost:8084/jobHunt/JRole/trainingCIT.vxml" dtmf="1">-->
<choice next="http://localhost:8080/jobHunt/Main.jsp" dtmf="8">
Main Menu.
</choice>
</menu>
</vxml>
//sales.jsp
<?xml version="1.0" ?>
<vxml version="2.0">
<form id="Pharmacist">
<var name="reqType" expr="'it'"/>
<block>
<prompt>
Sales Executive Keysoft Solutions Private Ltd.
Experience.1 to 3 years.
Location. Bangalore...
Marketing/Sales Manager (Female)
Diffusion of Mobile Commerce Application in the Market
Ecole Solitalre .
Experience.3 to 5 years,
Location.Delhi.
Proactive R P O. and Staffing Solutions Private Limited .
Experience.11 to 16 years.
Location.Mumbai.
</prompt>
<goto next="#gotomenu"/>
</block>
</form>
<menu id="gotomenu">
<property name="inputmodes" value="dtmf"/>
<prompt bargein="false">
.Goto.
</prompt>
<prompt>
<enumerate>
<value expr="_prompt"/> press <value expr="_dtmf"/>,
</enumerate>
</prompt>
<!--<choice next="http://localhost:8084/jobHunt/JRole/trainingCIT.vxml" dtmf="1">-->
Diffusion of Mobile Commerce Application in the Market
<choice next="http://localhost:8084/jobHunt/jobCategory/ComputerIT.jsp" dtmf="7">
Previous Menu.
</choice>
<!--<choice next="http://localhost:8084/jobHunt/JRole/trainingCIT.vxml" dtmf="1">-->
<choice next="http://localhost:8084/jobHunt/Main.jsp" dtmf="8">
Main Menu.
</choice>
</menu>
</vxml>
Entering Job Openings into the Database
<%@ page import="java.sql.*" %>
<html>
<head>
</head>
<body>
<form method="post" action="jobhunt">
<table>
<tr>Enter the values for Job Search.</tr>
<tr><td ><b>Job Date:</b></td><td>
<input type="text" name="jobdate" value=""></input></td></tr>
Diffusion of Mobile Commerce Application in the Market
<tr><td><b>Company:</b></td><td>
<textarea type="text" name="companyname" value=""></textarea></td></tr>
<tr><td ><b>Position:</b></td><td>
<textarea type="text" name="position" value=""></textarea></td></tr>
<tr><td><b>Eligibility:</b></td><td>
<textarea type="text" name="eligibility" id="ename" value=""></textarea></td></tr>
<tr><td ><b>Location:</b></td><td>
<textarea type="text" name="location" value=""></textarea></td></tr>
<tr><td><input type="submit" name="EnterDetailsHW" value="Submit"></input></td>
<td><input type="button" name="jobdate" value="Cancel"></input></td></tr>
</table>
</form>
</body>
</html>
6.2 MOBILE VOTING
//login using user name and password
<?xml version="1.0" ?>
Diffusion of Mobile Commerce Application in the Market
<vxml version="2.0">
<var name="reqType" expr="'login'"/>
<form id="init">
<block>Welcome to Mobile Voting.</block>
<field name="username" type="digits?length=8">
<prompt>Please enter your 8 digit Bio.metric Card number.</prompt>
<noinput>I am sorry. You have not given any input try connecting again at a later time.<exit/></noinput>
<nomatch>I am sorry. This is an invalid voter ID number.<reprompt/></nomatch>
</field>
<field name="password" type="digits?length=4">
<prompt>Please enter the last 4 digits of the Voter ID .</prompt>
<filled>
<!--<submit next= "mainpage.vxml"/>-->
<submit next="http://localhost:8080/MobilVoting/VServer" namelist = "username password reqType" method="post"/>
</filled>
<noinput>I am sorry. You have not given any input try connecting again at a later time.<exit/></noinput>
<nomatch>I am sorry. This is an invalid passcode.<reprompt/></nomatch>
Diffusion of Mobile Commerce Application in the Market
</field>
</form>
</vxml>
//login using name and pincode of city
<?xml version="1.0" ?>
<vxml version="2.0">
<var name="reqType" expr="'login2'"/>
<form id="init">
<block></block>
<field name="age" type="digits?length=4">
<prompt>Please enter 4 digit year of Birth .</prompt>
<noinput>I am sorry. You have not given any input try connecting again at a later time.<exit/></noinput>
<nomatch>I am sorry. This is an invalid voter ID number.<reprompt/></nomatch>
</field>
<field name="pincode" type="digits?length=6">
<prompt>Please enter your 6 pincode number.</prompt>
<filled>
<!--<submit next= "mainpage.vxml"/>-->
<submit next="http://localhost:8080/MobilVoting/VServer" namelist = "age pincode reqType" method="post"/>
Diffusion of Mobile Commerce Application in the Market
</filled>
<noinput>I am sorry. You have not given any input try connecting again at a later time.<exit/></noinput>
<nomatch>I am sorry. This is an invalid passcode.<reprompt/></nomatch>
</field>
</form>
</vxml>
//No match of given input
<?xml version="1.0" encoding="ISO-8859-1"?>
<vxml version="2.0" lang="en">
<form>
<block>
<prompt bargein="false">sorry you have entered wrong information.</prompt>
</block>
</form>
</vxml>
//multi.jsp
<%@ page language="java"%>
Diffusion of Mobile Commerce Application in the Market
<%@ page import = "java.io.*,java.util.*,java.net.*,java.sql.*"%>
<%
String appName = request.getContextPath().substring(1);
String appHost = request.getServerName() + ":" + request.getLocalPort();
%>
<?xml version="1.0" ?>
<%@ page import="java.io.*,java.util.*,java.net.*,java.sql.*"%>
<vxml version="2.0">
<nomatch>
No Match! I'm sorry, I didn't understand you. Could you please try that again?
