Documente Academic
Documente Profesional
Documente Cultură
Dr.Agbo J.Madaki
Lecturer,
Catholic University of Eastern Africa, Kenya
Dr. D. K. Pandey
Director,
Dr. Anindita
Associate Professor,
Jaipuria School of Business, Ghaziabad
Dr. K. Ramani
Associate Professor,
K.S.Rangasamy College of Technology, Namakkal
Dr. S. Satyanarayana
Associate Professor,
KL University , Guntur
Dr. R. Suresh
Assistant Professor,
Mahatma Gandhi University
CONTENTS
Research Papers
PORTFOLIOS OF CONTROL IN BUSINESS PROCESS OUTSOURCING
1 13
14 21
Hetal R. Patel
AN OVERVIEW OF DATA WAREHOUSING AND OLAP OPERATIONS
22 28
29 37
38 40
41 43
Manish Srivastava, Aakanksha Mishra, Ashu Goyal, Anamika Srivastava and Preeti Tomer
DIGITAL SIGNATURE VERIFICATION WITH OTP GENERATION BASED ON HIDDEN
MARKOV MODEL
44 47
48 53
54 58
59 62
63 67
Amanjot Kaur
STUDY OF E -VOTING SYSTEM WITH MULTI SECURITY USING BIOMETRIC
68 75
76 80
BETWEEN
ORGANIZATIONAL
CULTURE
&
81 89
90 98
The transfer of management and execution of one or more complete business processes or entire business
functions to an external service provider (vendor).
Nature of outsourced processes being essentially IT intensive. Such highly transactional, technologyintensive work lends itself easily to business process automation.
The vendor is part of the decision making structure surrounding the outsourced business function.
The client relinquishes control over the outsourced process in favor of monitoring through performance
metrics tied to strategic business value.
In ascending order of value and level of expertise required, bpo can be classified as:
Rule-set processing, in which a worker makes judgments based on rules set by the customer. He might
decide, for example, whether, under an airlines rules, a passenger is allowed an upgrade;
Problem-solving, in which the bpo provider has more discretionfor example, to decide if an insurance
claim should be paid;
Direct customer interaction, in which the bpo provider handles more elaborate transactions with the clients
customers. Collecting delinquent payments from credit-card customers is an example;
Expert knowledge services, which require specialists (with the help of a database). For example, a bpo
provider may predict how credit-card users behavior will change if their credit rating improves.
Figure 1
CONTROL PRACTICES: A SURVEY AND ANALYSIS OF LITERATURE
The issue of control has received considerable attention in organizational literature. Anthonys (1965)
contribution in particular is often referred to and well known for its distinction between strategic planning,
management control and operational control. Child (1984), Eisenhardt (1985), Hofstede (1981) and Ouchi
(1979) determine the context of control in organizations and determine a number of characteristics that lend
themselves to define a typology. On the other hand Boland (1979) and Orlilowski (1991) reveal how control is
applied in the context of information management. Looking at the existing theories, three common dimensions
can be identified according to Fischer (1993) that describe a useful typology for analyzing control: focus of
control (directed at whom or what), measures of control (degree of control), and process of control (means of
enforcing control).
Control in this study is viewed in a behavioral sense, that is, as the organization's attempt to increase the
probability that people will behave in ways that lead to the attainment of organizational goals (Flamholtz et al.,
1985) and thus includes a range of mechanisms to monitor and execute operations. As Tannenbaum (1968)
states it is the function of control to bring about conformance to organizational requirements and achievement
of the ultimate goals of the organization. Taking this broad view allows for an examination of multiple
approaches to control, and avoids problems associated with more narrow perspectives. For example, the
practioner literature typically takes a cybernetic view of control, in which outputs are compared against
standards and corrective actions are taken to address deviations; the PMI Standards Committee (1996) offers
the following definition: the process of comparing actual performance with planned performance, analyzing
variances, evaluating possible alternatives, and taking appropriate corrective action as needed (p.161, emphasis
in original). This cybernetic view assumes that outcomes are known, standards can be set, and corrective action
is possible (Markus and Pfeffer 1983, Merchant and Simons 1986, Jaworski 1988). However, desired outcomes,
standards, and corrective actions are not always obvious in the outsourcing environment, rendering these
assumptions problematic and suggesting the need for a broader interpretation of control (Kirsch 1997).
The behavioral view of control implies that the controller uses certain devices, or control mechanisms, to
promote desired behavior by the controllee (Kirsch 1997). These control mechanisms help implement control
modes, which may broadly be divided into formal controls, i.e., modes that rely on mechanisms that influence
the controllees behavior through performance evaluation and rewards, and informal controls, i.e., modes that
utilize social or people strategies to reduce goal differences between controller and controllee (Eisenhardt 1985;
Kirsch 1996, 1997). Some researchers (e.g., Merchant 1988) view formal and informal controls not as a
dichotomy, but as opposite ends of a continuum. Both formal and informal controls are exercised through
mechanisms used to influence controllee behavior. Examples include target implementation dates (formal
control) and socialization (informal controlKirsch 1997).
Two types of formal controls have been commonly considered in prior literature (e.g., Ouchi 1979, Eisenhardt
1985),behavior control and outcome control. In outcome control, the controller explicitly states desired
outcomes or goals and rewards the controllee for meeting those goals (Kirsch 1997). In behavior control, the
controller seeks to influence the process, or the means to goal achievement, by explicitly prescribing specific
3
* size depicted in terms of employee strength (Emp) and approx. revenues (Rev) in US$ bn.
DATA COLLECTION
Data collected included both qualitative and quantitative types. This synergistic combination had advantages
described by Mintzberg (1979) as: For while systematic data create the foundation for our theories, it is the
anecdotal data that enable us to do the building..We uncover all kinds of relationships in our hard data, but it
is only through the use of this soft data that we are able to explain them. Data collection involved a variety of
techniques including unstructured and semi-structured interviews; documentation; archival records; direct
observations; published sources; physical artifacts such as manuals, forms, and project archives; and follow-up
emails and telephone interviews. The rationale was that the triangulation made possible by multiple data
collection methods provides stronger substantiation of constructs (Yin 1984).
It was critical, during data collection, to identify and elicit information about particular incidents of control.
Consequently, a specific interviewing technique was designed. Recognizing that control is purposive (Green
and Welsh 1988), three common goals of outsourced relationships were identified: (1) maximizing speed in
which things are done from the customers perspective (2) doing things accurately at the first attempt and (3)
optimizing efficiency and the cost per unit incurred by the vendor (ref.: COPC-2000 CSP Standard, June
2005). A series of interview questions focused on mechanisms controllers used in order to meet each of these
three goals.
Other general set of questions sought to uncover additional critical incidents and how they were handled. To
uncover such incidents, respondents were asked to recall events that caused problems for which the
organization had no ready solution, or events that challenged existing norms and solutions , or anything
interpersonal that was unusual or tension provoking and required some kind of response (Schein 1987, p.120).
The interviews of the team/group leaders, operations managers and service delivery leaders/ queue heads
generally lasted between one and two hours. The interview questions, primarily open-ended, were informed by
the literature on control (Kirsch 1997, Rustagi 2004) and designed to elicit data about theoretical constructs of
interest.
DATA ANALYSIS
Data analysis frequently overlapped with data collection. An important means of analysis used by this
researcher was the usage of field notes. Van Maanen (1988) described field notes as an ongoing stream-ofconsciousness commentary about what is happening in the research, involving both observation and analysis.
This overlap also allowed us to take advantage of flexible data collection. Adjustments to the interview protocol
to probe emergent theme to improve resultant theory were thus made. Detailed case study write-ups for each
relationship were made from these field notes as a next step with the overall objective to become intimately
familiar with each case as a stand alone entity and accelerate cross case comparison (eisenhardt 1989).
REACHING CLOSURE
In the subsequent step we tabulated the focus of and typical mechanisms used in the four control modes from
our background literature study on control and then by comparing the description of the observed control
mechanisms in business process outsourcing relationships attempted to classify them into the four control
categories.
ADDRESSING QUALITY OF RESEARCH
During data collection, construct validity and reliability issues were addressed. Construct validity, which is
concerned with establishing that the correct measures are used, can be increased by using multiple sources of
data (Yin 1984). In this research, multiple sources of data were tapped to ensure that responses converged.
Inconsistencies were resolved by consulting control related documentation or other individuals for clarification.
6
A plan for communicating the findings of all transactions monitored to the individuals monitored,
including both negative and positive feedback.
Another usage of this mechanism is identifying (using Pareto analysis) reasons contributing to customer
satisfaction / dissatisfaction at agent, team and process level.
7
Action plans for staff that fail to demonstrate the required skills and knowledge.
Re-verification of skills and knowledge following changes in program, procedures, systems, etc.
Continuous monitoring
Vendor employees who fail transaction monitoring are:
(i) Individually (one-on-one) coached on all transactions that do not meet target.
(ii) Monitored more frequently in order to determine if their performance is statistically below target.
(iii) Advised on corrective actions using a structured approach for identifying and resolving the root
cause(s) of poor performance. This action plan necessarily provides for removing employees who
repeatedly perform fatal errors from handling end-user transactions
5. Financial controls
One or more of these financial controls were observed in our cases embedded in the relationships pricing
structure:
Incentives are given to vendor as a percentage of invoice amount based on volumes handled at prespecified quality levels
A percentage of the savings or revenue improvement based on achieving or exceeding targets is given to
the vendor; this is commonly referred to as gain-share. A variation of this mechanism is the
risk/reward pricing method wherein the provider risks losing money if the agreed-on improvements are
not achieved.
Tying the providers revenue to level of improvement of the performance of the outsourced function
based on business metrics. Commonly, referred to as value pricing or business benefit pricing this
arrangement generally involves changing the customers business processes.
Defining the potential for future business, motivating the provider to maintain a keen performance edge.
A key observation here was the level of automation involved. Almost all the regular reports were automatically
generated and sent to the clients email id by the software tools in the information system.
9. Regular meetings
Both parties to the outsourcing relationship initiated frequent meetings or conference calls to discuss the
performance status, issues and resolutions. Though mostly done following a pre-decided structure and schedule,
impromptu meetings to resolve one-off escalations or incidents were not uncommon. During these meetings
significant feedback was provided to the vendor team regarding their performance.
10. Site visits
Both parties made arrangements for team members at the managerial levels to travel to each others sites not
just for process training or transition but also to engender camaraderie and cooperation. This was considered a
necessity during the initial stage of the relationship and at least annually. As one interviewee observed, I dont
think theres any better measure of the relationship than seeing the <org. name withheld> guy and his peer
sitting side by side at a meeting. You can tell from their body language that they are two members of the same
team. Besides the client outsourcing manager or vendor manager who is often located at the outsourcing site,
other members of the client team responsible for or users of the outcome of the outsourced process also make
regular site visits. Often at these visits, client team members walk around the vendor site to informally gather
first hand information about the tasks, activities, progress and issues in the outsourcing arrangement.
