Documente Academic
Documente Profesional
Documente Cultură
An Optimal Solution to the Linear Programming Problem using Lingo Solver: A Case Study of an
Apparel Production Plant of Sri Lanka ................................................................................................. 1
Z. A. M. S. Juman and W. B. Daundasekara
BER Analysis of BPSK and QAM Modulation Schemes using RS Encoding over Rayleigh Fading Channel
.................................................................................................................................................................... 37
Faisal Rasheed Lone and Sanjay Sharma
Harnessing Mobile Technology (MT) to Enhancy the Sustainable Livelihood of Rural Women in
Zimbabwe: Case of Mobile Money Transfer (MMT) ................................................................................ 46
Samuel Musungwini, Tinashe Gwendolyn Zhou, Munyaradzi Zhou, Caroline Ruvinga and Raviro Gumbo
Design and Evaluation of a Comprehensive e-Learning System using the Tools on Web 2.0 ................ 58
Maria Dominic, Anthony Philomenraj and Sagayaraj Francis
Critical Success Factors for the Adoption of School Administration and Management System in South
African Schools ............................................................................................................................... 74
Mokwena Nicolas Sello
Efficient and Trust Based Black Hole Attack Detection and Prevention in WSN ................................... 93
Ganesh R. Pathak, Suhas H. Patil and Jyoti S. Tryambake
Design and Analysis of Concurrency Control Mechanism Using Modified SCC-2S Algorithm in Mobile
Environment ............................................................................................................................................ 104
Nyo Nyo Yee and Hninn Aye Thant
Optimized Buffer Control Mechanism for Wireless LAN Mesh Networks ............................................ 118
Lakshmi Rani, Rutuja Shah, Varsha Anandani and Prof. S. S. Manivannan
Presentation of Fuzzy Model to Compute the Edge Betweenness Centrality in Social Networks ....... 130
Noushin Saed, Mehdi Sadeghzadeh and Mohammad Hussein Yektaie
IJCSBI.ORG
ABSTRACT
Operations Research (OR) is often concerned with determining the maximum of profit,
performance, yield etc. or minimum of cost, loss, risk, etc. of some real-world objectives.
The Linear Programming Problem (LPP), a branch of Operations Research consists of an
objective function which is linear and constraints are linear equations or inequalities. This
research paper presents a Mathematical Model of a LPP which is to minimize the
production cost, while satisfying operational limitations, of a production plant producing t-
shirts. This production plant is known as Silk Line (pvt) Ltd which is located in Sri Lanka.
The developed model is considered to be a large scale one which provides a fully functional
cost effective system finding optimum number of machine operators and workers in each of
the departments in the production plant as well as finding optimum raw material for the
entire t-shirts production. The optimal solution to the model is found using the commercial
software package called LINGO SOLVER. Moreover, a sensitivity analysis is
performed to complete the target (entire t-shirts production) within a given specific period
of time.
Keywords
Linear Programming Problem, Optimum number of machine operators, Lingo Solver,
Sensitivity analysis.
1. INTRODUCTION
Linear programming is an optimization technique which was developed
during the Second World War. An LPP consists of an objective function
which is linear and constraints are linear equations or inequalities. Objective
function and constraints are formed using the decision variables which are
defined according to the given problem. Decision variables are continuous
to be real valued variables which may have lower or upper bounds.
IJCSBI.ORG
Objective function is to be maximized or minimized subject to the
constraints which form a convex feasible region. An LPP can be solved
using an iterative algorithm known as the Simplex Algorithm which was
developed by Dantzig in 1950s. This is the most the widely used and
accepted algorithm to solve LPPs because of its simplicity. The optimal
solution of the objective function may be bounded or unbounded whereas
optimal solution to the decision variables may or may not be unique.
Linear Programming has a broader area of applications in the fields of
productions, telecommunications, transportations, scheduling etc. The main
focus of linear programming is to optimize the available resources in the
best possible manner while achieving the objective.
This research paper is focusing on optimizing production cost of a t-shirts
production plant which is located in Sri Lanka. Although the plants
monthly target is 30,000 t-shirts, the records show that the target level has
not been reached in a regular basis. Also, it can be observed that the plants
operational costs are mainly due to workers monthly payments which are
more than what is needed. Due to low productivity and unnecessary
expenditures, at present the plant is facing major financial difficulties and
several other problems in designing the production process. Therefore, the
management is interested in implementing a cost effective system to reduce
the production cost while improving the production efficiency of t-shirts. In
fact, in this research paper, a large scale linear programming model is
developed to achieve these objectives. Then LINGO SOLVER is used to
solve the developed large scale model.
2. LITERATURE REVIEW
Linear Programming problem and its solution have been studied by many
authors. Few of them are James and Tom [5], Brain [1], Dantzig [2] and
Taha [13]. A number of computer software is available in obtaining the
solutions to LPP. Some are based on the simplex method and its variants,
e.g. CPLEX, LINDO, TORA, MATLAB, EXCEL SOLVER, AMPL and
LINGO, and some are based on the interior point algorithms, e.g. MOSEX.
See Fourer [3]. Though the software based on simplex method and its
variants have been used widely in solving linear programming problems,
they solve LPP in exponential time. An algorithm that solves LPP in
IJCSBI.ORG
polynomial time is considered to be efficient. A first attempt of solving LPP
in polynomial time was the development of interior point algorithm by
Karmarkar [8]. How to solve a large scale LPP by interior point method
under MATLAB environment was proposed by Zhang [15]. The existing
interior point algorithms have some drawbacks such as extensive calculation
requirements, large number of iterations and large computer space
requirements. See Terlaky and Boggs [14].In addition, Hitchcock [4] was
first to develop the transportation model. After that, the transportation
problem, a special class of linear programming problem has been studied by
many researchers. Sharma and Sharma [12] presented the transportation
problem in a slightly different form in getting a dual problem which has a
special structure. Then they proposed a new solution procedure to solve the
dual of the incapacitated transportation problem. Sharma and Prasad [11]
presented a heuristic that provides a very good initial solution to the
transportation problem in polynomial time. Schrenk et al. [10] analyzed
degeneracy characterizations for two classical problems: the transportation
paradox in linear transportation problems and the pure constant fixed charge
(there is no variable cost and the fixed charge is the same on all routes)
transportation problems. A new result on complexity of the pure constant
fixed charge transportation problem has been proved. Liu [9] investigated
the transportation problem when the demands and supplies were varying
within their respective ranges. Following these variations the minimal total
cost were also varied within an interval. So, he built a pair of mathematical
programs where at least one of the supply or the demand was varying, to
compute the lower and the upper bounds of the total transportation cost.