<reprompt />
</nomatch>
<noinput>
No Input! I'm sorry, I didn't hear anything. Could you please try that again?
<reprompt />
</noinput>
<menu id="menu">
<prompt bargein="false">
you have successfully logged in.
Press 1 for vote in Keypad Mode.
say 2 for vote in Speech Recognition Mode.
</prompt>
Diffusion of Mobile Commerce Application in the Market
<choice next="http://<%=appHost%>/<%=appName%>/dtmf/Success.jsp" dtmf="1"/>
<choice next="http://<%=appHost%>/<%=appName%>/speech/Success.jsp" > two </choice>
</menu>
</vxml>
6.2.1 DTMF Mode
//success.jsp
<%@ page language="java"%>
<%@ page import = "java.io.*,java.util.*,java.net.*,java.sql.*"%>
<%
String appName = request.getContextPath().substring(1);
String appHost = request.getServerName() + ":" + request.getLocalPort();
%>
<?xml version="1.0" ?>
<%@ page import="java.io.*,java.util.*,java.net.*,java.sql.*"%>
<vxml version="2.0">
<nomatch>
Diffusion of Mobile Commerce Application in the Market
No Match! I'm sorry, I didn't understand you. Could you please try that again?
<reprompt />
</nomatch>
<noinput>
No Input! I'm sorry, I didn't hear anything. Could you please try that again?
<reprompt />
</noinput>
<menu id="menu">
<property name="inputmodes" value="dtmf"/>
<prompt bargein="false">
you have chosen DTMF mode.
</prompt>
<prompt>
<enumerate>
<value expr="_prompt"/> press <value expr="_dtmf"/>,
</enumerate>
</prompt>
<choice next="http://<%=appHost%>/<%=appName%>/dtmf/VotePollJDS.jsp" dtmf="1">
Diffusion of Mobile Commerce Application in the Market
vote for JANATADALA
</choice>
<choice next="http://<%=appHost%>/<%=appName%>/dtmf/VotePollJDU.jsp" dtmf="2">
vote for JDU
</choice>
<choice next="http://<%=appHost%>/<%=appName%>/dtmf/VotePollCongress.jsp" dtmf="3">
vote for Congress.
</choice>
<choice next="http://<%=appHost%>/<%=appName%>/dtmf/VotePollBJP.jsp" dtmf="4">
vote for BJP.
</choice>
</menu>
</vxml>
//VotePoll BJP.jsp
<?xml version="1.0" ?>
Diffusion of Mobile Commerce Application in the Market
<vxml xmlns="http://www.w3.org/2001/vxml"
xmlns:conf="http://www.w3.org/2002/vxml-conformance" version="2.0"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="http://www.w3.org/2001/vxml
http://www.w3.org/TR/voicexml20/vxml.xsd">
<%@ page language="java" import="java.sql.*" %>
<%
try {
Class.forName("com.mysql.jdbc.Driver");
Connection connection = DriverManager.getConnection("jdbc:mysql://localhost:3306/mobilevoting", "root", "root");
Statement st = connection.createStatement();
int i = 1;
String sql = "INSERT INTO VotePollBJP (bjp) VALUES ('"+i+"')";
int res = st.executeUpdate(sql);
if (res == 1) {
out.println("Records Updated!");
} else {
out.println("Records Added Failed!");
}
connection.close();
}
Diffusion of Mobile Commerce Application in the Market
catch(Exception e) {
out.println(e.toString());
}
%>
<form id="insertAdmk">
<block>
<prompt>Thank u .your vote has been succesfully polled for the party BJP.</prompt>
</block>
<exit/>
</form>
</vxml>
//VotePoll Congress.jsp
<?xml version="1.0" ?>
<vxml xmlns="http://www.w3.org/2001/vxml"
xmlns:conf="http://www.w3.org/2002/vxml-conformance" version="2.0"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="http://www.w3.org/2001/vxml
http://www.w3.org/TR/voicexml20/vxml.xsd">
<%@ page language="java" import="java.sql.*" %>
Diffusion of Mobile Commerce Application in the Market
<%
try {
Class.forName("com.mysql.jdbc.Driver");
Connection connection = DriverManager.getConnection("jdbc:mysql://localhost:3306/mobilevoting", "root", "root");
Statement st = connection.createStatement();
int i = 1;
String sql = "INSERT INTO VotePollCongress (congress) VALUES ('"+i+"')";
int res = st.executeUpdate(sql);
if (res == 1) {
out.println("Records Updated!");
} else {
out.println("Records Added Failed!");
}
connection.close();
}
catch(Exception e) {
out.println(e.toString());
}
%>
<form id="insertAdmk">
Diffusion of Mobile Commerce Application in the Market
<block>
<prompt>Thank u .your vote has been succesfully polled for the party congress.</prompt>
</block>
<exit/>
</form>
</vxml>
//JDU.jsp
<?xml version="1.0" ?>
<vxml xmlns="http://www.w3.org/2001/vxml"
xmlns:conf="http://www.w3.org/2002/vxml-conformance" version="2.0"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="http://www.w3.org/2001/vxml
http://www.w3.org/TR/voicexml20/vxml.xsd">
<%@ page language="java" import="java.sql.*" %>
<%
try {
Class.forName("com.mysql.jdbc.Driver");
Connection connection = DriverManager.getConnection("jdbc:mysql://localhost:3306/mobilevoting", "root", "root");
Statement st = connection.createStatement();
Diffusion of Mobile Commerce Application in the Market
int i = 1;
String sql = "INSERT INTO votePollJDU (jdu) VALUES ('"+i+"')";
int res = st.executeUpdate(sql);
if (res == 1) {
out.println("Records Updated!");
} else {
out.println("Records Added Failed!");
}
connection.close();
}
catch(Exception e) {
out.println(e.toString());
}
%>
<form id="insertJdu">