11. Business reviews
In all four cases this was a quarterly incident. While reviews were done at a weekly/ monthly basis at different
hierarchical levels of the client-vendor governance structure a QBR was the high point of the relationship.
Reviewing performance to the required performance targets and plans, discussing anticipated program changes
and communicating business strategies were the objectives of this exercise which saw top management
representation from both sides.
A description from one of the interviewees summed up this control mechanism as: "At our quarterly business
review sessions, we spend an entire day just going through the numbers. In addition, part of the evaluation is
going through an analysis of a healthy relationship -- what's working and what's not working. We are very, very
candid with the executives as well as with the operations people at <org. name withheld> about what our
thoughts and views are, and we invite them to be just as candid back to us."
9
10
(Kirsch 1997)
Behavior
control
Clan control
Promulgating common
values,
beliefs,
and
philosophy within group
of individuals who share
a set of common goals
(Kirsch 1996)
Self control
The
controllee
determines both the goals
and the actions through
which they should be
achieved (Henderson and
Lee 1992)
Business reviews
Financial controls
Process metrics
Process milestones
Ensuring
data
security
Process
work-flow
documentation
Regular meetings
Regular reporting
Site visits
Staff skill control
Staffing
and
scheduling
Task
work-flow
documentation
Transaction
monitoring
(Kirsch 1997)
Business reviews
Free gifts
Regular meetings
Site visits
Special events
Staff skill control
Certifications
Process audits
Shrinkage
management
Staff
performance
management
Staff skill control
Staffing
and
scheduling
Transaction
monitoring
The above table throws up two significant conclusions. One is the multiplicity of mechanisms used to
implement various control modes. Each mode is effected through more than one mechanism. For instance,
business reviews, financial controls, process metrics and process milestones are used to implement outcome
control. Conversely the same mechanism is used to implement more than one mode. Staff skill control defines
acceptable behaviors to be followed by the client, restricts the entry of employees into the relationship and is an
11
12
13
the time between orders or the length of an order cycle (replenishment time)
ASSUMPTIONS
The essence of the assumptions is to make the complexity of the inventory system malleable to mathematical
modeling. The assumptions are selected to give accurate approximation of real life inventory system for
product. The following assumptions are used in developing the model:
(1)
The inventory system under consideration deals with single item. This assumption ensures that a single
item is isolated from other items and thus preventing item interdependencies.
(2)
(3)
The time horizon is infinite and a typical cycle length of T for planning schedule is considered.
(4)
A constant fraction
deterioration.
(5)
(6)
(7)
(8)
Costs involved (such as holding cost, ordering cost etc.) are remaining constant over a period of time.
(9)
Motivated by the on-going research on inventory models for deteriorating items, purpose in this study is to
provide optimal inventory policy for the EOQ model with constant demand and no shortages.
MATHEMATICAL FORMULATIONS
A typical one time-inventory cycle is developed based on following computations:
Let
be the inventory level of the system at
. The inventory level decreases owing to
demand as well as deterioration. Thus, the change of inventory level can be represented by the following
differential equation over the period
where
Now
Where
and
15
In order to calculate economic order quantity, first of all, total cost is computed. For EOQ model of
deteriorating products, following costs are considered:
(1)
Order cost,
(2)
Purchase cost,
(3)
and
to T,
16
To check whether the cost is minimum or not, it is required to take second order differential w.r.to Q which
gives;
From the equation (3.11), it is visible that the second order differential equation gives positive value. Hence,
the equation is minimum at the given point. To determine
equation (3.10) is equating with zero. Hence, one
gets;
NUMERICAL ANALYSIS
To solve different scenarios of assumptions, three examples have been solved to demonstrate the application of
approach. The variable part is the different situations of the deterioration rates ( ). Example 1 is based on
situation consisting
the situation consisting
and
T*=0.737 years
and
T*=0.783 years
and
SENSITIVITY ANALYSIS
Next step is to investigate the effect of changes in parameter values in model such as A, D, P, h, and on
model decision variables such as economic order quantity (Q*) and optimal cycle time (T*). For this, except ,
all the parameter values are kept constant in this model. The sensitivity analysis is performed by changing each
17
PCPV (%)
T*
-75%
376.32
0.476
-50%
483.46
0.593
-25%
560.91
0.674
+25%
677.92
0.789
+50%
726.00
0.840
+75%
769.46
0.876
-75%
264.10
1.120
-50%
404.67
0.912
-25%
520.94
0.806
+25%
718.04
0.687
+50%
805.59
0.649
+75%
888.30
0.618
-75%
1056.25
1.12
-50%
809.15
0.91
-25%
694.6
0.80
+25%
574.43
0.687
+50%
537.14
0.65
+75%
507.63
0.62
-75%
569.81
0.77
-50%
587.95
0.76
-25%
605.96
0.75
+25%
641.71
0.73
+50%
659.36
0.71
+75%
676.80
0.70
Based on the results of Table 5.1, the conclusions are briefly stated as follows:
(1) It is observed from table 5.1 that increase in ordering cost A increasesoptimal quantity Q*. Increase in
ordering cost also increases optimal cycle time T*. The obtained results show thatquantity function is very
sensitive to the ordering cost when decreasing and less sensitive to the ordering cost when it is increasing.
Simply, it is reflective that small negative change in A results into large change in Q*; while small positive
change in A results into not so large change in Q*. For cycle time, it is sensitive to the changes when A
decreases and less sensitive when A increases.
(2) Similarly as D increases, the economic order quantity Q* increases and cycle time T* decreases. When
reducing the demand, the change in Q* is very high showing higher sensitivity while less sensitive when
increasing the value of demand. For cycle time T*, it is sensitive to the changes when D decreases and less
sensitive when D increases.
18
PCPV (%)
T*
-75%
350.46
0.49
-50%
442.51
0.62
-25%
507.31
0.71
+25%
602.75
0.84
+50%
641.13
0.89
+75%
675.46
0.94
-75%
223.50
1.24
-50%
353.35
0.98
-25%
462.00
0.86
+25%
648.00
0.73
+50%
731.19
0.68
+75%
809.96
0.65
-75%
894.00
1.24
-50%
706.64
0.98
-25%
616.25
0.86
+25%
518.50
0.73
+50%
487.60
0.68
+75%
462.88
0.65
-75%
553.53
0.79
-50%
555.43
0.785
-25%
557.24
0.784
+25%
560.87
0.781
+50%
562.68
0.780
+75%
564.49
0.779
Based on the results of Table 5.2, the conclusions are briefly stated as follows:
(1) It is observed from table 5.2 that increases in ordering cost A increases optimal quantity Q*. Increase in
ordering cost also increases optimal cycle time T*. The obtained results show that quantity function is very
sensitive to the ordering cost when decreasing and less sensitive to the ordering cost when it is increasing.
Simply, it is reflective that small negative change in A results into large change in Q*; while Q* is less
sensitive to positive change in A. The pattern is same in case on cycle time function too.
19
PCPV (%)
T*
-75%
347.68
0.50
-50%
438.03
0.63
-25%
501.45
0.72
+25%
594.5
0.85
+50%
631.82
0.90
+75%
665.15
0.95
-75%
219.1
1.25
-50%
347.71
0.99
-25%
455.58
0.867
+25%
640.44
0.73
+50%
723.21
0.688
+75%
801.4
0.65
-75%
876.22
1.25
-50%
695.37
0.99
-25%
607.45
0.867
+25%
512.4
0.73
+50%
482.14
0.688
+75%
457.98
0.65
-75%
551.89
0.7883
-50%
551.89
0.7882
-25%
551.89
0.7881
+25%
551.89
0.7880
+50%
552.00
0.7880
+75%
552.00
0.7880
Based on the results of Table 5.3, the conclusions are briefly stated as follows:
(1) Table 5.3reveals that increases in ordering cost A increases optimal quantity Q*. Increase in ordering cost
also increases optimal cycle time T*. The obtained results show that quantity function is very sensitive to
the ordering cost when decreasing and less sensitive to the ordering cost when it is increasing. Simply, it is
20
Journal of
11. Shah, N.H. and Shukla, K.T. (2009), Deteriorating inventory model for waiting time partial backlogging,
Applied Mathematical Sciences, 3(9): 421-428.
12. Waters, D. (2003),Inventory control and management, John Wiley and Sons Ltd, Replika Press Pvt. Ltd.,
India.
13. Weatherford, L. R. and Bodily, S. E. (1992), A taxonomy and research Overview of Perishable asset
revenue management: yield management, overbooking, and pricing. Operations Research, 40: 831-844.
21
(a) Data Extraction. This function has to deal with numerous data sources. You have to employ the
appropriate technique for each data source. Source data may be from different source machines in
diverse data formats. Part of the source data may be in relational database systems. Some data may be
on other legacy network and hierarchical data models.
(b) Data Transformation. In every system implementation, data conversion is an important function. For
example, when you implement an operational system such as a magazine subscription application, you have to
initially populate your database with data from the prior system records. You may be converting over from a
manual system. Or, you may be moving from a file-oriented system to a modern system supported with
relational database tables.
(c) Data Loading. Two distinct groups of tasks form the data loading function. When you complete the design
and construction of the data warehouse and go live for the first time, you do the initial loading of the data into
the data warehouse storage. The initial load moves large volumes of data using up substantial amounts of time.
As the data warehouse starts functioning, you continue to extract the changes to the source data, transform the
data revisions, and feed the incremental data revisions on an ongoing basis. Figure below in data storage
illustrates the common types of data movements from the staging area to the data warehouse storage.
23
1. Relational OLAP(ROLAP)
2. Multidimensional OLAP (MOLAP)
3. Hybrid OLAP (HOLAP)
4. Specialized SQL Servers
(1)Relational OLAP (ROLAP)
The Relational OLAP servers are placed between relational back-end server and client front-end tools. To store
and manage warehouse data the Relational OLAP use relational or extended-relational DBMS. ROLAP
includes the following .Implementation of aggregation navigation logic .Optimization for each DBMS back end
.Additional tools and services.
(2)Multidimensional OLAP (MOLAP)
Multidimensional OLAP (MOLAP) uses the array-based multidimensional storage engines for
multidimensional views of data. With multidimensional data stores, the storage utilization may be low if the
data set is sparse. Therefore many MOLAP Server uses the two level of data storage representation to handle
dense and sparse data sets.
(3)Hybrid OLAP (HOLAP)
The hybrid OLAP technique combination of ROLAP and MOLAP both. It has both the higher scalability of
ROLAP and faster computation of MOLAP. HOLAP server allows storing the large data volumes of detail data.
The aggregations are stored separated in MOLAP store.