Then the Lingo solver was used to solve the both mathematical programs to
attain the lower and the upper bounds of the minimal total transportation
costs. Juman and Hoque [7] demonstrated the deficiency of Lius [9]
method in getting an upper bound of the minimal total costs of
transportation. Then they extended this Lius model to include the inventory
costs of the product during transportation and at destinations, as they are
interrelated factors. In addition, they developed two new efficient heuristic
solution techniques - Algorithms 1 & 2 to find the upper and the lower
minimal total cost bounds respectively. By comparative studies of the
solution techniques on the solutions of small size numerical problems, it is
observed that our proposed heuristic technique (Algorithm1) performs the
same or significantly better in finding the upper bound of the minimal total
cost as compared with Lius [9] approach. Algorithm 2 provided the same
lower bound of the minimal total costs to each of the numerical problems
studied as the one found by Lius [9] approach. Moreover, numerical studies
demonstrated that the inclusion of inventory costs during transportation and
at destinations with the transportation costs changes the lower and the upper
minimal total cost bounds reasonably. Juman, Hoque and Bhuhari [6]
IJCSBI.ORG
designed a C++ computational program of Vogels Approximation Method
(to solve an unbalanced transportation problem by considering both the
balanced and unbalanced features respectively with and without adding a
dummy column) in obtaining an initial feasible solution (IFS) to an
unbalanced transportation problem (UTP). In order to get an initial feasible
solution to a large scale TP, this computational program of VAM is
preferred. Moreover, we examine the effect of dealing with the balanced and
the unbalanced features in applying the well-known VAM method for
solving an unbalanced transportation problem. First we illustrated the
solution procedures with numerical examples (chosen from the literature).
Then we demonstrated this effect by a comparative study on solutions of
some numerical problems obtained by VAM by considering the balanced
and the unbalanced features.
3.2Data Collection
Data were collected using Questionnaires and Interviews. Then the
mathematical model for the month of August 2012 was formulated using the
collected data.
IJCSBI.ORG
in cutting and sewing departments; x23, x24 , x54 , x44 = # instructors needed in
cutting, sewing, QC (quality control) and packing departments;
x31, x32 , x55 , x42 = # supervisors needed in cutting, sewing, QC and packing
departments; x29 , x30 = # table checkers needed in cutting and sewing
departments; x25 , x26 , x39 = # helpers needed in cutting, sewing and packing
departments; x33, x34 , x56 , x43 = # clerks needed in cutting, sewing, QC and
packing departments; x40 = # menders needed in packing department; x41 =
# quality checkers needed in QC department; x38 , x35 , x37 , x45 = # in chargers
needed in packing, cutting, QC and sewing departments; x48 = # personal
managers; x47 = # account clerks; x27 , x28 = # quality instructors needed in
cutting and sewing departments; x36 = # production managers; x46 = # iron
tables; x49 , x50 , x51 = # small, medium, large t-shirts produced in a month.
(Here, # denotes number of )
is the salary of the ith employee and cj is the raw material cost of the jth type
t-shirt subject to the following constraints :
Constraints Inequalities
30 x j 120 x j 1 c j ; j 5, 7, 9,...,19 ;
IJCSBI.ORG
cj # t-shirts completed in a day by j th type of machines in the sewing department
Machine xk xk 1 ck ; k 1, 3, 5,...,17,19, 52 ;
ck # machine operators needed for the k th type of machines in cutting and sewing
departments
Cutting, Sewing, QC and Packing Departments must have a minimum # workers to
perform the duties.
29 80 30 80 32 80
x49 x50 x51 Rs.1999920
36 36 36
Raw material cost
(raw material cost for the entire production)
11 . 66 11 . 66 11 . 66
x 49 x 50 x 51 12480 minutes
20 20 20
Time
( time available for the entire t-shirt production )
Finally, Linear Programming Model (LPM) for the existing problem could
be formulated as below. Optimal solution of the model is obtained using the
software known as LINGO as illustrated below:
IJCSBI.ORG
subject to
X 1 X 2 3 ; X 3 X 4 1 ; X 52 X 53 2 ; X 5 X 6 115 ; X 7 X 8 15 ;
X 9 X 10 8 ; X 11 X 12 4 ; X 13 X 14 2 ; X 15 X 16 3 ; X 17 X 18 2 ; (3)
X 19 X 20 12
IJCSBI.ORG
X 5 X 6 X 7 X 8 X 9 X 10 X 11 X 12 X 13 X 14 X 15 X 16 (5)
45 X 22
X 17 X 18 X 19 X 20
45 X 21 X 1 X 2 X 3 X 4 X 52 X 53 0 ; 20 X 23 X 1 X 2 X 3 X 4 X 52 X 53 0 (6)
X 24 2X 23 ; X 54 2X 23 ; X 44 X 23 (7)
20 X 31 X 1 X 2 X 3 X 4 X 52 X 53 (8)
X 5 X 6 X 7 X 8 X 9 X 10 X 11 X 12 X 13 X 14 X 15 X 16
60 X 32 (9)
X 17 X 18 X 19 X 20
X 55 1 ; 50 X 42 X 39 X 40 X 46 ; X 29 8 ; X 30 X 29 (10)
X 5 X 6 X 7 X 8 X 9 X 10 X 11 X 12 X 13 X 14 X 15 X 16
9 X 26 (11)
X 17 X 18 X 19 X 20
20 X 25 13 X 26 0 ; 20 X 39 8 X 26 0 (12)
X 5 X 6 X 7 X 8 X 9 X 10 X 11 X 12 X 13 X 14 X 15 X 16
40 X 34 (13)
X 17 X 18 X 19 X 20
4 X 33 X 34 0 ; X 33 X 56 X 43 (14)
X 40 12 ; X 41 24
(15)
X 38 1 ; X 35 1 ; X 37 1 (16)
161
X 48 3 ; X 47 X 48 ; X 22 ; X 28 7 ; 2 X 27 X 28 0 ; X 36 1 ; X 45 1 (17)
45
IJCSBI.ORG
X 46 8 ; 29 X 49 30 X 50 32 X 51 899964 (18)
4. RESULTS
By solving the developed large scale mathematical model (as shown in
section 3.4) using Lingo solver, the solutions obtained are given below in
Table 2 and Figures 2-5. The comparison between the optimal number of
each type of machines and number of machines currently being used in the
plant is shown in the following table:
IJCSBI.ORG
= # button hole machines;x15+x16 = # button attach machines; x17+x18= #
blind hem machines; x19+x20= # double needle machines.