<block>
<prompt>Thank u .your vote has been succesfully polled for the party JDU.</prompt>
</block>
<exit/>
</form>
</vxml>
Diffusion of Mobile Commerce Application in the Market
//Vote Poll JDS.jsp
<?xml version="1.0" ?>
<vxml xmlns="http://www.w3.org/2001/vxml"
xmlns:conf="http://www.w3.org/2002/vxml-conformance" version="2.0"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="http://www.w3.org/2001/vxml
http://www.w3.org/TR/voicexml20/vxml.xsd">
<%@ page language="java" import="java.sql.*" %>
<%
try {
Class.forName("com.mysql.jdbc.Driver");
Connection connection = DriverManager.getConnection("jdbc:mysql://localhost:3306/mobilevoting", "root", "root");
Statement st = connection.createStatement();
int i = 1;
String sql = "INSERT INTO votePollJDS(jds) VALUES ('"+i+"')";
int res = st.executeUpdate(sql);
if (res == 1) {
out.println("Records Updated!");
} else {
out.println("Records Added Failed!");
Diffusion of Mobile Commerce Application in the Market
}
connection.close();
}
catch(Exception e) {
out.println(e.toString());
}
%>
<form id="insertJds">
<block>
<prompt>Thank u .your vote has been succesfully polled for the party JDS.</prompt>
</block>
<exit/>
</form>
</vxml>
6.2.2 Speech Mode
//success.jsp
<%@ page language="java"%>
<%@ page import = "java.io.*,java.util.*,java.net.*,java.sql.*"%>
<%
Diffusion of Mobile Commerce Application in the Market
String appName = request.getContextPath().substring(1);
String appHost = request.getServerName() + ":" + request.getLocalPort();
%>
<?xml version="1.0" ?>
<%@ page import="java.io.*,java.util.*,java.net.*,java.sql.*"%>
<vxml version="2.0">
<nomatch>
No Match! I'm sorry, I didn't understand you. Could you please try that again?
<reprompt />
</nomatch>
<noinput>
No Input! I'm sorry, I didn't hear anything. Could you please try that again?
<reprompt />
</noinput>
<menu id="menu">
<property name="inputmodes" />
<prompt>
you have Choosen speech recognition mode.
say one to vote for JDS.
say two to vote for JDU.
say three to vote for CONGRESS.
Diffusion of Mobile Commerce Application in the Market
say four to vote for BJP.
</prompt>
<choice next="http://localhost:8084/MobilVoting/speech/VotePollJDS.jsp">
one.
</choice>
<choice next="http://<%=appHost%>/<%=appName%>/speech/VotePollJDU.jsp">
two.
</choice>
<choice next="http://localhost:8084/MobilVoting/speech/VotePollCongress.jsp">
three.
</choice>
<choice next="http://localhost:8084/MobilVoting/speech/VotePollBJP.jsp">
four.
</choice>
</menu>
</vxml>
Diffusion of Mobile Commerce Application in the Market
// VotePollBJP.jsp
<?xml version="1.0" ?>
<vxml xmlns="http://www.w3.org/2001/vxml"
xmlns:conf="http://www.w3.org/2002/vxml-conformance" version="2.0"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="http://www.w3.org/2001/vxml
http://www.w3.org/TR/voicexml20/vxml.xsd">
<%@ page language="java" import="java.sql.*" %>
<%
try {
Class.forName("com.mysql.jdbc.Driver");
Connection connection = DriverManager.getConnection("jdbc:mysql://localhost:3306/mobilevoting", "root", "root");
Statement st = connection.createStatement();
int i = 1;
String sql = "INSERT INTO VotePollBJP (bjp) VALUES ('"+i+"')";
int res = st.executeUpdate(sql);
if (res == 1) {
out.println("Records Updated!");
} else {
out.println("Records Added Failed!");
Diffusion of Mobile Commerce Application in the Market
}
connection.close();
}
catch(Exception e) {
out.println(e.toString());
}
%>
<form id="insertBjp">
<block>
<prompt>Thank u .your vote has been succesfully polled for the party B.J.P.</prompt>
</block>
</form>
<exit/>
</vxml>
//VotePollCongress.jsp
<?xml version="1.0" ?>
<vxml xmlns="http://www.w3.org/2001/vxml"
xmlns:conf="http://www.w3.org/2002/vxml-conformance" version="2.0"
Diffusion of Mobile Commerce Application in the Market
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="http://www.w3.org/2001/vxml
http://www.w3.org/TR/voicexml20/vxml.xsd">
<%@ page language="java" import="java.sql.*" %>
<%
try {
Class.forName("com.mysql.jdbc.Driver");
Connection connection = DriverManager.getConnection("jdbc:mysql://localhost:3306/mobilevoting", "root", "root");
Statement st = connection.createStatement();
int i = 1;
String sql = "INSERT INTO VotePollCongress (congress) VALUES ('"+i+"')";
int res = st.executeUpdate(sql);
if (res == 1) {
out.println("Records Updated!");
} else {
out.println("Records Added Failed!");
}
connection.close();
}
catch(Exception e) {
out.println(e.toString());
Diffusion of Mobile Commerce Application in the Market
}
%>
<form id="insertCongress">
<block>
<prompt>Thank u .your vote has been succesfully polled for the party congress.</prompt>
</block>
<exit/>
</form>
</vxml>
//VotePoll JDU.jsp
<?xml version="1.0" ?>
<vxml xmlns="http://www.w3.org/2001/vxml"
xmlns:conf="http://www.w3.org/2002/vxml-conformance" version="2.0"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="http://www.w3.org/2001/vxml
http://www.w3.org/TR/voicexml20/vxml.xsd">