(4)Specialized SQL Servers
Specialized SQL servers provides advanced query language and query processing support for SQL queries over
star and snowflake schemas in a read-only environment.
OLAP OPERATIONS
As we know that the OLAP server is based on the multidimensional view of data hence we will discuss the
OLAP operations in multidimensional data. Here is the list of OLAP operations.
1. ROLL-UP
This operation performs aggregation on a data cube in any of the following way:
By climbing up a concept hierarchy for a dimension By dimension reduction.Consider the following diagram
showing the roll-up operation.
25
REFERENCE
1. Data Warehousing Fundamentals: A Comprehensive Guide for IT Professionals. Paulraj PonniahCopyright
2001 John Wiley & Sons, Inc.ISBNs: 0-471-41254-6 (Hardback); 0-471-22162-7 (Electronic)
2. About tutorialspoint.com
28
Formant parameters might provide a means to tackle the problem of a mismatch between training and
testing conditions .
There is a close relation of formant parameters to model- based approaches to speech perception and
production .
A variety of approaches such as formant tracking [2,7,8], articulatory model [1,4 ] and auditory model have
been explored for the analysis and synthesis of speech and thereby developing strategies for speaker
independent speech recognition during the last few decades . The formant tracking method based on Linear
Predictive Code (LPC) has received considerable attention . Studies on formant estimation for speech
recognition have been done by several workers [ 1,3,6,9 ]. The formant model used in this section to
determine the formant frequencies is as proposed by Welling et al and avoids the above mentioned problems .
Based on digitized resonator technique , the entire frequency range is divided into a fixed number of
segments , each segment representing a formant frequency .
2. FORMANT EQUATION
A predictor polynomial, defined as the Fourier transform of the corresponding second order predictor, is given
by .
Ak (e jw ) 1 k e jw k e j 2 w
(1)
where k and k are the real valued prediction coefficients. From (1), we get
| Ak (e jw ) | 2 1 k2 k2 2 k (1 k ) cos 2 k cos(2 )
2 (1 k ) 2
(1 k )
(1 k ) k
4 k cos k
4 k
4 k
The parameter k
jw
2
k
(2)
defined as negative logarithm of
4 k
(3)
(4)
29
1 k
(5)
2
k
We denote the beginning point and the end point of segment k by k 1 and k respectively. Using (4.4) ,
the predictor error can be written as
E( k 1 , k , k ) = ( 1 + k 2 + k 2 ) rk (0) 2 k ( 1 - k ) rk (1) 2 k rk (2) .. (6)
With the autocorrelation coefficients rk (v) of segment k for v = 0, 1, 2
rk (v) = r
( k 1
, k ) (v) = (1/ )
S(e j ) cos(v )d
(7)
k 1
By minimizing the prediction error as given by (6) with respect to k and k , we obtain the following
optimum prediction coefficients:
opt
k
opt
k
rk
(0) 2 r k (1) 2
( 0 ) ( 2 ) (1)
r k r2k r k 2
rk (0) rk (1)
E (
min
k
k 1 ,
k / k , k )
opt
r k ( 0) k
rk (1)
opt
k
( 2)
(8)
30
31
Fig 1(a) : Formant frequency characteristics of Assamese vowels corresponding to male informants
/a/
/aa/
20
50
1000
2000
/e/
3000
50
0
-50
1000
2000
/ea/
3000
4000
50
0
-50
1000
2000
/o/
3000
-50
4000
4000
-20
-50
4000
1000
2000
/eai/
3000
4000
1000
2000
/ou/
3000
4000
4000
0
-50
4000
3000
50
2000
/u/
20
1000
50
50
-50
-20
Fig 1(b) : Formant frequency characteristics of Assamese vowels corresponding to female informants
The range of variation of first three formant frequencies , F1, F2 and F3 of eight Assamese vowels
corresponding to male and female informants, are given in Tab.1.
Table 1 : Range of variation of formant frequencies of eight Assamese vowels
Vowels
F1(KHz)
F2(KHz)
F3(KHz)
Male
Female
Male
Female
Male
Female
/a/
0.72 1.1
0.61 1.2
1.2 1.6
0.911.5
2.02.68
2.613.2
/aa/
/e/
(0.28)
(0.59)
(0.4)
(0.59)
(0.68)
(0.59)
0.71.1
0.180.9
1.31.75
0.91.79
2.23.15
1.01.7
(0.4)
(0.72)
(0.45)
(0.89)
(0.95)
(0.7)
0.171.1
0.30.91
2.12.62
0.511.3
2.183.3
2.03.21
32
/u/
/ea/
/eai/
/o/
/ou/
(0.93)
(0.61)
(0.52)
(0.79)
(1.12)
(1.21)
0.171.2
0.31.42
0.721.3
0.61.5
2.22.8
0.91.76
(1.03)
(1.12)
(0.58)
(0.9)
(0.6)
(0.86)
0.31.6
0.20.9
1.82.45
0.451.6
2.53.6
2.13.2
(1.3)
(0.7)
(0.65)
(1.15)
(1.1)
(1.1)
0.41.21
0.31.23
0.71.5
0.451.8
2.22.8
1.11.58
(0.81)
(0.93)
(0.8)
(1.35)
(0.6)
(0.48)
0.310.6
0.520.9
0.71.32
1.11.7
1.72.41
3.13.65
(0.29)
(0.38)
(0.62)
(0.6)
(0.71)
(0.55)
0.30.6
0.51.0
0.671.4
0.91.52
1.782.4
3.03.36
(0.3)
(0.5)
(0.73)
(0.62)
(0.62)
(0.36)
(ii)
(iii)
Speech is nonlinear phenomenon . The information provided by the cepstral measures of vowel recognition
through LPC (linear predictive coding) analysis is not enough to ascertain the degree of non-linearity present in
the pronunciation of vowels. The fitting of polynomial, using matrix method, is a faster method to study the
non-linearity of the vowels. In the present study, the analysis & synthesis of Assamese vowels are made
studying their cepstral features and formant characteristics through Linear Predictive Coding (LPC).
To study the degree of non-linearity, the formant frequencies are subjected to fit a polynomial of degree p, as
described by equation ( 9)
Y=b0+b1x+b2x2+ . + bpxp
(.9)
where b0, b1, b2 . bp are coefficients to be determined with the help of the following matrix method.
33
Thus, the equation for the representation of the formant frequency and amplitude is non-linear with the degree
of non-linearity being three.
Similarly, the degree of non-linearity of formant frequency and cepstral coefficient can be obtained using the
same set of matrix equations.
Table 2 : Range of variation of the coefficients b0, b1, b2, b3, b4 of the polynomial fitting for formant
frequencies of Assamese vowels corresponding to male informants.
Vowels
/a/
/aa/
/e/
/eai/
/ea/
/o/
/u/
/ou/
b0
0.649<b0<2.328
1.10<b0<6.526
-2.689<b0<-1.804
-2.529<b0<-1.955
-1.542<b0<1.133
2.675<b0<2.566
1.083<b0<2.075
-1.870<b0<2.233
b1
-3.819<b1<-0.825
-11.625<b1<1.392
1.497<b1<4.350
2.682<b1<4.074
-1.868<b1<2.711
-4.866<b1<-0.294
-3.592<b1<-1.745
-3.801<b1<2.698
Coefficients
b2
0.460<b2<2.242
0.694<b2<6.841
-1.902<b2<-0.274
-1.759<b2<-0.658
-1.080<b2<1.088
0.236<b2<2.984
0.245<b2<2.103
-0.683<b2<2.236
b3
-0.453<b3<-0.035
-1.408<b3<-0.177
0.029<b3<0.418
0.061<b3<0.388
-0.188<b3<0.247
-0.619<b3<-0.017
-0.424<b3<-0.081
-0.452<b3<0.065
b4
-0.0062<b4<0.031
0.0002<b4<0.096
-0.031<b4<-0.0004
-0.029<b4<0.0002
-0.019<b4<0.011
-0.0002<b4<0.043
-0.002<b4<0.029
-0.0004<b4<0.031
Table 3 : Range of variation of the coefficients b0, b1, b2, b3, b4 of the polynomial fitting for formant
frequencies of Assamese vowels corresponding to female informants.
Vowels
Coefficients
b0
b1
b2
b3
b4
/a/
0.345<b0<1.075 -1.282<b1<-0.211 0.170<b2<0.649 -0.057<b3<0.012 -0.004<b4<-0.006
/aa/
0.416<b0<1.100 -1.184<b1<-0.259 0.333<b2<1.035 -0.244<b3<-0.059 0.004<b4<0.019
/e/
-1.920<b0<-1.608 2.225<b1<2.689 -0.665<b2<0.495 0.042<b3<0.056 0.0006<b4<0.0008
/eai/
-4.116<b0<1.344 -3.001<b1<2.621 -0.598<b2<2.307 -0.477<b3<0.040 0.002<b4<0.031
/ea/
-4.117<b0<-2.705 4.889<b1<6.509 -2.652<b2<-2.161 0.444<b3<0.498 -0.031<b4<0.033
/o/
-1.016<b0<0.483 -0.801<b1<2.014 -1.089<b2<0.519 -0.046<b3<0.295 -0.025<b4<-0.0004
/u/
1.583<b0<2.500 -4.287<b1<-2.816 1.840<b2<2.549 -0.526<b3<0.402 0.030<b4<0.038
/ou/
1.895<b0<2.000 -3.377<b1<-3.193 1.936<b2<2.037 -0.414<b3<0.392 0.026<b4<0.029
34
Fig. 1 (c) : Sequential position of Assamese Vowels as per pitch magnitude variation(Male)
Fig. 1 (d) : Sequential position of Assamese Vowels as per pitch magnitude variation(Male)
Fig. 1 (e) : Sequential position of Assamese Vowels as per pitch magnitude variation(Male)
35
Fig. 1 (f) : Sequential position of Assamese Vowels as per pitch magnitude variation(Female)
Fig.1 (g) : Sequential position of Assamese Vowels as per pitch magnitude variation(Female)
Fig. 1(h) : Sequential position of Assamese Vowels as per pitch magnitude variation(Female)
36
37
The Important Information Is IMSI, Which is Stored on the Removal Sim Card.
Use encrypted card to interpret details as result a cloned cell phone is ready for replica.
Steal their Cell Phone pair as it is being anonymously registered with a cell site.
A device called DDI, Digital Data Interface Can Be Used to Get Pairs.
Stolen ESN and MIN were then fed into a New CDMA Handset.
PATAGONIA SOFTWARE
Patagonia is software available in the market which is used to clone CDMA phone. Using this software a cloner
can take over the control of a CDMA phone i.e. cloning of phone. A SIM can be cloned again and again and
38
The network sees the same phone in several places at the same time.
Velocity trap:- The mobile seems to be moving at impossible or most unlikely speed...