The Table 2 clearly shows the available number of machines and their
respective optimal amount. The cutting department consists of three cutter,
one band knife and two fusing machines in the plant. The optimum
quantities for these machines in the cutting department are the same. The
sawing department consists of hundred and fifteen normal machines,
thirteen 5-tread machines, eight 4-tread machines, four flat lock machines,
twelve button hole machines, twelve button attach machines, ten blind hem
machines, and twelve double needle machines. The optimum quantities for
these machines in the sawing department are 115, 15, 8, 8, 13, 13, 13, 13
respectively.
No. of mechanics in cutting dept.
Number of Workers currently working in the Factory No. of mechanics in sawing dept
No. of instructors in cutting dept.
30
28 No. of instructors in sawing dept.
No. of instructors in QC dept.
26 No. of instructors in packing dept.
No. of quality instructors in cutting dept.
25 No. of quality instructors in sawing dept.
No. of table checker in cutting dept.
No. of table checker in sawing dept.
20 No. of menders in packing dept.
20 No. of supervisors in cutting dept.
No. of supervisors in sawing dept.
No. of supervisors in QC dept.
17 No. of supervisors in packing dept.
15 14 No. of clerks in cutting dept.
12 No. of clerks in sawing dept.
Fig 1 No. of clerks in QC dept.
11
No. of clerks in packing dept.
10
No. of account clerks
No. of quality checkers in QC dept.
7 7 No. of helpers in cutting dept.
6 No. of helpers in sawing dept.
No. of helpers in packing dept.
5
3 3 3 3 No. of personal managers
2 2 2 2 2 No. of production managers
1 1 1 1 1 1 1 1 1 1 1 1 No. of cutting in chargers
No. of QC in chargers
0 No. of packing in chargers
Workers No. of work-study in chargers in sawing dept.
No. of iron tables
IJCSBI.ORG
one instructor, one quality instructor, twelve table checkers, two
supervisors, six clerks, twenty six helpers, and one work-study-in-charger.
The QC department consists of one instructor, one supervisor, one clerk,
twenty eight quality checkers, and one QC in-charger. The packing
department consists of one instructor, twenty menders, two supervisors, one
clerk, seven helpers, and one packing in-charger. In addition to there are
three account clerks, three personal managers, one production manager, and
fourteen iron tables in the factory.
IJCSBI.ORG
quality checkers, and one QC in-charger. The packing department consists
of one instructor, twelve menders, one supervisor, nine helpers, and one
packing in-charger. In addition to there are three account clerks, three
personal managers, one production manager, and eight iron tables in the
factory.It should be noted that the total number of workers working in the
plant is 182 (see Figure 2). The Optimum number of workers needed for the
monthly production of t-shirts is 137 (see Figure 3). Thusour model which is
presented in this paper reduces the total number of workers by 32.9 %.
Expected number of T-shirts to be produced in August 2012
14000 14350
12000
6000
4000
5200
No. of large t-shirts
2000
The bar charts in Figure 4 clearly depict the expected total number of t-
shirts to be produced in August 2012. The expected numbers of small,
medium and large size t-shirts are 14350, 10450, and 5200 respectively.
Figure 5 Number of medium size t-shirts produced in normal and over time
IJCSBI.ORG
The bar chart in Figure 5 clearly shows the exact numbers of medium size t-
shirts produced in normal and over times. The bottom of the bar chart
represents that the 7057 medium size t-shirts are produced in normal time
whereas the remaining 3393 (shown in top of the bar chart) are produced in
over time. It should be noted that, in order to complete the entire t-shirts
production in a specific time period, 3393 medium sized t-shirts must be
produced in overtime. See the Figure 5 given above.
4,300,000
Current
production
4,200,000 4,230,283 cost
4,100,000
4,000,000
Optimum
3,900,000 production
3,800,000
cost
3,802,183
3,700,000
3,600,000
3,500,000
Figure 6 clearly shows that the optimal monthly production cost of the plant
is Rs. 3,802,183. But, for the same month the plant estimated average
monthly production cost for this plant to be Rs. 4,230,283.
5. CONCLUSION
According to the optimal solution of the proposed model for the month of
August 2012, the monthly optimal production cost of the plant is Rs.
3,802,183. But in the same month the plants estimated average monthly
cost is Rs.4,230,283. This clearly indicates that the plant is spending in
excess of Rs.428,100 than what is actually needed. Therefore, the plant can
save a maximum of Rs. 428,100 (10%) per month by implementing the
proposed method. Moreover, a sensitivity analysis is performed to complete
IJCSBI.ORG
the t-shirts production within the specified period of time (one month). After
performing a sensitivity analysis, it was revealed that the production plant
needs at least 22760 meters of raw material to meet the given target.
In this research only the production cost is considered while assuming that
the monthly demand is a fixed quantity. But, in practice, for the manufacture
(production plant), there are setup costs and inventory costs of raw-material,
work-in-process and finished goods as well. In addition, buyers incur
transportation costs, ordering costs and inventory costs during transportation
and at the destination (buyer/retailer). Thus, future research might be carried
out by taking these costs of setup, inventory, ordering and transportation
into account. Also, demand can be considered as stochastic. Hence, an
integrated single-manufacture-multi-buyer model with stochastic demand
can be obtained. How to develop a streamline method to tackle this large
scale LPP after considering these costs is challenging and potential future
research.
ACKNOWLEDGMENTS
The authors acknowledge that this research is supported by the research
grant of University of Peradeniya, Sri Lanka. Also, they are grateful to the
referees for their valuable, constructive commentsand suggestions.
REFERENCES
[1] Brain, D.B. Basic Linear Programming. London, Spottiswoode Ballantyne Ltd,1984.
[2] Dantzig, G.B. Linear Programming and extensions. Princeton, NJ: Princeton
University press, 1963.
[3] Fourer, R. Survey of linear programming software. OR/MS today, (2001), pp. 58-68.
[4] Hitchcock, F.L. The distribution of a product from several sources to numerous
locations. Journal of mathematical physics, 20, (1941), pp. 224-230.
[5] James, P.I. and Tom, M.C. Linear Programming. Prentice, Hall, Inc, 1994.
[6] Juman, Z.A.M.S., Hoque, M.A. and Buhari, M.I.A sensitivity analysis and an
implementation of the well-known Vogels approximation method for solving
unbalanced transportation problems. Malaysian Journal of Science, 32,1(2013), pp. 66-
72.
[7] Juman, Z.A.M.S., Hoque, M.A. A heuristic solution technique to attain the minimal
total cost bounds of transporting a homogeneous product with varying demands and
supplies. European Journal of Operational Research, 239, (2014)pp. 146-156.
[8] Karmarkar, N. A new polynomial time algorithm for linear programming.
Combinatorial, 4, (1984), pp. 373-395.
[9] Liu, S.T. The total cost bounds of the transportation problem with varying demand and
supply.Omega, 31,(2003), pp.247-251.