<%@ page language="java" import="java.sql.*" %>
<%
try {
Diffusion of Mobile Commerce Application in the Market
Class.forName("com.mysql.jdbc.Driver");
Connection connection = DriverManager.getConnection("jdbc:mysql://localhost:3306/mobilevoting", "root", "root");
Statement st = connection.createStatement();
int i = 1;
String sql = "INSERT INTO VotePollJdu (JDU) VALUES ('"+i+"')";
int res = st.executeUpdate(sql);
if (res == 1) {
out.println("Records Updated!");
} else {
out.println("Records Added Failed!");
}
connection.close();
}
catch(Exception e) {
out.println(e.toString());
}
%>
<form id="insertJdu">
<block>
Diffusion of Mobile Commerce Application in the Market
<prompt>Thank u .your vote has been successfully polled for the party JDU.</prompt>
</block>
<exit/>
</form>
</vxml>
//VotePoll JANATADALA.jsp
<?xml version="1.0" ?>
<vxml xmlns="http://www.w3.org/2001/vxml"
xmlns:conf="http://www.w3.org/2002/vxml-conformance" version="2.0"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="http://www.w3.org/2001/vxml
http://www.w3.org/TR/voicexml20/vxml.xsd">
<%@ page language="java" import="java.sql.*" %>
<%
try {
Class.forName("com.mysql.jdbc.Driver");
Connection connection = DriverManager.getConnection("jdbc:mysql://localhost:3306/mobilevoting", "root", "root");
Statement st = connection.createStatement();
Diffusion of Mobile Commerce Application in the Market
int i = 1;
String sql = "INSERT INTO votePollJANATADALA (jds) VALUES ('"+i+"')";
int res = st.executeUpdate(sql);
if (res == 1) {
out.println("Records Updated!");
} else {
out.println("Records Added Failed!");
}
connection.close();
}
catch(Exception e) {
out.println(e.toString());
}
%>
<form id="insertJds">
<block>
<prompt>Thank u .your vote has been succesfully polled for the party JDS.</prompt>
</block>
<exit/>
</form>
</vxml
Diffusion of Mobile Commerce Application in the Market
CHAPTER 7
IMPLEMENTATION
7.1 IMPLEMENTATION OF JOB HUNT
7.1.1 Calling IVRS to Get Job Information
The customer can call IVRS using mobile or a Landline phone and this connects to
the host IVRS server with the help of PSTN public switched telephone network).
7.1.2 Getting Information from the Server
In the server itself there will be option to route more than one call with the call
Router option this helps to run more than one IVRS application simultaneously in
time sharing basis. In the IVRS server our server program containing jsp and voice
xml will embedded and it is useful for getting the input from the user as well as
delivering output to the user through sip phone emulator. Our server application
will contact the particular database it will get all the resources and deliver to the
end user in the form of voice.
7.1.3 Delivering the Information to the Job Seeker
If the server finds any job openings related to qualification of the job seeker, the
information is given which contains the details about the company name,
interview location and the interview time.
7.2 DATA FLOW DIAGRAM FOR JOB HUNTING
Job Hunting process is explained using the data flow diagram. It depicts the data
flow between various entities. When the user calls the ivr, he will be prompted to
Diffusion of Mobile Commerce Application in the Market
choose touch tone mode or speech recognition mode.
Once he entered into a mode he will be asked for his Job category with
respect to the mode he chose. Depends on the job category he chooses, the user
will be asked to enter the sub category within the selected job category. For
example, if the user chooses computer science as his job category the he will be
asked to enter his field of interest in the sub categories such as Networking,
testing, development and so on.
Once this information is obtained, the sever will provide the information
about job openings in various companies if the field of interest provided matches
with that present in the server.
Diffusion of Mobile Commerce Application in the Market
Fig.7.1: Data Flow Diagram for Job Hunt
Diffusion of Mobile Commerce Application in the Market
7.3 USE CASE DIAGRAM FOR JOB HUNT
Fig.7.2: Use case diagram for Job Hunt
Diffusion of Mobile Commerce Application in the Market
7.4 IMPLEMENTATION OF MOBILE VOTING
In this section, we outline our mobile voting scheme.
7.4.1 Voters Authentication Phase
In this phase Election commission is responsible to verify the authenticity of the
voters. If the voter is authentic then only he will be allowed to participate in the
next steps of voting.
7.4.2 Voting Phase
In this phase, the voter dial a designated phone number and follow the
instructions using a password already provided.
• The voter selects the appropriate option to vote the particular party.
• The voter checks the signature and retrieves the VS- signed voter, voter ID
• The voter sends the voting token along with voter ID and the public key
correspond to this particular voter ID to AC, these three items keep the
privacy of the voter.