RF Radio Frequency: -Normally identical Radio Equipment has a distinguishing fingerprint, so the network
software stores and compares fingerprint for the entire phone that it sees.
Call Counting: - Both the phone and the network keep track of calls made with the phone, and should the
differ more than the usually allowed one call, service is Denied.
Pin Codes: - Prior to placing a call, the caller unlock the phone by entering a pin code and then calls as usual.
CELL PHONE CLONING SYMPTOMS
MEASURES TO BE TAKEN
This includes:
PIN: -User Verification Using Personal Identification Number (PIN) codes are one method for
customer Protection against Cellular Phone Fraud.
Blocking :-Blocking is used by Service provider to Protect themselves from high risk Callers.
ADVANTAGES
1. If your phone has been lost , you can use your cloned cell phone.
2. If your phone got damaged or if you forgot your phone at home or any other place . Cloned phone can
be helpful.
39
40
To elucidate the role of CTAB, optical data are in accord with what others have observed for metallic nanorods
for transverse and longitudinal plasmon bands.[21,22] In the absence of CTAB, spheroid nanorods (aspect ratio
<2.5) were unstable and reverted to spheres (as judged by the disappearance of the long-wavelength absorption
band) within 10 min. In the absence of seed, silver ion reduction by ascorbic acid in the presence of CTAB
yielded only a few rods, which varied in aspect ratio. Thus, both CTAB and silver seed are necessary for the
fruitful results in the high yield formation of the Ag nanorods.
The electronic absorption spectra of silver nanorod solutions show the conventional 400 nm peak observed for
spherical silver nanoparticles and another peak at longer wavelengths, due to the longitudinal plasmon band of
rod-shaped particles.[23] Decreasing the amount of seed in the nanorod preparation led to a further red shift of
longer-wavelength longitudinal plasmon bands in the nanorod products, implying that the silver rods increased
in average aspect ratio as the seed concentration decreased. Fig 2 shows that 50 nm rods produced at 382 nm
absorption and 100 nm rods produced at 425 nm absorption spectra.
For different Ag seeds concentrations, the surface area decreased with increasing Ag seed concentration, but
there was no clear correlation between surface area, Ag seed concentration, and catalytic performance. Table 1
lists for various Ag seed concentrations, the best performing catalyst that gave the highest yield of
formaldehyde.
Table 1: Effect of Ag seed concentrations on Formaldehyde yield (%) at 120 C
Ag seed concentration in catalyst soln.(ml)
Formaldehyde, yield (%)
0.125
76
0.25
79
0.5
83
1
88
2
72
42
43
Student
1, 2
ABSTRACT
Nowadays user authentication is done by providing a user name and password in most cases and signature in
banking sector. But this system is very easy and simple to crack, by trying out different passwords randomly. To
eliminate these threats a secure way of authenticating the user is proposed in this paper. We collect users
signature initially and train the system with the captured signature using Hidden Markov Model. This signature
is then verified by the system whenever the user tries to login. Also after the verification of signature, OTP is
generated which has six digit combination of words and numeric. The first three digits are generated by the
server itself and the remaining three digits are typed-in by the user. The signature can be obtained using either
mouse or digital pen which reduces cost of implementation.
Key words: Client, Sever, Feature construction, Hidden markov model, Behavior Capture, OTP verification.
INRODUCTION
Handwritten signature is the most usual method by which a person declares that they accept and take
responsibility for a signed document. This method is extensively used by contemporary society and has a solid
legal basis accepted by the international community as a personal authentication method. However, handwritten
signature has certain disadvantages, which have hindered its widespread use as biometric modality. The main
challenge currently faced by researchers is that samples taken from the same individual have a large variability
in their shapes and over time. Besides, forgery signatures carried out by impostors exhibit a small interclass
variation, which makes their identification as intrusive users more difficult. However, an interesting advantage
is that the acquisition process can be readily performed by electronic devices such as pen tablets, touch screens
or PDAs. [4]These devices offer not only the possibility of capturing the stroke of the signature (spatial
information represented by the horizontal and vertical pen position), but also other measurable characteristics
such as pen pressure or pen angle versus time. The main objective of the project is to provide an effective and
secure way of authenticating user to applications such as banking and other online sectors and services. There
are three main phases by which the users signature is captured, stored and compared whenever the user login to
the system. The application by which the signature is obtained is developed using java. After the initial
registration phase, the system is trained with the users signature for twenty times after which an account
number and a pin number will be generated. After this phase, when the user tries to login to the system, he/she
will be asked to input the signature which will be verified with the stored signature during the earlier phase. If
that matches then OTP is generated and the user is authenticated to access the data.
CLIENT
Client is the first module where the user is the actual client who is going to use the system to access data. In this
module we are implementing the Client interface by which the Client can interact with the Application. To
access the Application, the Client has to the register their details with Application Server. They have to provide
their information like Name, Address, Date Of birth, Mobile Number and etc. This information will be stored in
the database of the Application Server. The User is allowed to the access the application only by their provided
Interface. This module is also the user registration phase or the enrolment phase where the basic information of
user is registered in the database, which is the server. Fig 1 shows the information which are filled in by the
user or client at the time of registration.
47
Index Terms: Mobile Ad hoc Networks (MANETs), certificate revocation, cluster, security.
INTRODUCTION
A decentralized category of wireless network which is built spontaneously as devices connect is called as ad
hoc networks. In wired networks, routers are component of a controllable and fixed infrastructure. This is not
the case in ad hoc networks where nodes should act as both routers and communication end points. Mobile ad
hoc network (MANET) is an infrastructure less network of mobile devices connected by wireless. In the recent
years, MANETs have drawn much attention due to their dynamic topology, ease of deployment, self organized
and mobility features. A mobile ad hoc network does not rely on fixed infrastructure. A mobile node or mobile
device can freely move in the network, it is an internet connected device whose location and point of attachment
to the network may frequently changed. Mobile nodes can be laptops, cell phones and personal digital assistants
(PDA).
In addition to above mentioned features, mobile ad hoc network utilizes multihop relaying by which nodes
coordinate and forward packets through one or more intermediate when there is no direct communication
between source and destination nodes. The nodes in this type of network act as both end users and routers,
which receive and pass on packets for other nodes. One more feature of MANETs, open network environment
where nodes can join and leave the network without any restrictions [1]. A mobile ad hoc network is more
liable than wired networks due to dynamic topology, scalability and no centralized management. Threats can
come either from external attackers or compromised nodes inside the network [2]. Hence, each node has to be
authenticated by providing a certificate after validating its individuality.
In general, the certificate is provided by means of centralized certificate authority to all the nodes joining the
network. Instead if the responsibility of the authority is decentralized, this may be better suitable for mobile ad
hoc networks. If the certificate is forged or any other misbehaviour is carried out, the nodes cant communicate
further. And importantly the routing protocol to be used for routing should be effective in determining
successful routing paths and message delivery because it is challenging where there is a fluctuation in the
topology. Always hierarchical routing is preferred compared to flat routing when scalability is taken into
account. Here hierarchical routing is made achievable by organizing nodes into clusters. All the clusters have a
distinct representative (head) to perform inter cluster communication.
The remainder of this paper is organized as follows: section 2 focuses on related works, describes the different
approaches used to provide security and section 3 focuses on problem definition. In section 4 implementation
details are described, section 5 focuses on performance analysis.
RELATED WORKS
A. UBIQUITOUS AND ROBUST ACCESS CONTROL
The procedure of URSA access control emphasizes multiple node unity and fully localized instantiation [3].
That is multiple node cooperate to monitor a nodes behaviour, which is in one or two hop away and decide
whether the node is misbehaving or well-behaving. Each and every node which joins the mobile ad hoc network
which is protected by URSA should have valid certificate.
A new node joining the network will have a certificate from a combination of existing nodes, after its
authenticity been verified. Other way is new nodes are given a trial certificate, allowed to forward packets (that
node can forward other nodes packet by acting as intermediate but it is not allowed to deliver its own packet)
48
Low communication overhead: No need to exchange messages i.e., voting information between
each and every node in the network.
Very fast removal: No delays while waiting for votes or threshold to be met.
Single node detection: Only one honest node has to detect misbehaviour to initiate revocation.
Even though this strategy reduces revocation time and communication overhead, this does not take into account
of differentiating falsely accused node from malicious attackers. As an outcome, the accuracy is degraded.
49
PROBLEM DEFINITION
As deliberated above, the advantages and disadvantages of the schemes are compared. Actually in the existing
scheme a centralized certificate authority has been used. The authority provides certificates for all nodes via
cluster heads of the respective cluster. When a packet has to be forwarded, initially the validation should be
done by authority to verify nodes authenticity. This happens every time whenever a transmission takes place.
This affects the effectiveness of cluster communication.
In this paper, the responsibility of the certificate authority is split and given to all cluster heads of respective
clusters. So, the validation is done by the cluster head for the members of that particular cluster alone. This
results in effective cluster communication among the nodes. And also a distributed and scalable protocol is used
to enhance the effectiveness of the scheme.
IMPLEMENTATION
This section describes about cluster formation, certificate authoritys function and about warning list and black
list.
4.1 CLUSTER FORMATION
In the network, the mobile nodes are organized to form clusters. Each cluster has a Cluster Head (CH) and
remaining nodes of the cluster are the Cluster Members (CMs), which lie within the transmittal range of that
particular CH. The CH is elected based on the energy among the nodes which is higher in the same transmittal
area. To verify the availability of
links among nodes in the network is done by periodical broadcast of HELLO message. That is if a node
receives a new hello message then it is known that a new link is available. Within a particular time period, if no
hello messages are received from the neighbouring nodes. Then link is considered as disconnected. In this
scheme, the node which has maximum energy at that particular time will be elected as the cluster head.
The CH will generate CH hello packet to intimate the neighbouring nodes about its presence at a regular
interval. The nodes which lie in the transmittal range of CH will accept the hello packet, if it wishes to
participate in that cluster. In response the neighbouring nodes will send CM hello packet to confirm the link
establishment. The importance of CH is to interact with all the nodes of its respective cluster and also performs
inter cluster communication. Appropriate CH can reduce energy utilization and can upgrade the network
lifetime. One CH per cluster must be chosen during selection process because multiple CH within same cluster
will result in routing issues [9].
After a random amount of time, the energy level of the CH may decrease. So the CH election takes place again
to elect the node with higher energy. Suppose two nodes have same energy level, the node which is having
maximum neighbours will be elected as CH. The new CH will collect all the information related to the cluster
from old CH. And regarding new CH election will be intimated to authority.
50
PERFORMANCE ANALYSIS
The simulation results are shown in the form of line graph. First the performance of AODV and CBRP is
evaluated under TCP traffic pattern. The graph (Fig.2) shows comparison of two protocols based on Packet
Delivery Ratio (PDR) for different number of nodes.