IJCSBI.ORG
[10] Schrenk, S., Finke, G and Cung, V.D. Two classical transportation problems revisited:
Pure constant fixed charges and the paradox. Mathematical and Computer Modeling,
54,(2011), pp. 2306-2315.
[11] Sharma, R.R.K. and Prasad, S. Obtaining a good primal solution to the uncapacitated
transportation problem. European Journal of Operational Research, 144, (2003) , pp.
560-564.
[12]Sharma, R.R.K and Sharma, K.D. A new dual based procedure for the transportation
problem. European Journal of Operational Research, 122, 3 (2000),pp. 611-624.
[13] Taha H. A. Operation Research: An introduction. Prentice-Hall of India, 8th edition,
2006.
[14] Terlaky, T. and Boggs, P.T. Interior point method. Faculty of information technology,
Delft. Netherlands, 2005.
[15] Zhang, Y. Solving large scale linear programming by interior point method under
MATLAB environment. Technical report, Mathematics Department, University of
Maryland, Baltimore Country, 1996.
IJCSBI.ORG
Sonal Mohite
PG Scholar
Sinhgad College of Engineering,
Vadgaon. Pune, India.
ABSTRACT
In wireless eon mobile devices have turned out to be the integral part of all human
communication. As a result, the computer malware is now drifting from computers to
mobile phones. The purpose of this paper is to demonstrate the Bluetooth & SMS based
mobile malware propagation, cloud based detection of both the malwares & at last, control
the malware propagation. At first, mobile network is formed. It is also referred as
geographical social network. It consists of mobile devices, cell towers & gateways for data
transfer. Mobile malware propagates via two communication channels viz. Bluetooth/Wi-
Fi, and SMS/MMS. BT based malware propagates in geometric proximity and thus has a
short range spreading pattern. SMS based malware propagation has a long-range spreading
pattern. SMS based malwares are dangerous when it comes to speed and scope of
propagation. Signatures are used to detect the mobile malware. Signature matching is
performed on externally implemented server which is a separately implemented module.
This malware detection technique comes under cloud based mobile malware detection.
When a message is sent from one device to another device, suspicious activity logs are sent
to cloud server. When some predefined numbers of logs come from a specific device &
signature matches, then that device is declared as malicious or attacker device. Malicious
devices details are sent back to mobile network in the form of patch. This patch prevents
other devices from receiving the message sent by attacker.
Keywords
Bluetooth based malware, malware control, malware detection, mobile malware, malware
propagation, SMS based malware.
1. INTRODUCTION
Few years back mobile phones were not as much used as computers.
However the latest mobile devices are changing the whole scenario. Mobile
devices are becoming the assisting computing devices with computers.
IJCSBI.ORG
Latest mobile devices provide most of the functionalities of traditional
computers.Moreover, various wireless communication functionalities such
as GSM, UMTS, EDGE, and GPRS are also provided. Various networking
functionalities such as Infrared, Bluetooth, Wireless LAN IEEE 802. have
improved usability of smart phones. GPS is added advantage to
communication & network functionalities. SMS, MMS, and calling are the
basic facilities of mobile phones. All these basic and additional features
have increased the danger of malware which was originally targeting
computers only. The malware targeting mobile phones is popularly known
as mobile malware. It has become very hazardous threat to mobile phones.
According to recent Kaspersky researches it is stated as Serious business.
It is no longer fun and games. The damage made by mobile malwares is too
severe to overlook, which includes stealing of ones private data from
device, snooping of ongoing conversations, charging excess money by
sending SMS to premium rate numbers, and sometimes even a location
tracing of user. So, here comes the time to be exceptionally cautious about
mobile malware &understanding various ways of mobile malware
propagation, detect the mobile malware, and control its propagation. SMS &
Bluetooth are the two major communication channels used by mobile
malware for propagation mechanism. Cloud based detection is one of the
efficient way to detect mobile malware. After a malware is detected,
updated security patch is used to restrain the mobile malware propagation.
2. RELATED WORKS
Many researchers have implemented different mobile networks to study
mobile malware propagation. Chao Gao and Jiming Liu (2013)[2], [3] have
implemented a two layer generalized social network model which consists
of two layers viz. Geographical layer and logical contact layer. BT based
malware propagates in geographical layer whereas SMS based malware
propagates in logical contact layer. They also demonstrate the effect of
mobility & operational behavior of mobiles [4], [5], [6], [8], [9]. Shin-Ming
Cheng et al. (2011)[1] have implemented the approach where malware
propagation is studied on generalized social network model. It has two
layers as personal social network & spatial social network. It shows the
propagation of hybrid malware that can propagate by either end-to-end
messaging service or by short-range wireless communication [6], [9].
Guanhua Yan and Stephan Eidenbenz (2009) [9] have specifically modeled
propagation of Bluetooth worms. A comprehensive model showing
propagation dynamics of Bluetooth worms is proposed. This model can also
predict the spreading curves of Bluetooth worm. Due to discrete-event
simulation the computational cost incurred is quite less.
IJCSBI.ORG
3. METHODOLOGY
First of all, a mobile network is implemented which is further used to study
propagation of mobile malware [2], [3], [7]. Mobile network is also known
as generalized social network. It is formed from cell towers, gateways &
mobile nodes. Tower acts as a head node for particular cluster & serves the
mobile nodes working under it. Each tower has givena specific range value
which determines the service area of specific tower. Gateways are used for
the data transfer from one cluster to another cluster [7]. Mobile nodes are
the mobile devices working under cell towers. These mobile nodes keep
moving in the network. It has properties such as identification number,
location data associated with it & buffer memory to store a data. SMS &
Bluetooth based mobile malware propagation is shown on the network.
Once the malware is propagated, next obvious step is to detect it. Signatures
are used to detect the mobile malware. Signature matching is performed on
externally implemented server which is separated from the mobile network.
This malware detection technique comes under cloud based mobile malware
detection where malware is detected on some external server & not on the
mobile device itself. When a message is sent from one device to another
device, suspicious activity logs are sent to this external server. When some
predefined numbers of logs come from a specific device & signature
matches, then that device is declared as malicious or attacker device.
Malicious devices details are sent back to mobile network in the form of
patch. When such infected node tries to send data to any other nodes, the
patch restrains other nodes from accepting the data. In this way the mobile
malware propagation is controlled.
IJCSBI.ORG
3.1 Mobile Malware Propagation Techniques
Based on communication media, mobile malware has 2 types: BT based
malware & SMS based malware.