• Upon receiving the encrypted key and the voting token, CS keeps its safe till
counting start as per the predefined schedule.
7.4.3 Counting Phase
Counting Phase At the scheduled time of counting CS decrypts the ballot and
checks whether the voting token is valid or not. If it is valid it will be counted else
it will be rejected. In entire process describe above it is strongly require that
whenever AC is sending data to VS. Sender Identification will not be revealed at
Diffusion of Mobile Commerce Application in the Market
any time. So even if somebody track a ballot can be identified with the particular
AC but not with the particular User and a single AC can have number of users
7.4.4 Security Analysis
In this section, we discuss how and to what extent the security requirements is to
be
Authenticate: only the authorized voters can vote.
First, voters are authenticated through Voter ID, which assures that voters
are who they claim to be.
Second, the eligibility of voters is checked by VS. This prevents voters from
voting more than once.
Privacy: All votes remain secret while the voting takes place and each individual
vote cannot be linked to the voter who casts it. The proposed scheme is divided
into three phases, and they are separated in time. In the voting phase, a signature
is applied to the vote in a way that vote is not linkable with voter and is signed by
the AC without revealing the vote and in the same way it is signed by the VS. In
the next step the communication between voters and CS achieves anonymity with
the help of AC. Hence, for all the components of the voting system, if the Voters
cannot be linked with the vote, the privacy of the voter is protected.
7.5 MOBILE VOTING SPEECH PROCESS
In the below diagram voter authentication process is diagrammatically explained
about how the speech recognition software loads the grammar from the database
and matches it with the user input. The system will prompt the user for his voter
Id and simultaneously loads the grammar from the database to the speech
Diffusion of Mobile Commerce Application in the Market
recognition system. Once the grammar is loaded, the speech recognizer starts to
look for the exact utterance from the user so that it can find a match in the
grammar. Interaction with the users will be handled by voiceXML documents. The
dynamic behavior of the user interaction like loading grammar from the database,
responding user queries based on the user input will be handled by java server
pages.
After it finds voter id match, the system now prompts the user for his
password. If his voter id and password matches then the user will be asked some
security questions to provide voter authentication. Finally he will be allowed to
cast his vote in two different modes via touch tone or speech recognition.
Diffusion of Mobile Commerce Application in the Market
Fig.7.3: Speech Recognition Process in Mobile Voting
7.6 DATA FLOW DIAGRAM FOR VOTE CASTING
Vote casting process is explained using the data flow diagram. It depicts the data
flow between various entities. Once the user is authenticated to cast his vote he
will be prompted to choose touch tone mode or speech recognition mode. Once
he entered into a mode he will be asked for his constituency name or
constituency number with respect to the mode he chose. For example, he has to
know his constituency number if he chooses to vote in touch tone mode.
Depends on the Constituency he chose, the ballot will be generated with
the list of candidates contesting in the constituency and their respective symbols.
The ballot will be generated with the help of information available in the tables
Party Details and Candidate Details. He can vote for the candidate by saying the
symbol of the candidate or saying the candidate number. The system will check
his vote validity like duplicate votes and illegal votes before accepting his vote. If
the system finds anything wrong with his validation of vote, his vote will be
rejected.
Diffusion of Mobile Commerce Application in the Market
Cast Vote
Prompt User For DTMF or Voice Input Mode
Recognize Touch Tone
Input
Recognize Voice Input
Generate Ballot to
Cast VoteValidate User
Vote
Party_Details
Constituency_Details
Voice InputDTMF Input
SuccessfulValidation
Unsuccessful Validation
Check Election ID
Reject Vote
No Match
MatchElection_Details
End User Session
Accept VoteCasting
Fig.7.4: Data Flow Diagram for Vote Casting
7.7 USE CASE DIAGRAM FOR VOTER LOGIN
Use case diagram captures the user interaction with the system. The diagram
depicts the system overview of how the user interacts with the system and
external entities, the system have to depend upon. When the user enters the
system he will be asked whether he wants to vote or know results. Once the user
selects his choice he will be directed accordingly.
Diffusion of Mobile Commerce Application in the Market
If the user chooses to vote he has to go through various processes like
voter authentication and vote validation as explained in the above diagram. The
system restricts the user from casting his vote second time for a particular
election and also do not accept illegal votes like forcing someone to cast his vote
against their wish.
If the user chooses result he will be asked to select overall result or
constituency wise results. Selecting overall result notifies the user about the
winner of the current election and his margin of victory with respect to other
parties. If he chooses Constituency wise result he has to provide the system with
constituency name. The system notifies the user with the winner of the
constituency, total votes secured and his margin of victory with respect to other
candidate.
Diffusion of Mobile Commerce Application in the Market
Generate Reports
Vote Counting
Voting SystemVote Validation
Mobile Cl ient
Voter Registration
VoiceXml Application
Cast Vote
User Authentication
<<include>>
Fi
g.7.5: Use Case Diagram for Voter Login
Diffusion of Mobile Commerce Application in the Market
CHAPTER 8
TESTING
8.1 TESTING OF MOBILE SYSTEM
The software, which has been developed, has to be tested to prove its validity.
Testing is considered to be the least creative phase of the whole cycle of system
design. In the real sense it is the phase, which helps to bring out the creativity of
the other phases, and makes it shine. The “Mobile System” was tested along the
following guidelines to prove its validity. It was tested using the following two
techniques of software testing.
8.1.1 White Box Testing
By using this technique it was tested that all the individual logical paths
were executed at least once.