.
Fig. 5 Time vs. residual energy at CHs
By making the authoritys responsibility from centralized to decentralized, the revocation time is reduced. The
figure 6 shows the revocation time for the existing and proposed scheme. That is to prevent the malicious
activity exhibited from malicious nodes; the certificate has to be revoked as soon as possible.
52
REFERENCES
1. Wei liu, Hiroki nishiyama, Nirwan ansari, Jie yang, Nei kato, Cluster-based certificate revocation with
vindication capability for mobile ad hoc networks, IEEE transactions on parallel and distributed systems,
Feb2013.
2. L.Zhou and Z.J.Haas, Securing ad hoc networks, IEEE Network Magazine, vol. 6, pp. 24-30, 1999.
3. H.Luo, J.Kong, P.Zerfos, S.Lu and L.Zhang,URSA: ubiquitous and robust access control for mobile ad
hoc networks, IEEE/ACM Transaction on Networking, vol. 12, pp. 1049-1063, 2004.
4. G.Arboit, C.Crepeau, C.R.Davis and M.Maheswaran, A localized certificate revocation scheme for mobile
ad hoc networks, Ad hoc network, vol. 6, pp.17-31, 2008.
5. J.Clulow and T.Moore, Suicide for the common good: A new strategy for credential revocation in selforganizing systems, ACMSIGOPS Operating systems reviews, vol. 40, pp.18-21, 2006.
6. K.Park, H.Nishiyama, N.Ansari and N.Kato, Certificate revocation to cope with false accusations in
mobile ad hoc networks, in proc. 2010 IEEE 71st vehicular technology conference: VTC2010-spring,
2010.
7. W. Liu, H. Nishiyama, N. Ansari, and N. Kato, A study on certificate revocation in mobile ad hoc
network, in IEEE International Conference 2011, Kyoto, Japan, Jun. 2011.
8. www.secs.oakland.edu/~shu/research.htm accessed on 10.3.14
9. Khalid hussain et al., Cluster head selection scheme for WSN and MANET: A Survey in world applied
science journal 23(5): 611-620, 2013.
10. B.Kannhavong et al.,A survey of routing attacks in MANET,IEEE wireless communication magazine, pp.
85-91, 2007.
53
1. LOCATION REPRESENTATION
Location is a position in a physical space and it can be represented in absolute, relative or symbolic
form.
2. GENERAL PRINCIPLES
The four principles for use in a ubiquitous computing (ubicomp) environment:
a)Notice: Given a ubicomp environment where it is often difficult for data subjects to realize that data
collection is actually taking place, we will not only need mechanisms to declare collection practices
(i.e., privacy policies), but also efficient ways to communicate these to the user (i.e., policy
announcement).
b) Choice and consent: In order to give users a true choice, we need to provide a selection mechanism (i.e.,
privacy agreements) so that users can indicate which services they prefer.
c) Proximity and locality: The system should support mechanisms to encode and use locality information for
collected data that can enforce access restrictions based on the location of the person wanting to use the data.
d) Access and recourse: Our system needs to provide a way for users to access their personal information in a
simple way through standardized interfaces (i.e., data access). Users should be informed about the usage of their
data once it is stored, similar to call-lists that are often part of monthly phone bills (i.e., usage logs).
57
1. Ubiquitous Computing Fundamentals / edited by John Krumm. Visit the Taylor & Francis web site
at http://www.taylorandfrancis.com.
2. Location Privacy in ubiquitous computing,
http://www.cl.cam.ac.uk/TechReports/.
by
Alastair
R.
Beresford,
visit
at
58
They are used in sending encrypted messages, Digital signatures, https protocol uses
cryptography extensively, this protocol helps you send passwords, credit card information etc
without a third party being able to see them.
Its used to scramble data so that only certain people who know how to decode it.
You could apply this if you wanted to sent someone a note but not let the people who transport
the note to be able to read it.
Its used a lot today to send and receive messages securely [8].
Figure 3. A Quantum Cryptographic communication system for securely transferring random key
61
Simple to use.
CONCLUSION
For the first time in history, the security of cryptography does not depend any more on the computing resources
of the adversary, nor does it depend on mathematical progress. Quantum cryptography allows exchanging
encryption keys, whose secrecy is future-proof and guaranteed by the laws of quantum physics. Its combination
with conventional secret-key cryptographic algorithms allows raising the confidentiality of data transmissions
to an unprecedented level. Quantum cryptography allows reaching unprecedented levels of security guaranteed
by quantum physics for data transmissions over optical networks.
Recognizing this fact, the MIT Technology Review and Newsweek magazine identified in 2003 quantum
cryptography as one of the - ten technologies that will change the world [7].
REFERENCE
1. Rishi Dutt Sharma Computer science department Ambedkar Institute of Technology G.G.S.I.P.U, NEW
DELHI rishi.abes@gmail.comk security.
2. Thi Mai Trang Nguyen, Mohamed Ali Sfaxi and Solange Ghernaouti-Hlie University of Lausanne, HECINFORGE, CH-1015 Lausanne, Switzerland Email: trnguyen@ieee.org, {mohamedali.sfaxi,
sgh}@unil.chussed.
3. Mohamed Elboukhari1, Mostafa Azizi2 and Abdelmalek Azizi1,3 1dept. Mathematics & Computer
Science, FSO, University Mohamed Ist, Morocco 2 dept. Applied Engineering, ESTO, University
Mohamed Ist, Oujda,Morocco elboukharimohamed@gmail.com , azizi.mos@gmail.com 3Academy
Hassan II of Sciences & Technology, Rabat, Morocco abdelmalekazizi@yahoo.fr .
4. Richard J. Hughes D. M. Alde, P. Dyer, G. G. Luther, G. L. Morgan and M. Schauer University of
California Physics Division Los Alamos National Laboratory Los Alamos, NM 87545
5. http://www.whitec0de.com/quantum-cryptography/
6. http://masonstudent4444.blogspot.in/2011/10/quantum-cryptography-advantages-and.html
7. M. Indra Sena Reddy1, K. Subba Reddy2, M. Purushotham Reddy3, P.J. Bhat4, Rajeev5 1,2Dept. Of CSE,
RGMCET, India. 3Dept. of CSE, VBIT, India. 4,5ISRO Satellite centre, Bangalore, India.
mir555mittapalli@gmail.com
8. https://answers.yahoo.com/question/index?qid=20080317203915AASbfHb
62
Automated reasoning to use the stored information to answer questions and to draw new conclusions;
63
Machine learning to adapt to new circumstances and to detect and extrapolate patterns.
Turing's test deliberately avoided direct physical interaction between the interrogator and the computer, because
physical simulation of a person is unnecessary for intelligence. However, the so called total Turing Test
includes a video signal so that the interrogator can test the subject's perceptual abilities, as well as the
opportunity for the interrogator to pass physical objects ``through the hatch.'' To pass the total Turing Test, the
computer will need
Computer vision to perceive objects, and
Within AI, there has not been a big effort to try to pass the Turing test. The issue of acting like a human comes
up primarily when AI programs have to interact with people, as when an expert system explains how it came to
its diagnosis, or a natural language processing system has a dialogue with a user. These programs must behave
according to certain normal conventions of human interaction in order to make themselves understood. The
underlying representation and reasoning in such a system may or may not be based on a human model.
Reasoning
Learning
Solving problems
Robotic
Weak AI: deals with the creation of some form of computer-based artificial intelligence that cannot truly
reason and solve problems, but can act as if it were intelligent. Weak AI holds that suitably programmed
machines can simulate human cognition.
Applied AI: aims to produce commercially viable "smart" systems such as, for example, a security system
that is able to recognize the faces of people who are permitted to enter a particular building. Applied AI has
already enjoyed considerable success.
Cognitive AI: computers are used to test theories about how the human mind works--for example, theories
about how we recognize faces and other objects, or about how we solve abstract problems.
In Robotics, we have been able to make vehicles that are mostly autonomous.
In Natural language processing, we have systems that are capable of simple machine translation.
Todays Expert systems can carry out medical diagnosis in a narrow domain
Speech understanding systems are capable of recognizing several thousand words continuous speech
Planning and scheduling systems had been employed in scheduling experiments with the Hubble Telescope.
The Learning systems are capable of doing text categorization into about a 1000 topics
In Games, AI systems can play at the Grand Master level in chess (world champion), checkers, etc.
67
68
The first stage is the data acquisition stage in which a fingerprint image is obtained from an individual by using
a sensor. The next stage is the pre-processing stage in which the input fingerprint is processed with some
standard image processing algorithms for noise removal and smoothening. The pre-processed fingerprint image
is then enhanced using specifically designed enhancement algorithms which exploit the periodic and directional
nature of the ridges. The enhanced image is then used to extract salient features in the feature extraction stage.
Finally, the extracted features are used for matching in the matching stage [2].
Electronic Voting: The term electronic voting and also known as e-voting is a term inclusive of many systems
and methods of voting. This includes booths equipped with electronic devices, software, peripherals, processing
systems, equipment, tools and screens, networks and means of communication, etc., [2].
Vote Counting and Collation of Results: While voting is in progress, the software would tally each candidates
votes as and when an eligible voter selects the candidate by clicking or touching the passport size photograph,
Name of the candidate or the logo if applicable. The percentage of vote cast by each candidate is calculated and
their respective positions determined as soon as polls closes. [2]
SYSTEM IMPLEMENTATION & DISCUSSION
This proposed framework has been successfully simulated on Arduino 1.0.3 platform. The steps involved in the
implementation of the proposed secure electronic voting system are highlighted from Figure 3 to Figure 12.[3]
69
and necessary corrections are made. In addition, new ellectors are added. Fingerprints must be scanned while
the electors are registered. Otherwise, registration of the electors can not be done. Electors are registered by
using elector defining screen as shown in Figure 4. While defining electors, all of the information about the
electors must be recorded. If the information is not recorded properly, registration of the electors can not be
done. Electors see the fingerprint defining screen on the recording phase which comes after recording of the
information as shown in Figure 5. Fingerprint defining result screen comes in front of the elector during the
scanning and defining phase of the fingerprint. Electors are registered to the related region. By this way, elector
can vote only in the region where he is registered. The election is started for voting by system administrator just
after the elector defining procedure is finished. Only one election is started in the system at the same time.
Thus, the errors with the system are prevented.
73
on the screen. Purpose of this application is identification control by system administrator. Elector can vote by
pressing on the elector voting button just after authentication. Elector can vote clicking on the YES button of
the party that he/she chooses on the e-voting screen as shown in Figure 6. After voting, a message appears on
the screen and voting procedure is completed for the elector. Election results of any region or regions in any
time are observed by the system administrator. These operations can be done on election results part of system
administrator window as shown in Figure 7.