IJCSBI.ORG
3.1.2 Bluetooth based malware
A BT-based malware is able to infect its geographical neighbors with same
Operating System. When a phone is infected with Bluetooth based malware,
it automatically turns on the Bluetooth service of itself. Then, the infected
phone arbitrarily picks out a susceptible phone as its target. Susceptible
phones are the mobile devices in the vicinity of infected mobile phone
having its Bluetooth on. Now the infected phone sends out the mobile
malware to such susceptible phones present in its Bluetooth range. The
following algorithm is implemented to study Bluetooth based mobile
malware propagation [2], [3], [7], [8].
IJCSBI.ORG
3.3 Mobile Malware Control
Till now we have studied mobile malware propagation & detection. Along
with detecting mobile malware, there is a need to control its propagation.
Basically, there are two types of malware control strategies, viz. proactive &
reactive control. Proactive control strategy is used before actual malware is
detected. Whereas reactive malware strategy is implemented after certain
malware is detected. We have used reactive control strategy here means
when a malware is detected then the control strategy is implemented. So
when any new malware is found, antivirus updates for that malware are
implemented and forwarded to mobile network & from there to mobile
phones. This process is known as patch dissemination [2], [3], [4], [5], [7].
4. IMPLEMENTATION
This system is implemented in total 4 modules. Mobile network & cloud
server are the two basic modules. Mobile network consists of simulated cell
towers, gateway nodes, & mobile devices. It is formed from the initial
number of nodes count given by user [7]. Suppose a user says he wants to
form a network of 100 nodes then a mobile network of 100 nodes consisting
of cell towers, gateways, &mobile devices is formed. SMS & Bluetooth
based mobile malware propagation is studied on this network. Figure 2
shows cell towers & gateways in Red & Yellow color nodes respectively.
Mobile nodes are in various colors except Red & Yellow. Cloud server, the
second module, detects mobile malware, sends updated security patched to
mobile network & thus helps in control of mobile malware propagation.
Both these modules are implemented in J2SE. RMI plays a major role in
message passing between various objects.
The novelty of the system lies in third & fourth modules. Third module
synchronizes a real-time Android device with one of the simulated random
mobile nodes from mobile network. Fourth module is a web service that
does the job of communication between simulated mobile node & real-time
Android device. Synchronization is nothing but the activities happened on
the simulator nodes are replicated on real-time Android device & vice versa.
The activities consist of data packets received on simulated mobile node &
location change of Real-time Android device. Third module is implemented
as an App for Android device. The App accesses GPS co-ordinates of
Android device so the location is synchronized. Fourth module is a web
service implemented using J2EE, SOAP, HTML, and XML. SOAP is used
for communication between Android device & web service. HTML & XML
is also used for data transfer & data encoding respectively.
IJCSBI.ORG
IJCSBI.ORG
6. CONCLUSION
A generalized social network model is implemented which is used to study
the propagation, detection and control of mobile malware. BT-based virus
propagates such that it has localized propagation pattern. SMS-based virus
propagates such that it has delocalized long-range infection pattern.
Operational & mobility behavior of user play crucial role in Bluetooth based
& SMS based virus propagation respectively. When it comes to propagation
speed and severity, SMS-based viruses are more hazardous than BT-based
viruses. After malware detection, the malicious devices details are sent
back to mobile network in the form of patch. This patch prevents other
devices from receiving the message sent by attacker. As mobile malware is
going to create havoc in near future, so this is a right time to understand the
IJCSBI.ORG
spreading patterns & severity of mobile malware. This paper concludes that
the attention is needed over mobile malware propagation especially SMS
based mobile malware & preventive measures to control the malware
propagation.
REFERENCES
[1] Cheng, S., Ao, W. C., Chen, P., Chen, K., 2011. On Modeling Malware Propagation in
Generalized Social Network, IEEE Comm. Letters, Vol. 15, No. 1, pp. 25-27.
[2] Gao, C., and Liu, J., 2013. Modeling and Restraining Mobile Virus Propagation, IEEE
transactions on mobile computing, Vol. 12, No. 3, pp. 529-541.
[3] Gao, C., and Liu, J., 2013. Modeling and Restraining Mobile Virus Propagation.
(Supplementary File), IEEE Trans. Mobile Computing.
[4] Gao, C., Liu, J., and Zhong, N., 2011. Network Immunization and Virus Propagation in
Email Networks: Experimental Evaluation and Analysis, Knowledge and Information
Systems, Vol. 27, No. 2, pp. 253-279.
[5] Gao, C., Liu, J., and Zhong, N., 2011. Network Immunization with Distributed
Autonomy-Oriented Entities, IEEE Trans. Parallel and Distributed Systems, Vol. 22, No. 7,
pp. 1222-1229.
[6] Meng, X., Zerfos, P., Samanta, V., Wong, S.H., and Lu, S., 2007. Analysis of the
Reliability of a Nationwide Short Message Service, Proc. IEEE INFOCOM, pp. 1811-1819.
[7] Mohite, S., and Sonar, R.S., 2014. Proliferation, Detection, and Suppression of Mobile
Malware, Cyber Times International Journal of Technology and Management, ISSN: 2278-
7518, Vol. 7, Issue 1, pp. 129-134.
[8] Wang, P., Gonzalez, M.C., Hidalgo, C.A., and Barabasi, A.L., 2009. Understanding the
Spreading Patterns of Mobile Phone Viruses, Science, Vol. 324, No. 5930, pp. 1071-1076.
[9] Yan, G., and Eidenbenz, S., 2009. Modeling Propagation Dynamics of Bluetooth
Worms (extended version), IEEE transactions on Mobile Computing, Vol. 8, No. 3, pp.
353-368.
IJCSBI.ORG
ABSTRACT
This study uses a survey to analyze the behavioral pattern of Internet usage of university
students. The results show that most students used Internet as a support tool for their
academic and research work. The students accessed Internet mostly from their personal
computers and had multiple years of experience using Internet. Ease of work and time
saving were the most cited reasons for Internet use. The findings of the study provide
significant implications for the academicians, practitioners, and government policy makers.
Keywords
Internet, Students, User studies, Pakistan
1. INTRODUCTION
The rapidly increasing use of Internet in our daily lives is producing direct
impact on people behavior. Internet has affected almost every area of our
daily lives including system of higher education. The advances in internet
related technologies have given rise to new and innovative teaching
strategies using technology integration in the process of learning. Internet
use has become an integral element of the daily lives of higher education
students across the globe. For these students, internet is great functional tool
that has significantly altered the way they interact with their peers and
information in academia. Internet technologies, such as news groups bulletin
boards, social networking sites etc., are now commonly used by students to
stay in touch with their peers, prepare assignments, make notes, term
projects and exchange of emails [1] [2][3][4]. According to [5] there exists
various reasons for such widespread use of internet among higher education
institutions some of the reasons include ease of idea sharing with others
enhanced information sharing ability to perform multidisciplinary research
and less time required to produce & utilize knowledge.