All the logical decisions were tested on both their true and false sides.
All the loops were tested with data in between the ranges and especially at
the boundary values.
8.1.2 Black Box Testing
By the use of this technique the missing functions were identified and
placed in their positions.
The errors in the interfaces were identified and corrected.
This technique was also used to identify the initialization and termination
errors and correct th
Diffusion of Mobile Commerce Application in the Market
CHAPTER 9
SNAPSHOTS
9.1 Snapshots of Job Hunt
Fig 9.1 : Voxeo SIP Soft phone
Diffusion of Mobile Commerce Application in the Market
Fig 9.2 :Call Routing for Job Hunt
Diffusion of Mobile Commerce Application in the Market
9.2 Snapshots of Mobile Voting
Fig 9.3 : Voxeo SIP Soft phone
Diffusion of Mobile Commerce Application in the Market
Fig 9.4: Directory Listing for Mobile Voting
Diffusion of Mobile Commerce Application in the Market
Fig
9.5 : Call Routing for Mobile Voting
Diffusion of Mobile Commerce Application in the Market
CHAPTER 10
PERFORMANCE ANALYSIS
10.1 BUILDING THE HOUSE OF QUALITY MODEL OF MOBILE COMMERCE TO IMPROVE PERFORMANCE
In the Fig., Ii (where i=1…n, n is the number of the number of quality
requirements) is the degree of importance for customer quality requirements ith.
Ii can be assigned from1 meaning the least importance to 5 meaning the most
importance. Rij is the ratings of the relationship between quality requirements ith
and technical requirements jth, it can be assigned 0, 1, 3 or 5, 0 represents no
relationship between them, 1 represents weak relationship, 3 represents medium
relationship, and 5 represents strong relationship. Xj (where j=1…m, m is the
number of the number of technical requirements) is the technical importance
rating for technical requirements jth. It’s given by the weighted column sum of
each quality requirement by the quantified relationship values of technical
requirements ith. Consequently, Xj can be calculated by the flowing formulation.
According to the value of Xj, we can distinguish the priority of technical
requirements, so that we can develop a more robust service system of mobile
commerce, to reduce or eliminate the service quality gaps, and assure the service
quality in mobile commerce. Figure 10.1 . QFD calculation of compositor’s .
Diffusion of Mobile Commerce Application in the Market
TABLE 10.1: QFD CALCULATION OF COMPOSITORS
Diffusion of Mobile Commerce Application in the Market
Diffusion of Mobile Commerce Application in the Market
10.2 PERFORMANCE ANALYSIS OF MOBILE VOTING
We have analyzed the percentage of voting in the past 3 years in Bangalore.
aised to 55% and in 2010 it reduced to 45%. By using mobile for voting we can
increase the percentage of voting to 65%.
The expected increase in voting is calculated due to the various advantages of our
proposed system such as-
Voters do not have to wait in long queues.
Handicapped people who cannot go the voting stations
can vote conveniently
Diffusion of Mobile Commerce Application in the Market
Percentage
70%
60%
50%
40%
30%
20%
10%
Year
2008 2009 2010 expected
Fig 10.1: Statistics of Voting
Diffusion of Mobile Commerce Application in the Market
CHAPTER 11
FUTURE ENHANCEMENTS
As a measure of security features mobile devices allows the user to make use of
biometric information’s which are unique to individuals. For example voice
biometrics can be used with voiceXML to authenticate a user. Similarly finger
prints can also be used with mobiles that provide those options. Scalability is
another important feature to be addressed.
Future enhancements for mobile commerce can be done in the following
systems. This improves the service quality in the below systems.
11.1 WIRELESS USER EQUIPMENT AND SYSTEMS
Today’s communication-centric and computing-centric devices are becoming a
single intelligent wireless device. The future user wireless devices, dubbed as
universal wireless handheld devices, will have numerous functionalities, all aiming
to establish communications, enhance education, furnish entertainment, provide
information, and conduct
transactions for mobile users. Few of the device features are already available in
handheld devices, but many of them, yet to be incorporated, will need to increase
the device size, weight, complexity, power, memory, and processing
Diffusion of Mobile Commerce Application in the Market
requirements. To this end, engineering design trade-offs will be required to form
the right balance between devices’ capabilities and their constraints.
With low-power requirements and long-lasting batteries, the universal
wireless handheld devices will be small, low cost, light-weight, easy-to-use, and
IC-card-reader equipped. They can be attached to desk-/lap-top computers and
their peripherals, including keyboards, printers, scanners, loud speakers, and fax
machines. They will have high-resolution color screens to present pin-point
information, thus minimizing the burden on users’ attention. The wireless devices
and networks will employ intrusion detection systems to detect cracking attempts
in real time and to take effective protective measures based on the information it
has. These devices include anti-virus software to handle malicious code and to
support for authenticating users, servers, and applications.
11.2 RADIO FREQUENCY IDENTIFICATION (RFID)
RFID is a generic term for technologies that use radio waves to automatically
identify individual items or some of their attributes. RFID possesses several
benefits over bar codes. First, it does not need to meet line-of-sight requirements
as long as the RFID tags are within the range of a reader. Second, quite many
number of RFID tags can be read simultaneously. Third, every unique item can
have its own RFID tags. The mobile consumer will use RFID readers in their mobile
phones to scan RFID tags, say in the packaging of products on store shelves, to
pay for tolls and access fees, to purchase at vending machines and points of sales,
to access secure rooms, buildings, and other partitioned areas, and to control
home and office appliances.