CONCLUSION
Electronic voting system is emerging as significant alternative to the conventional systems in the delivery of
reliable and trusted elections. In this paper, a framework for electronic voting system based on fingerprint
74
75
Superposition State
In classical computers, electrical signals such as voltages represent the 0 and 1 states as one-bit information.
Two bits indicate four states 00, 01, 10, and 11, and n bits can represent 2n states. In the quantum computer, a
quantum bit called qubit, which is a two-state system, represents the one-bit information. For instance,
instead of an electrical signal in classical computers, an electron can be used as a qubit. The spin-up and spindown of an electron represent two states: 0 and 1, respectively. A photon can also be used as a qubit, and the
horizontal and vertical polarization of a photon can be used to represent both states. Using qubits, quantum
computers can perform arithmetic and logical operations as does a classical computer. The important difference,
however, is that one qubit can also represent the superposition of 0 and 1 states.
Bits vs. qubits
A quantum computer with a given number of qubits is fundamentally different from a classical computer
composed of the same number of classical bits. For example, to represent the state of an n-qubit system on a
classical computer would require the storage of 2n complex coefficients. Although this fact may seem to
indicate that qubits can hold exponentially more information than their classical counterparts, care must be
taken not to overlook the fact that the qubits are only in a probabilistic superposition of all of their states. This
means that when the final state of the qubits is measured, they will only be found in one of the possible
configurations they were in before measurement. Moreover, it is incorrect to think of the qubits as only being in
one particular state before measurement since the fact that they were in a superposition of states before the
measurement was made directly affects the possible outcomes of the computation.
Qubits are made up of controlled particles and the means of control (e.g. devices that trap particles and switch
them from one state to another).
For example: Consider first a classical computer that operates on a three-bit register. The state of the computer
at any time is a probability distribution over the different three-bit strings 000, 001, 010, 011, 100, 101, 110,
111. If it is a deterministic computer, then it is in exactly one of these states with probability 1. However, if it is
a probabilistic computer, then there is a possibility of it being in any one of a number of different states. We can
describe this probabilistic state by eight nonnegative numbers A,B,C,D,E,F,G,H (where A = probability
computer is in state 000, B = probability computer is in state 001, etc.). There is a restriction that these
probabilities sum to 1.
The state of a three-qubit quantum computer is similarly described by an eight-dimensional vector
(a,b,c,d,e,f,g,h), called a ket. Here, however, the coefficients can have complex values, and it is the sum of the
squares of the coefficients' magnitudes, that must equal to 1. These square magnitudes represent the probability
amplitudes of given states. However, because a complex number encodes not just a magnitude but also a
direction in the complex plane, the phase difference between any two coefficients (states) represents a
meaningful parameter. This is a fundamental difference between quantum computing and probabilistic classical
computing.
HISTORY OF QUANTUM COMPUTERS
In 1982 R.Feynman presented an interesting idea how the quantum system can be used for computation reasons.
He also gave an explanation how effects of quantum physics could be simulated by such quantum computer.
This was very interesting idea which can be used for future research of quantum effects. Every experiment
investigating the effects and laws of quantum physics is complicated and expensive. Quantum computer would
be a system performing such experiments permanently. Later in 1985, it was proved that a quantum computer
would be much more powerful than a classical one.
LANGUAGES AND QUANTUM COMPUTATION
The quantum computation model, has been through, and still exists in, many forms. Classical computation
models such as the Turing machine, Lambda calculus, and circuit representation have all been extended to
encompass quantum information. Currently, the most efficient forms of representation of quantum algorithms
77
5. Quantum Computers & Moore's Law. Retrieved on December 1 , 2002 from: http://www.qubyte.com
st
Codes.
Retrieved
on
November
31 ,
2002
7. Manay, K. (1998). Quantum computers could be a billion times faster than Pentium III. USA Today.
st
80
2
] pq
2
n
( N 1) 2 [ z ] 2 p q
2
N [Z
According to the mentioned formulation, the sample volume was 165 persons.
DATA COLLECTION TOOLS
a) Library information including any study and considering domestic & foreign books and magazines and
browsing in data bases (internet) and also benefitting from experiences of other researchers in order to fin
theoretical basics of research
b) Benefiting from the questionnaire as the major tools of data collection for finding out the considered data
We used two separated questionnaires in this research. The first one is related to organizational culture and
submitted by the use of presented model by Quinn et al. (1999) and prepared by Half Stud in the form of 23
close questions. The second one is related to measuring any cooperation through suggestions system.
The results of further studies of research theories: First indirect theory: There is a meaningful relation between
goal determination of organization and suggestions system. By applying relevant test method with insurance
level of %95, we had Sig=0.001. Since we have Sig<0.05, therefore we reject zero theory and accept the
opposite one. It means a meaningful relation between goal determination of organization and suggestions
system. As a result the first indirect theory is confirmed with insurance level of %95.
The results of further studies of research theories: Second indirect theory: There is a meaningful relation
between the function criterion and suggestions system. By applying relevant test method with insurance level of
%95, we had Sig=0.000. Since we have Sig<0.05, therefore we reject zero theory and accept the opposite one. It
means a meaningful relation between function criterion and suggestions system. As a result the first indirect
theory is confirmed with insurance level of %95.
The results of further studies of research theories: Third indirect theory: There is a meaningful relation between
the following up method and suggestions system. By applying relevant test method with insurance level of
%95, we had Sig=0.000. Since we have Sig<0.05, therefore we reject zero theory and accept the opposite one. It
means a meaningful relation between following up method and suggestions system. As a result the first indirect
theory is confirmed with insurance level of %95.
The results of further studies of research theories: Fourth indirect theory: There is a meaningful relation
between power source and suggestions system. By applying relevant test method with insurance level of %95,
we had Sig=0.000. Since we have Sig<0.05, therefore we reject zero theory and accept the opposite one. It
means a meaningful relation between power source and suggestions system. As a result the first indirect theory
is confirmed with insurance level of %95.
The results of further studies of research theories: Fifth indirect theory: There is a meaningful relation between
decision making and suggestions system. By applying relevant test method with insurance level of %95, we had
Sig=0.000. Since we have Sig<0.05, therefore we reject zero theory and accept the opposite one. It means a
meaningful relation between decision making and suggestions system. As a result the first indirect theory is
confirmed with insurance level of %95.
The results of further studies of research theories: Sixth indirect theory: There is a meaningful relation between
motivation and suggestions system. By applying relevant test method with insurance level of %95, we had
Sig=0.000. Since we have Sig<0.05, therefore we reject zero theory and accept the opposite one. It means a
meaningful relation between motivation and suggestions system. As a result the first indirect theory is
confirmed with insurance level of %95.
85
0.667
0.00
165
165
0.667
1.000
0.00
165
165
Combination coefficient
Organizational culture Sign
Combination coefficient
Suggestions system Sign
86
Qty Average
Criteria deviation
44
2.69221
0.5652
0.0852
38
3.6388
0.6374
0.1034
40
2.3159
0.5423
0.0857
43
3.5159
0.4234
0.0645
Theory test
Suggestions system has a non-suitable situation at different areas.
Suggestions system has a suitable situation at different areas (Table 3).
Area
Test value=3
Statistics
of t test
Freedom
degree
Meaningful
level
df
Sig
Average
difference
High level
-3.613
43
0.999
-0.3078
-0.4797
-0.1360
6.177
37
0.000
0.6387
0.4292
0.8483
-7.978
39
-0.6840
-0.8575
-0.5106
7.988
42
0.000
0.5158
0.3855
0.6462
We have Sig<0.05 at areas 2 & 4, therefore H0 theory was rejected and the opposite theory accepted
accordingly. Therefore suggestions system has a suitable situation in these areas. We have Sig>0.05 at areas 1
&3, therefore it is possible to accept theory H0. Therefore suggestions system has a suitable situation in these
areas.
CONCLUSIONS & PROPOSALS
Regarding a direct relation between organizational culture and suggestions system, it is expected to have a
tendency towards ideological culture and agreed/cooperative culture in the organization which may make a
serious situation and enriching the proposals. Therefore, in order to have a tendency to these cultures, it is
recommended to:
1. Reject any direct supervision on personnel and make them free for any further works.
2. Provide and establish different work groups and teams.
3. Set aside enough time for leading and training of your personnel rather than group behavior with them.
4. Providing special attention to all of them and assisting for developing their abilities and skills.
5. Establish suitable evaluation system for assisting the personnel find their real rights and situation.
6. Rather to pay attention to the necessities of higher levels, it is necessary to consider all materialistic needs of
personnel.
7. Write job promotion programs (guidelines) and tries to assign the positions in accordance with their
priorities.
87
Armstrong Michele (2006) Function management. Translated by Saeid Safari & Amir Vahabian, Tehran,
Iran.
3.
Azar Adel and Momeni Mansour (2006) Statistics & its application in management. 2nd edition, Samt
public Tehran, Iran.
4.
5.
Counts Harold (2003) Principles of management. Translated by Mohammad Hadi Chamran, Tehran, Iran.
6.
Efjeh Seyed Ali Akbar (2006) Philosophical principles & Leadership theories & Organizational behavior.
Samt public. Tehran, Iran.
7.
Greiling Dorothea (2006) Performance measurement, a remedy for increasing the efficiency of public
services. Protestant Univ. Appl. Sci. Darmstadt, Germany.
8.
Gupta BM (2010) Ranking and performance of Indian Universities based on publication and citation data.
Indian. J. Sci. Technol. 3, 837-843.
9.
Hofstede G (2001) Cultures consequences. Comparing values, behaviors. Instt. Organiz. Across Nations.
Beverly Hills, CA. Sage.
10.
Hosseini Seyed Yaghoub (2004) Nonparametric statistics. Res. method & 10 SPSS Statistical software,
1st edition, Tehran, Iran.
11.
Khaki Gholamreza (2007) Research method with an attitude of Thesis Writing. Baztab public. Tehran,
Iran.
12.
Kluwer (2001) Decision Making, Social and Creative Dimensions. Acad. Publ., Springer.
13.
Mir Sepasi Nasser (2001) A report of jobs circulation seminar: Job satisfaction & organizational
effectiveness. Tadbir Monthly Magaz. 4, 232-239.
14.
Moghimi Seyed Mohammad (2001) Organization & research attitude management", 2nd edition, Termeh
Publ. Tehran, Iran.
15.
Moghimi Seyed Mohammad (2006) Suggestions system in governmental organizations from theory up to
practice. Publ. of Cult. Ser. Asso. Iranians in abroad, Tehran, Iran.
88
Pizam Abraham (1978) Some correlates of innovation within industrial suggestion systems. Personnel
Psychol. 27, 63-76.
17.
Quinn Robert E and Cameron Kim S (1999) Diagnosing and changing organizational culture. NY.
Addison-Wesley.