In Pakistan, first Internet connection and first broadband connection were
given in 1995 and 2002 respectively. According to Pakistan
Telecommunication Authority (PTA), the broadband subscribers in Pakistan
were projected to surpass 0.64 million by 2009. Pakistan
IJCSBI.ORG
Telecommunication Authority, since its inception, followed various
deregulation policies. PTA issued broadband licenses to many private
companies in 2004. In the after math of this deregulation policy, two types
of players dominated the broadband Internet market in Pakistan. The first
type consisted of players that competed on same access technology. The
second type consisted of players that dominated in a particular type of
access technology. Fixed line penetration remained a significant issue in
Pakistan. The fixed line penetration was expected to drop from 3.5% in
2009 to 2.8% in 2011. The Pakistan telecom industry, especially the mobile
telecom sector, saw sustained growth in the last years. By 2007, mobile
phone subscribers in Pakistan reached 77 million. The broadband Internet
market also witnessed great technological and strategic transformation and
competition intensified. Many new players entered into the market such as
Qubee (a wireless broadband Internet service provider). PTA further opted
for issuing soft licenses and relaxed terms of conditions for service
providers. This approach, aimed at facilitating access to a wide range of
broadband, was successful and many service providers introduced latest
technologies such as DSL, WiMAX, FTTH, EvDO, HFC, VDSL2 in the
broadband Internet market [6].
In Pakistani Universities, access to the internet is generally provided at
various access points in the Universities such as Cafeteria and Campus
Library Members of the University community can access internet either
using there access points or from their departments, with increased
availability of Internet access, significant increase in demand of internet
access has been witnessed. Many Universities have laid down their own
fiber optic cable network and significantly increased the number of modern
computers available for student community use. Internet bandwidths have
been significantly enhanced with recent achievement of four Mbps
bandwidth for every broadband user of PTCL.
2. LITERATURE REVIEW
Many studies on Internet use have found internet use most prevalent among
young highly educated people [7] [8] [9]. Investigating the internet use
among students in an ethnic context [10] reported that availability of
computer at home accelerated the use of internet. In another study of
internet use among university students [11] reported that 40.2% respondents
accessed internet daily while 38% accessed it weekly only 10% respondents
seldom or never accessed internet 83% students and faculty accessed the
internet to search academic information. Investigating internet use among
Australian students [12] reported that 88% students accessed internet to
search course related information A significant majority of students
accessed the Internet either from their homes or university computer labs
IJCSBI.ORG
most students learnt to use the internet themselves ore through their families
and friends in an study of internet UK among male & female students of a
large US Universities [13] reported that while the gender gap in internet use
was minimal there existed differences in the ways male and female students
used internet. According to [14], students wed internet for general or
recreational purposes and did not realize the potential support provided by
internet for their academic activities. According to [15] internet played an
important role in their education and significantly affected their college
lives. [16] supported this finding by reporting that most student used
internet at home for information search and regards internet as a credible
easy to understand beneficial source of information [1]. [17] found that a
significant majority of students had positive attitude about internet &
regarded the internet as a universal fast gateway to knowledge that provides
ease in life. [18] and [19] found that most students used internet for
academic purposes and perceived it as sources of latest knowledge.
There exist very few studies on internet use by Pakistani students. Existing
studies include [20] [21] [22]. Analyzing Internet use among Pakistani teens
and adults [21] found that majority of users used Internet for academic
purposes. Users perceived Internet as a source of information for public.
Studying the impact of excessive Internet use on undergraduate students,
[16] found that a majority of students experienced positive impacts of
Internet use and they used Internet to enhance their academic
skills.[22]found that most students used Internet for course related activities
and research. Ease of work and time saving were the most cited reasons for
using Internet.
3. METHODOLOGY
The aim of this study was to analyze behavioral pattern of Internet use by
Pakistani university students. To achieve this goal, a survey questionnaire
was developed. The survey questions were adopted and modified from [23]
[24] [25]. The study population consisted of a convenience sample of 300
undergraduates from various universities of Pakistan. The survey responses
were analyzed using SPSS Version 20 software. Reliability of the
instrument was estimated using Cronbachs coefficient (alpha). The
value of Cronbachs coefficient was 0.85 that shows internal consistency of
the research instrument used in this study.
4. ANALYSISOFDATA
4.1. General Information about Respondents
Table 1 shows the frequency distribution of respondents profile
information.
Table 1: Respondents Profile
Age 18-25 Years (92 %), 26-30 Years (8%)
IJCSBI.ORG
Gender Male (68%), Female (32%)
Field of Study Management (72 %), Arts (2%), Science (10%),
Engineering (14%), Medicine (2%)
Ethnicity Punjabi (32%), Pakhtoon (14%), Balochi (4%),
Urdu Speaking (38%), Sindhi (2%), Other (10%)
Family Structure Joint Family (46%), Separate Family (54%)
Family Income Level Less than 20,000 (4%), 20,000-50,000 (34%),
(in PKR) 51,000-100,000 (38%), More than 100,000 (24%)
IJCSBI.ORG
4.4. Frequency of Internet Use
The students were asked to mention how often they used Internet. Table 4
shows frequency distribution of students responses to this question.
Table 4: Frequency of Internet Use
Internet Use Frequency Percentage
Daily 165 55
2-3 days a week 66 22
Fortnightly 38 12.7
Once a month 22 7.3
Rarely 9 3
IJCSBI.ORG
Class assignments/projects 265 88.3
preparation
To update knowledge 175 58.3
For communication 245 81.7
For entertainment 225 75
To prepare for examination 215 71.7
To read news 145 48.3
To download software 190 63.3
To purchase items 16 5.3
For other reasons 35 11.7
IJCSBI.ORG
search engines include ask.com, Bing, boardreader.com, creative commons,
and crunch base.
Table 8: Search Engines Used
Reason Frequency Percentage
Google 285 95
Yahoo 132 44
MSN 66 22
Other 15 5
IJCSBI.ORG
5. DISCUSSION
The results of this study provide mixed findings compared with previous
studies done on Internet use in other countries. Consistent with the findings
of other studies [26] [27] [28], the use of Internet in Pakistan has become
part of daily lives of a large number of students. Most university started
using the Internet since last five years or more. A significant majority of
students have Internet access via their personal computers. It is interesting
to note that these students do not utilize the Internet facility available at their
universities. These findings show increased ability of students to access and
use Internet and related technologies. Similar to the students of developed
world, a significant majority of students in Pakistan are found to use Internet
daily. It appears that the issue of unavailability and unfamiliarity of the
Internet among Pakistani students [22] has now been resolved.