Diffusion of Mobile Commerce Application in the Market
With RFID, a scanner can read the encoded information even when the tag
is concealed. For example, it may be embedded in a product’s casing, or sewn into
an item of clothing, or sandwiched between a banknote’s layered paper. The
stealthy nature of RFID technology has raised concerns among privacy advocates
that RFID tags could be tracked beyond their intended use. For example, security
agencies might use them to covertly monitor individuals or their belongings.
Lower frequencies (LF and MF) usually are cheaper, use less power, are better
able to penetrate non-metallic substances, and are ideal for scanning objects with
high-water content.
On the other hand, higher frequencies (HF and UHF) typically offer a better
range and can transfer data faster; they tend to be more directed and, thus,
require a clearer path. Active tags can have a farther read range than passive tags,
but passive tags are less expensive and require no maintenance. RFID will play a
critical role in emerging wireless access and monitoring applications, especially in
today’s security-aware era.
11.3 LOCATION DETERMINATION
Location determination is seen to be an indispensable feature for mobile
commerce. Network-based positioning is carried out by terrestrial systems
through various techniques,
such as cell of origin, time of arrival, angle of arrival, and enhanced observed time
difference. The device-based positioning is carried out by satellite systems
typically using
Diffusion of Mobile Commerce Application in the Market
three or four MEO satellites, also known as GPS. However, a hybrid approach
delivering the accuracy of device-centric option, while avoiding a line-of-sight
requirement as well as increased cost, size, and power consumption, is also used.
Though FCC does not require the mobile network operators to use a specific
technology, it has indicated specific performance metrics for location-enabled
technology. For network-based technology, location information accuracy is
required to be within 100 meters 67% of the time and within 300 meters 95% of
the time . But for the device-centric technology, these distances must be halved.
In view of possible launches of LEO satellites and the significant increase in the
processing capabilities of the wireless devices, as well as the fact that the cell
sizes are shrinking from macro to micro to pico, the location-based technologies
are expected to become more accurate and less costly in the future
11.4 SOFTWARE DEFINED RADIO (SDR)
SDR enables reconfigurable system architectures for wireless networks and user
devices. To provide users with m-commerce services under an array of
heterogeneous networks, certain design problems (such as limitations in device
size, cost, power consumption, and backward compatibilities to systems) must all
be overcome. The most viable way of implementing these types of wireless
devices is to adopt a software radio approach. The received analog signal is
processed by a reprogrammable baseband digital signal processor in accordance
with the wireless environment. However, certain problems then need to be
addressed—such as an analog radio interface with multiple antennas and
amplifiers and very fast high-speed analog-to digital conversions and DSP
functions—which can all, in turn, add to the circuit complexity and high-power
Diffusion of Mobile Commerce Application in the Market
consumption and dissipation. SDR can provide the user with a single piece of
scalable hardware that is at once compatible
at a global scale
11.5 ADAPTIVE MODULATION AND CODING (AMC)
AMC is one of the most viable and effective means to dynamically combat
wireless channel degradation and meet performance requirements. In AMC, for
the same symbol rate (i.e., occupied bandwidth), the signal power, the
modulation technique, the information rate, and the channel-coding rate, can all
be adjusted in accordance with instantaneous variations in channel conditions
(such as multi-path and proximity to the base station) and quality of service
requirements. Forward-error correcting (FEC) codes (whose rates may range from
1/2 to 5/6) and digital modulation techniques (ranging from QPSK to 64 QAM) will
be dynamically adapted for every single 5 individual, giving rise to up to a six-fold
spectral efficiency (bits per second per Hz)
11.6 DIGITAL SIGNAL COMPRESSION
Digital signal compression also known as source coding, is employed to reduce
the bit rate requirements (bandwidth demands). It is widely applied to all sources
of modality. Both proprietary and standard techniques are widely available and
are constantly being improved upon. Texts, software, and faxes generally employ
lossless compression techniques, such
as the Lempel-Ziv and Huffman codes. On the other hand, MPEG video, JPEG
image, and MP3 audio coding standards employ lossy compression, where known
limitations of the human visual and audio systems are exploited to introduce
losses but in a controlled manner. With advances in compression, a wider array of
Diffusion of Mobile Commerce Application in the Market
feature-rich m-commerce applications and/or lower service costs can be
provided.
11.7 BIOMETRICS
Biometrics as an essential security measure will play an imperative role in the
next-generation m-commerce services. Traditionally, most security systems
authenticate the user
based on something that he/she knows, such as a password. However, where
security really matters, it makes sense to add a second layer, which could be
something that he/she has (e.g., a smartcard). Also, as a third option, and
probably the most authentic method, could be something that he/she is,
something that, at least theoretically, would be virtually impossible to forge.
Biometric control measuring physical characteristics and behavioral patterns will
be widely employed to allow the user to access his/her own wireless device, to
enable the user to access certain places, and to allow the user to monitor assets.
Of course, depending on
their effectiveness, cost, intrusiveness, and accuracy, more than one biometric
controls may be simultaneously employed. Biometric control may include finger
imaging, palm print, hand geometry, iris and retina vascular pattern, facial
recognition and thermography, signature and
handwriting, key stroke dynamics, and voice recognition and speech pattern
Diffusion of Mobile Commerce Application in the Market
CHAPTER 12
CONCLUSION
The project consists of two applications: Job Hunt and Mobile Voting.
Regarding job hunt, m-commerce has attracted the attention of both practitioners
and academics. Research activities on m-commerce have increased significantly.