18.
Ramezani Jalal (2005) Participation Management with focusing on Suggestions System. Payam Publ.
Tehran, Iran.
19.
Rezaeian Ali (2006) Basics of Organization & Management. Samt Publ. Tehran, Iran.
20.
Shahin Arash (2003) Submission a continuous betterment model for suggestions system. 4th natl. conf. in
Suggestions Sys. Faculty of Managt. Tehran University, Tehran, Iran.
21.
Sokaran Ouma (2007) Research methods in management. Higher Edu. Res. Institute in Managt &
Planning, Iran.
22.
Suggestions System Message Bulletin (2005) Differentiates between suggestions system & ideas/
criticisms fund. Refah Bank. l3, 321-328.
23.
Tabibi Seyed Jamal (2005) Strategic programming. Ministry of Health & Therapeutic Publication.
Tehran, Iran.
24.
89
The bankruptcy of a bank raises social costs, which does not happen in the case of other kinds of entities
collapse; this affects the behavior of other banks and regulators;
Regulations and measures of safety net substantially change the behavior of owners, managers and
customers of the banks; rules can be counterproductive, leading to undesirable behavior management (take
increased risk) which expose well-being of stakeholders of the bank (in particular the depositors and
owners);
Between the bank and its clients there are fiduciary relationships raising additional relationships and agency
costs;
Problem principal-agent is more complex in banks, among others due to the asymmetry of information not
only between owners and managers, but also between owners, borrowers, depositors, managers and
supervisors;
90
The number of parties with a stake in an institutions activity complicates the governance of financial
institutions.
To sum up, depositors, shareholders and regulators are concerned with the robustness of corporate governance
mechanisms. The added regulatory dimension makes the analysis of corporate governance of opaque banking
firms more complex than in non-financial firms (Wilson, Casu, Girardone, Molyneux, 2010). The below figure
summarizes the key players in the corporate governance framework for banks:
In the case of banks therefore, corporate governance needs to be perceived as a need of such conduct of an
institution, which would force the management to protect the best interests of all stakeholders and ensure
responsible behavior and attitudes (Tirole, 2001). Accountability, fairness, transparency and independence are
the four objectives of corporate governance.
WHY BANKS CORPORATE GOVERNANCE
In the banking sector corporate governance is therefore a way of business and affairs of the bank by the
management and the board, affecting how they (Drs. Alberto G. Romero; 2003):
Small bank size and weak bank performance in the 1990s, in particular, contributed to heavy government
intervention and regulations that shattered public confidence in banks in the early 1990s (Elhiraika, 1998). The
Central Bank usually imposed detailed requirements for lending, dividing the economy into priority sectors and
sub-sectors for which the banks were required to extend credit. Lending to agriculture was a priority, other
sectors were less of a priority and some were prohibited from bank financing. The Central Bank prescribed
different prices for credit depending on priority status and geographical allocation. Large loans had to be
approved by the Central Bank. Credits to public enterprises were extended directly by the BOS.
According to Kireyev (2001), prior to the reform program initiated in 1997, banking supervision was lax, no
unified accounting system existed, and the banks accumulated large portfolios of non-performing loans. By the
mid 1990s, the Sudanese financial system was characterized by its bulky, large and unmanageable regulatory
system of cumbersome guidelines for credit allocation, centralized lending by the central bank to public
enterprises, an absence of indirect monetary policy instruments, fixed and negative real rates of return, an
inadequate accounting system, detailed minimum and maximum limits of lending to individual sectors,
restrictions on financing trade in individual commodities, restrictions on inter-bank transactions, prior approval
for large loans and geographical allocation of credit. These constraints on banks were exercised at a time of
high inflation, which reached 133% in 1996.
In 1997, with the first IMF Staff Monitored Program, the CBOS gradually dismantled restrictions and
liberalized the financial system. Thus, in 1998 the BOS initiated open market operations using indirect Shariah based instruments that included the central bank and government Musharaka certificates (CMCs, and
GMCs respectively). The GMCs are issued against the value of the governments and CBOSs shares in
commercial banks; the GMCs are issued against the assessed value of government share in a number of selected
companies. The CBOS took a number of steps to liberalize the financial sector and help to curtail inflation
(Kireyev, 2001).
A number of measures were introduced to improve bank supervision, increase compliance with capital
adequacy requirements, and reduce the high level of non-performing loans (from 18% of total loans in 19981999 to 12% in 2003). In addition, the CBOS revised the weighted assets risk scales for some Islamic modes of
finance, such as Salam and purchasing of goods by banks for commercial purposes to better reflect the specific
risk facing banks.
This period also witness some restructuring of the financial sector through mergers and liquidation of stateowned and private sector banks. For example, Unity Bank and the National Bank for Exports and Imports
merged into the Bank of Khartoum Group, while the Sudanese Industrial Bank merged with Elnelien Bank to
form Elnelien Bank for Industrial Development. Meanwhile, the Middle East Bank and the Internal and
International Trade Bank were liquidated. The Central Bank banned the establishment of new commercial
banks during this period. However, following the signing of the peace agreement, many new banks and other
financial institutions are expected to begin in both the South and the North.
PROBLEM STATEMENT
In the wake of recent corporate scandals and the restructuring attempts of countries throughout the world to
rebuild their economies from recent financial crises, much international attention has been given to
understanding the causes and dynamics of financial crises. Yet there is an increasing recognition around the
globe of the critical importance of good corporate governance mechanisms in safeguarding financial stability
.This paper focuses to answer the following questions:
Does corporate governance matters for financial system stability and economic growth?
Is poor corporate governance is the main reason for the recent financial crises?
What are the different rules and regulations that were set by the banking sector (Sudanese banks) to
avoid such crises in the future?
Emphasis on the role that corporate governance plays in the financial system and wider economy i.e.
why it is important for economic growth and financial stability.
To note the destabilizing impact of weak corporate governance structures on the soundness of the
financial system.
Determine the role that corporate governance plays for economic growth and financial system stability.
Study carefully the link between corporate governance and the financial crisis.
Identify the different rules and regulations that were set by the banking sector to avoid such crises in the
future.
HYPOTHESIS
All countries will have a stable financial system and continuous economic growth, if a proper corporate
governance framework is implemented throughout banks.
Good corporate governance practices which are linked with prudential regulation and supervision will
enable banks to avoid any financial crisis in the future.
TARGET POPULATION
The targeted population of this study is the financial institutions.
MATERIALS AND METHODS
This study is based on analytical and qualitative methods.
DATA COLLECTION
Two types of data sources can be integrated; secondary data and primary data. Secondary data is used to gain
initial insight into the research problem; it is required in the preliminary stages of research to determine what is
known already and what new data is required. Primary data is data that did not exist before. It is designed to
answer specific questions of interest of the researcher. In this study information was obtained through the
collection of secondary. Secondary data was obtained from the internet, text books, news and journals.
This study is based on discussions and analysis of the collected data by focusing on corporate governance
practices in Sudanese banking sector and its link to financial system stability and economic growth taking in to
account if its one of the main reasons for the recent financial crises.
DISCUSSION
This paper will spotlight on the concept of corporate governance in Sudanese banking sector, in terms of;
Its practices in the banking sector and how it matters for financial system stability and economic growth.
Its link to the recent financial crisis in addition to the different rules and regulations that were set to avoid
such a problem in the future.
94
Regulatory
Governance
Public Sector
Governance
However, banks must always maintain a strong corporate governance framework in order to avoid any
instability in the financial system. Actually, this was not the case when the world faced the financial crisis in
2008.
CORPORATE GOVERNANCE AND 2008 FINANCIAL CRISIS
Many scientists tried to find out the link between corporate governance and financial crisis and they mentioned
the following:
Cross-border capital flows have become one of the key engines of growth in many developing economies. They
allow a country to finance profitable investment projects, which would otherwise not be possible given the
scarcity of financial resources. When there is a sudden crisis of confidence, however, large reversals can occur
and, as evidenced by the East Asian Crisis of 1997/98, these reversals are usually accompanied by tremendous
economic pain.
Steve Hanke, 2003, advances lack of transparency on the part of central banks as one of the reasons financial
crises can occur so suddenly. He chides central bankers for their lack of transparency as it relates to the
presentation of their financial statements. He contends that these statements, if made available on a timely basis
and transparent manner, could go along way towards preventing financial crises, since this would allow one to
identify the mark-to-market risk and market disequilibria and thus prevent sudden reversals. Central bank
financial statements become even more important, he argues, in pegged exchange rate regimes: as a crisis
approaches in these systems (reflected by continuous large outflows of foreign reserves), instead of tightening,
the central bank tries to compensate for the loss in reserves by expanding its net domestic assets to maintain
domestic liquidity. Eventually the reserves are depleted and one is faced with a more severe financial crisis than
would have occurred had the market been properly informed of the state of affairs in the country through the
central banks balance sheets.
95
Senior management
Compensation policy
An extension of these documents is guidelines for the internal audit function in banks (BCBS, 2011, December)
that formulate 20 rules relating to the following issues: supervisory expectations relative to the internal audit
function, a function for internal audit of the institution of the supervisory board, the supervisory assessment of
the internal audit function.
In addition to that, the central bank of Sudan continually set different rules and regulations to be followed by
banks. It has set the following banking supervision, in order to ensure an effective corporate governance
framework is implemented throughout banks:
Adhering to the standards of supervision issued by the Basel Committee and the Islamic Financial
Services Board.
Tightening banking supervision to achieve financial soundness of banks, raise their financial efficiency
and handle inadequacy and shortcoming, for the purpose of ensuring the rights of depositors and securing
best investment and utilization of resources.
Persisting in reinforcing and developing the role of internal supervision in the bank and non-bank
financial institutions, through activating the role of the boards of directors and strengthening the internal
control, audit and compliance officers systems.
Activating the adherence of banks and non-bank financial institutions to the regulations and directives of
the Central Bank of Sudan.
Enhancing and activating desk and prudential supervision mechanisms of the Central Bank.
96
Activating adherence to the Sharia regulations in the banking transactions and encouraging the banks to
use Islamic financing modes without concentration on the Murabaha mode.
Activating the banking supervision units in branches of the Central Bank of Sudan in the States.
Persevering in applying the transparency and financial disclosure standards to the banks and non-bank
financial institutions which are subject to supervision of the Central Bank.
Continuating in raising the competencies of the employees of the banking system in coordination with the
related entities.
Activating the supervisory role over the non-bank financial institutions and the micro finance institutions.
Activating the relations with the supervisory bodies in the countries to which we are tied by economic
and financial relations.
Continuating the strengthening and activation of the internal control and risk systems and directorates of
the banks in the light of acceptable practices and international standards.
Continuing in activating the supervisory measures with respect to adherence to the requirements of
combating money laundering and terrorism financing in coordination with the related bodies.