Consistent with the trend found by [22], a very significant majority of
students still learn to use the Internet tools by themselves, or relying on
assistance from friends. The second significant source of learning was
training courses while a very small proportion of students sought assistance
from university faculty or relatives to learn Internet use.
Findings indicate a significant use of Internet by students as an academic
studies and research support tool. Communication, entertainment, and
software downloading were also mentioned as important uses of Internet by
students. This finding is consistent with the finding of [29] [30] [31] [32]
[33]. Very few students used Internet to purchase items. One possible
explanation is that these students do not have enough financial resources at
their own to make purchases online.
Consistent with the findings of [22], Pakistani students still regard Internet
as a tool that provide ease of work and time savings. One other significant
trend emerged from the results is the increased perceived importance of
social media as one of the attractive features of the Internet. This finding is
consistent with the finding of [26] that found use of Social Networking Sites
(SNS) has become part of daily lives students around the globe.
The results about the popularity of the search engines are consistent with the
global rating of search engines by [34] that ranked Google as the top search
provider followed by Yahoo. The results about the popularity of the free
web-based email service are consistent with the global rating of free email
IJCSBI.ORG
services by [35] that ranked Gmail as the top free email provider followed
by Yahoo and Microsoft Outlook.
Supporting the findings of [22], this study found that more than two third
majority of the students used the digital library facility provided by HEC.
Statistics shows that no statistically significant association (i.e. insignificant
2 statistic) exists between household employment status and Internet
access. Statistics show that no significant statistical association (i.e.
insignificant 2 statistic) exists between students use of HEC digital library
and Internet access. However, statistically significant association (i.e.
insignificant 2 statistic) exists among students Internet access and their
use of e-mail services, frequency of Internet use, and students experience
with Internet.
6. CONCLUSION
It can be concluded that Pakistani students are less likely to go and seek help
from the faculty/staff at university to learn using the Internet. However, they
are likely to attend the training courses on Internet use. The increased
reliance on Internet as an academic studies and support research tool is also
a significant trend that needs to be watched and monitored carefully by the
academicians, practitioners, and policy makers.
IJCSBI.ORG
REFERENCES
[1] Asan, A., &Koca, N. (2006). An analysis of students attitudes towards
[2] Ilomki, L., Rantanen, P., 2007.Intensive use of ICT in school: Developing differences in
students ICT expertise. Computers & Education 48, 119136.
doi:10.1016/j.compedu.2005.01.003
[3] Hakkarainen, K., Ilomki, L., Lipponen, L., Muukkonen, H., Rahikainen, M., Tuominen,
T., Lakkala, M., Lehtinen, E., 2000.Students skills and practices of using ICT: results of a
national assessment in Finland. Computers & Education 34, 103117. doi:10.1016/S0360-
1315(00)00007-5
[4] Gomez, R.G., 2012.Adherence to the Use of ICT for Classroom Instruction: Its Impact on
students Learning. IAMURE: International Journal of Education 2.
[5] Usun, S. (2003). Undergraduate students attitudes towards educational uses of Internet.
Interactive Educational Multimedia, 7, 46-62.
[7] Hoffman, D.L., Novak, T.P., Schlosser, A., 2000. The Evolution of the Digital Divide:
How Gaps in Internet Access May Impact Electronic Commerce. Journal of Computer-
Mediated Communication 5, 00. doi:10.1111/j.1083-6101.2000.tb00341.x
[8] Mythily, S., Qiu, S., Winslow, M., 2008.Prevalence and correlates of excessive Internet use
among youth in Singapore. Ann. Acad. Med. Singap. 37, 914.
[9] Ybarra, M.L., Mitchell, K.J., 2004.Youth engaging in online harassment: associations with
caregiverchild relationships, Internet use, and personal characteristics. Journal of
Adolescence 27, 319336. doi:10.1016/j.adolescence.2004.03.007
Internet. Fourth International Conference on Multimedia and Information and
Communication Technologies in Education, Seville, Spain.
[10] Korgen, Kathleen, Patricia Odell, and Phyllis Schumacher. "Internet use among college
students: Are there differences by race/ethnicity." Electronic Journal of Sociology 5, no. 3
(2001).
[11] Bao, X.-M., 1998. Challenges and Opportunities: A Report of the 1998 Library Survey of
Internet Users at Seton Hall University. Coll. res. libr.59, 534542.
[12] Foster, S., 2000.Australian undergraduate Internet usage: self-taught, self-directed, and self-
limiting? Education and Information Technologies 5, 165175.
doi:10.1023/A:1009602617991
[13] Odell, P.M., Korgen, K.O., Schumacher, P., Delucchi, M., 2000. Internet Use Among
Female and Male College Students. Cyber Psychology& Behavior 3, 855862.
doi:10.1089/10949310050191836
IJCSBI.ORG
[14] Tadasad P., G., Maheswarappa B S, Allur, S.A., 2003. Use of Internet by Undergraduate
Students of PDA College of Engineering, Gulbarga. Annals of Library and Information
Stuides 50, 3142.
[15] Jones, Steve, and Mary Madden. The Internet goes to college: How students are living in
the future with todays technology. Washington, DC: Pew Internet and American Life
Project.Vol. 71.Report, 2002.
[16] Rhoades, E.B., Irani, T., Telg, R., Myers, B.E., Rhoades, E.B., Irani, T., Telg, R., Myers,
B.E., 2008. Internet as an Information Source: Attitudes and Usage of Students Enrolled in
a College of Agriculture Course. Journal of Agricultural Education 49, 108117.
[17] Hong, Kian-Sam, Abang Ahmad Ridzuan, and Ming-Koon Kuek. "Students' attitudes
toward the use of the Internet for learning: A study at a university in Malaysia."
Educational Technology & Society 6, no. 2 (2003): 45-49.
[18] Anunobi, C.V., 2006.Dynamics of internet usage: A case of students of the Federal
University of Technology Owerri (FUTO) Nigeria. ERR 1, 192195.
[19] Sharma, R., Verma, U., Sawhney, V., Arora, S., & Kapoor, V. (2006).Trend of Internet use
among medical students. JK Science: Journal of Medical Science & Research, 8 (2), 101-
102.
[20] Rajani, M. K., & Chandio, M. S. (2004). Use of Internet and its effects on our Society.In
Proceedings of the National Conference on Emerging Technologies (NCET), December 18-
19, 2004, Karachi, Pakistan (pp. 157-161).