Here we have attempted to provide a general picture of the main characteristics
of mobile commerce application in the market. Through review the research
literatures of m-commerce, we can find that current research is heavily skewed
toward consumer issues. It seems that the most popular m-commerce application
is that supporting financial activities. Mobile banking and payments are issues
that have been widely discussed by researchers.
On the aspect of methodology, the existing body of research on mobile
business has a disproportionately high level of secondary research studies. So
there should be an increase of empirically-based studies (surveys, interviews,
experiments, action research, ethnography, and so on) as well as simulation. In
addition to the above conclusions, we would like to offer the following
suggestions for further research in mobile commerce applications: Firstly, Mobile
commerce researchers should begin to focus their efforts more carefully.
Diffusion of Mobile Commerce Application in the Market
Among the applications, m-commerce entertainment services and games
have a great deal of market potential and will dominate global m-commerce
revenues in the future. Additional research is required in other related areas such
as mobile education, mobile supply chain management, and so forth.
Secondly, since the bright prospect for mobile commerce, many industries
have sought to join this arena. The mobile commerce value chain is thus formed,
and new business opportunities are created for the participants. Among the
participants, telecommunication operators are the most critical and dominant. So
it is necessary to exploit a game-theoretic approach of based on mobile
commerce value chain for analyzing relation between the participants.
Lastly, as application of RFID technology grows, they are bound to offer
new opportunities in the future. Therefore, the combination of RFID and mobile
commerce, which can be called mobile RFID, becomes a new focus of future
business. An important research that should be pursued is suitable models for the
adoption of RFID in organizations, and the RFID’s impact on supply chains.
The major limitations of m-commerce, as viewed today, are small screens
on wireless devices, limited processing power, modest memory, restricted power
consumption, poor voice quality, low-speed data transmission, non-ubiquitous
coverage, unproven security, scarce bandwidth, and possible health hazards.
Diffusion of Mobile Commerce Application in the Market
In case of mobile voting, the system allows the user to cast his vote with
high level of confidentiality and keep voters away from the possible threats like
booth capturing and it may increase the voter turnouts in remote areas and even
in urban areas. People, who are uncomfortable to wait in queues, like physically
challenged persons, can use this alternative solution. Since the system operates
on IVR platform the voter session will be interactive and user friendly which
makes the user to feel in a very comfortable zone. The system provides security
features like checking the unique identification number of the voter.
Diffusion of Mobile Commerce Application in the Market
BIBILIOGRAPHY
[1] S.J. Barnes, The mobile commerce value chain: analysis and future developments, International Journal of Information Management 22 (2) (2002) 91– 108.
[2] I. Clarke III, Emerging value propositions for m commerce, Journal of Business Strategies 18 (2) (2001) 133–148.
[3] Ting-Peng Liang, Chih-Ping Wei, Introduction to the Special Issue: Mobile Commerce Applications, International Journal of Electronic Commerce, Vol. 8, No. 3(2004), 7–17.
[4] Senn, J.A.. The emergence of m-commerce, Computer, 33(12) (2000),148-150.
[5] Varshney, U., &Vetter, R.. Mobile commerce: Framework, applications and networking support., Mobile Networks and Applications, 7(3) (2002), 185-198.
[6] Yuan, Y., Zhang, J.J., Towards an appropriate business model for m-commerce, International Journal of Mobile Communications, 1(1/2) (2003), 35-56.
[7] Nysveen, H., P.E. Pedersen, and H. Thorbjornsen, Intentions to Use Mobile Services: Antecedents and Cross Service Comparisons, Journal of the Academy of Marketing Science, 33(3)(2005), 330 346.
Diffusion of Mobile Commerce Application in the Market
[8] Gordon Xu, Jairo A. Gutiérrez, An Exploratory Study of Killer Applications and Critical Success Factors in Mcommerce, Journal of Electronic commerce in Organizations, 4(3)(2006), 63-79.
[9] Dongsong Zhang, Delivery of Personalized and Adaptive Content to Mobile Devices: A Framework and Enabling Technology, Communications of the AIS , 12(2003),183-202.
[10] Karlene Cousins, Upkar Varshney, A product location framework for mobile commerce environment, Proceedings of the 1st international workshop on Mobile commerce, July 2001, Rome, Italy, 43-48.
[11] U. Varshney, Location management for mobile commerce applications in wireless Internet environment, ACM Transactions on Internet Technology, 3 (3) (2003),
236– 255.
[12] U. Varshney, Vehicular Mobile Commerce: Applications, Challenges, and Research Problems, Communications of the Association for Information Systems,16 (2005), 329-339.
[13] A. Herzberg, Payments and banking with mobile personal devices, Communications of the ACM 46 (5) (2003) 53– 58.
[14] Clayton A. Looney, Leonard M. Jessup, and Joseph S. Valacich, Emerging Business Models for Mobile Brokerage Services, Communications of the ACM, 47(6)(2004), 71-77.
Diffusion of Mobile Commerce Application in the Market
[15] Niina Mallat, Matti Rossi, and Virpi Kristiina Tuunainen, Communication of the ACM May 47(5)(2004), 42-46.
[16] Kleijnen, M.H.P., K. de Ruyter, and M.G.M. Wetzels, “Consumer Adoption of Wireless Services: Discovering the rules, While Playing the Game”, Journal of Interactive
Marketing, 18(2)(2004), 51-61.
[17] Pavlos Vlachos, Adam Vrechopoulos, ICEC'04, Sixth International Conference on Electronic Commerce. New York:ACM.2004: 566-574.