Continuing in tackling the problem of insolvent debts and striving to bring down its percentage to the
internationally acceptable levels (6%).
Continuing the activation of the mechanisms of work systems devaluation in the banks.
CONCLUSION/RECOMMENDATIONS
Corporate governance is very important for the banking sector so as to maintain financial system stability and to
enhance economic growth. This paper has introduced such an issue by mentioning corporate governance
practices in Sudanese banking sector and how it matters for financial system stability and economic growth.
Also it has clarified the link between corporate governance and the recent financial crisis. At the end, in order
to implement a good corporate governance practices and to avoid any similar crisis in the future the following
recommendations are portrayed;
Central bank of Sudan must continuously monitor the performance of banks to ensure their compliance with
corporate governance regulations.
Banks must recognize the importance of good corporate governance practices and its link to maintain a
sound financial system.
Bank directors should have the obligation to monitor lending practices, to see that bank policies are
enforced, and to ensure that lending practices remain within the institutions overall management ability.
The corporate governance framework should ensure that timely and accurate disclosure is made on all
material matters regarding the financial situation performance, ownership, and governance of the bank. and
The responsibility of external and internal auditors should be stronger and they should be obliged to report
any observed non-compliance to supervisors; the auditors should be subject to mandatory rotation and
should be banned from performing services for one client of other services beyond the audit of financial
statements.
REFERENCES
Adam B. Elhiraika and Khalid Abu Ismail, Working Paper 0411 , Financial sector policy and poverty
reduction in Sudan, ww.erf.org.eg/CMS/uploads/pdf/0411_final.pdf.
Dr
Alan
Bollard,
2003,
Corporate
governance
in
the
http://www.rbnz.govt.nz/research_and_publications/speeches/2003/0132484.html
Avinash Persaud ,Steve Hanke ,2003,The Link Between Corporate Governance And Financial Crisis,
www.centralbank.org.bb/Publications/CGC_Final.pdf
Benjamin A.I. Espiritu, Ph.D.,2005, The Effects of Corporate Governance Regulations on the Practices of
Directors
of
Banks:
A
Philippine
Experience,
www.dlsu.edu.ph/research/centers/cberd/.../corporate_governance.pdf
97
financial
sector,
Dr.
Gomathi
Viswanathan,
2008,
Corporate
http://EzineArticles.com/?expert=Dr._Gomathi_Viswanathan.
M. Umer Chapra and Habib Ahmed, 2002, Corporate Governance in Islamic Financial Institutions,
www.irtipms.org/PubText/93.pdf.
Medani M. Ahmed,2010, Global Financial Crisis Discussion Series Paper 19: Sudan Phase 21,
www.atdforum.org/IMG/pdf_ODI_Report.pdf
Monika
Marcinkowska,
2012,
Corporate
Governance
In
andRemedies,is.muni.cz/do/econ/.../fai/.../FAI_issue2012_02_Marcinkowska.pdf.
Dr. Nasser Saidi, 2007, Corporate Governance in the Banking Sector: Issues and Challenges,
www.difc.ae/corporate-governance-banking-sector-issues-and-challenges.
Ross Levine,2004, The Corporate Governance of Banks:A Concise Discussion of Concepts and Evidence,
https://www.econbiz.de/.../the-corporate-governance-of-banks-a-concise-discussion-of-concepts-andevidence.../10002419340
Sandy Mavrommati,2006, Corporate Gover nance Challenges Aff ecting Financial Stability,
www.chasecambria.com/site/journal/article.php?id=186
Stijn Claessens ,Foreword by Sir Adrian Cadbury,2003 ,Corporate Governance and Development, Global
Corporate Governance Forum Focus1,www.ifc.org/.../Focus_1_Corp_Governance_and_Development.pdf.
The Central Bank Of Barbados and The Barbados Institute Of Banking and Finance At Sherbourne
Conference Centre, Barbados, 2003,Corporate Governance in The Financial Sector,
www.centralbank.org.bb/Publications/CGC_Final.pdf
Governance
In
Indian
Banks:
Banks,
Problems
98
MANUSCRIPT SUBMISSION
GUIDELINES FOR CONTRIBUTORS
1. Manuscripts should be submitted preferably through email and the research article / paper
should preferably not exceed 8 10 pages in all.
2. Book review must contain the name of the author and the book reviewed, the place of
publication and publisher, date of publication, number of pages and price.
3. Manuscripts should be typed in 12 font-size, Times New Roman, single spaced with 1
margin on a standard A4 size paper. Manuscripts should be organized in the following
order: title, name(s) of author(s) and his/her (their) complete affiliation(s) including zip
code(s), Abstract (not exceeding 350 words), Introduction, Main body of paper,
Conclusion and References.
4. The title of the paper should be in capital letters, bold, size 16 and centered at the top of
the first page. The author(s) and affiliations(s) should be centered, bold, size 14 and
single-spaced, beginning from the second line below the title.
First Author Name1, Second Author Name2, Third Author Name3
1Author Designation, Department, Organization, City, email id
2Author Designation, Department, Organization, City, email id
3Author Designation, Department, Organization, City, email id
5. The abstract should summarize the context, content and conclusions of the paper in less
than 350 words in 12 points italic Times New Roman. The abstract should have about five
key words in alphabetical order separated by comma of 12 points italic Times New Roman.
6. Figures and tables should be centered, separately numbered, self explained. Please note
that table titles must be above the table and sources of data should be mentioned below the
table. The authors should ensure that tables and figures are referred to from the main text.
EXAMPLES OF REFERENCES
All references must be arranged first alphabetically and then it may be further sorted
chronologically also.
Single author journal article:
Fox, S. (1984). Empowerment as a catalyst for change: an example for the food industry.
Supply Chain Management, 2(3), 2933.
Bateson, C. D.,(2006), Doing Business after the Fall: The Virtue of Moral Hypocrisy,
Journal of Business Ethics, 66: 321 335
Multiple author journal article:
Khan, M. R., Islam, A. F. M. M., & Das, D. (1886). A Factor Analytic Study on the Validity
of a Union Commitment Scale. Journal of Applied Psychology, 12(1), 129-136.
Liu, W.B, Wongcha A, & Peng, K.C. (2012), Adopting Super-Efficiency And Tobit Model
On Analyzing the Efficiency of Teachers Colleges In Thailand, International Journal on
New Trends In Education and Their Implications, Vol.3.3, 108 114.
Text Book:
Simchi-Levi, D., Kaminsky, P., & Simchi-Levi, E. (2007). Designing and Managing the
Supply Chain: Concepts, Strategies and Case Studies (3rd ed.). New York: McGraw-Hill.
S. Neelamegham," Marketing in India, Cases and Reading, Vikas Publishing House Pvt. Ltd,
III Edition, 2000.
Edited book having one editor:
Raine, A. (Ed.). (2006). Crime and schizophrenia: Causes and cures. New York: Nova
Science.
Edited book having more than one editor:
Greenspan, E. L., & Rosenberg, M. (Eds.). (2009). Martins annual criminal code:Student
edition 2010. Aurora, ON: Canada Law Book.
Chapter in edited book having one editor:
Bessley, M., & Wilson, P. (1984). Public policy and small firms in Britain. In Levicki, C.
(Ed.), Small Business Theory and Policy (pp. 111126). London: Croom Helm.
Chapter in edited book having more than one editor:
Young, M. E., & Wasserman, E. A. (2005). Theories of learning. In K. Lamberts, & R. L.
Goldstone (Eds.), Handbook of cognition (pp. 161-182). Thousand Oaks, CA: Sage.
Electronic sources should include the URL of the website at which they may be found,
as shown:
Sillick, T. J., & Schutte, N. S. (2006). Emotional intelligence and self-esteem mediate between
perceived early parental love and adult happiness. E-Journal of Applied Psychology, 2(2), 3848. Retrieved from http://ojs.lib.swin.edu.au/index.php/ejap
Unpublished dissertation/ paper:
Uddin, K. (2000). A Study of Corporate Governance in a Developing Country: A Case of
Bangladesh (Unpublished Dissertation). Lingnan University, Hong Kong.
Article in newspaper:
Yunus, M. (2005, March 23). Micro Credit and Poverty Alleviation in Bangladesh. The
Bangladesh Observer, p. 9.
Article in magazine:
Holloway, M. (2005, August 6). When extinct isn't. Scientific American, 293, 22-23.
Website of any institution:
Central Bank of India (2005). Income Recognition Norms Definition of NPA. Retrieved
August 10, 2005, from http://www.centralbankofindia.co.in/ home/index1.htm, viewed on
7. The submission implies that the work has not been published earlier elsewhere and is not
under consideration to be published anywhere else if selected for publication in the journal
of Indian Academicians and Researchers Association.
8. Decision of the Editorial Board regarding selection/rejection of the articles will be final.
PUBLICATION FEE
The International Journal of Research in Science and Technology is an online open access
journals, which provides free instant, worldwide and barrier-free access to the full-text of all
published manuscripts to all interested readers in the best interests of the research community.
Open access allows the research community to view, any manuscript without a subscription,
enabling far greater distribution of an author's work than the traditional subscription based
publishing model. The review and publication fee of a manuscript is paid from an author's
research budget, or by their supporting institutions.
As costs are involved in every stage of the publication process, like manuscript handling form
submission to publication, peer-review, copy-editing, typesetting, tagging and indexing of
articles, Electronic composition and production, hosting the final article on dedicated servers,
electronic archiving, server and website update and maintenance and administrative overheads,
each author is asked to pay certain fee as follows.
The publication fee for the Online journal is Rs 1000. If the author wants a printed
copy of the journal, then additional Rs.500/- have to be pay (which includes printing
charges of the journal, hard copy of publication certificate for all authors, packaging
and courier charges ).
The publication fee for the Online journal is Rs $50. If the author wants a printed copy
of the journal, then additional $50 have to be pay (which includes printing charges of
the journal, hard copy of publication certificate for all authors, packaging and courier
charges ).
The principal author will get one complimentary copy of journal ( online / print ) based on fee
paid along with publication certificate ( e copy / hard copy) after publication of the paper.
The publication fee, you can direct deposit / online transfer in favour of IARA at HDFC bank
( IFS code : HDFC0001474, SWIFT code / BIC Code : HDFCINBBCAL, HDFC Bank,
Nezone Plaza, Near Sohum Shoppe, Christian Basti, G. S. Road, Guwahati, Assam,
India) Current Account no 50200006808986
If anybody do not have funds to pay publication fee, he/she will have an opportunity to request
the Editor for fee waiver through the Head of his/her Institution/Department/University with
the reasons, because IARA does not want fee to prevent the publication of worthy work,
however fee waivers is granted on a case-to-case basis to authors who lack funds. To apply for
a waiver author/s must request during the submission process. Any request received thereafter
will not be considered.