[21] Suhail, K., Bargees, Z., 2006.Effects of Excessive Internet Use on Undergraduate Students
in Pakistan.CyberPsychology& Behavior 9, 297307. doi:10.1089/cpb.2006.9.297
[22] Sakina, B., Khalid, M., Farzana, S., 2008. Internet Use Among University Students: A
Survey in University of the Punjab, Lahore [WWW Document]. Pakistan journal of library
& information science. URL http://eprints.rclis.org/19027/ (accessed 6.30.14).
[23] Gross, E.F., 2004. Adolescent Internet use: What we expect, what teens report. Journal of
Applied Developmental Psychology, Developing Children, Developing Media - Research
from Television to the Internet from the Childrens Digital Media Center: A Special Issue
Dedicated to the Memory of Rodney R. Cocking 25, 633649.
doi:10.1016/j.appdev.2004.09.005
[24] Gross, E.F., Juvonen, J., Gable, S.L., 2002. Internet Use and Well-Being in Adolescence.
Journal of Social Issues 58, 7590. doi:10.1111/1540-4560.00249
[25] Wang, R., Bianchi, S.M., Raley, S.B., 2005. Teenagers Internet Use and Family Rules: A
Research Note. Journal of Marriage and Family 67, 12491258. doi:10.1111/j.1741-
3737.2005.00214.x
[26] Pempek, T.A., Yermolayeva, Y.A., Calvert, S.L., 2009. College students social networking
experiences on Facebook. Journal of Applied Developmental Psychology 30, 227238.
doi:10.1016/j.appdev.2008.12.010
IJCSBI.ORG
[27] Pai, P., Arnott, D.C., 2013. User adoption of social networking sites: Eliciting uses and
gratifications through a meansend approach. Computers in Human Behavior 29, 1039
1053. doi:10.1016/j.chb.2012.06.025
[28] Kross, E., Verduyn, P., Demiralp, E., Park, J., Lee, D.S., Lin, N., Shablack, H., Jonides, J.,
Ybarra, O., 2013. Facebook Use Predicts Declines in Subjective Well-Being in Young
Adults. PLoS ONE 8, e69841. doi:10.1371/journal.pone.0069841
[29] Baker, R.K., White, K.M., 2010. In Their Own Words: Why Teenagers Dont Use Social
Networking Sites. Cyberpsychology, Behavior, and Social Networking 14, 395398.
doi:10.1089/cyber.2010.0016
[30] Cheung, C.M.K., Chiu, P.-Y., Lee, M.K.O., 2011. Online social networks: Why do students
use facebook? Computers in Human Behavior, Social and Humanistic Computing for the
Knowledge Society 27, 13371343. doi:10.1016/j.chb.2010.07.028
[31] Roblyer, M.D., McDaniel, M., Webb, M., Herman, J., Witty, J.V., 2010.Findings on
Facebook in higher education: A comparison of college faculty and student uses and
perceptions of social networking sites. The Internet and Higher Education 13, 134140.
doi:10.1016/j.iheduc.2010.03.002
[32] Bosch, T.E., 2009. Using online social networking for teaching and learning: Facebook use
at the University of Cape Town. Communicatio 35, 185200.
doi:10.1080/02500160903250648
[33] Richardson, K., Hessey, S., 2009.Archiving the self?Facebook as biography of social and
relational memory. J of Inf, Com & Eth in Society 7, 2538.
doi:10.1108/14779960910938070
[34] eBizMBA, 2014. Top 15 Most Popular Search Engines | June 2014 [WWW Document].
URL http://www.ebizmba.com/articles/search-engines (accessed 6.30.14).
[35] PCAdvisor, 2014.Whats the best free email service? We compare the top 6 providers - PC
Advisor [WWW Document]. URL
http://www.pcadvisor.co.uk/features/internet/3448241/whats-the-best-free-email-service/
(accessed 6.30.14).
IJCSBI.ORG
Sanjay Sharma
Department of Computer Science & Engineering
Shri Mata Vaishno Devi University
Katra J & K
ABSTRACT
Everybody has to communicate with each other so do computers, it is a necessary
phenomenon for exchange of information. Data is one of the most important entities in
today's world, thus data reliability is of utmost importance. The data exchanged between
computers is sent over various communication channels, which can induce noise in the data
thus rendering data unreliable and inconsistent. The number of errors introduced in the data
depends on the encoding scheme, the communication channel being used and also the
modulation scheme. Various encoding schemes, communication channels and modulation
schemes are used for data transmission, each of these schemes have their advantages and
disadvantages depending on the scenario. In this paper performance BPSK and QAM
modulation is compared using RS encoding scheme over Rayleigh fading channel and the
result so produced is presented in terms of BER.
Keywords
BPSK Modulation, QAM, Rayleigh fading channel.
1. INTRODUCTION
Whenever communication takes place, data needs to be transmitted, be it
human beings or computers [15]. Data is of utmost importance for an
effective communication to take place, so the transmission of data should
be such that the receiver of the data should receive the data in the same
condition as it was sent by the sender [15]. If the data is prone to any
disturbance, then the data received by the receiver will not be the same as it
IJCSBI.ORG
was meant and thus it will convey different information than what it was
meant to convey. Thus the goal of data transmission is to transmit the data
over a communication channel without any errors .Various techniques have
been developed over the past few years to secure and make the data
transmission reliable. One of such techniques is Information Coding Theory.
Coding theory the study of codes, including error detecting and error
correcting codes, has been studied extensively for the past forty years. It has
become increasingly important with the development of new technologies
for data communications and data storage [15]. Coding theory makes use of
various codes to encode the data for transmission over a channel and then
the data is decoded at the receivers end to get the required data bits. Along
with the encoding scheme the modulation scheme being used for data
transmission also determines the extent to which the errors are introduced in
the data being transmitted. The performance of modulation schemes vary
depending on the encoding scheme used as well as channel. This paper
discusses the performance comparison of BPSK and QAM modulation over
Rayleigh fading channel using RS encoding scheme.
2. RELATED WORKS
During the past few years, researchers have started showing some interest in
analyzing the performance of various forward error detecting and correcting
codes. The reason being importance of data in present scenario. The
performance of forward error correction techniques are taken into
consideration by using these codes for transmitting data over various
communication channels. In [2] authors have compared and analyzed the
performance of different forward error correction techniques in case of
wireless communication systems. In [9] authors have analyzed the
suitability of Reed Solomon codes for low power communications and
found out that Reed Solomon codes reduce the battery consumption but
debated the overall suitability due to the extra overhead required to encode
the information to be sent. In [10] authors made a comparative study of
Reed Solomon code and BCH code over AWGN channel and concluded
that BCH code performs better than RS code in a binary environment.
3. REED SOLOMON CODE
Reed Solomon code was developed in 1960 by Irving S. Reed and Gustave
Solomon for reliable data transmission. This code was developed keeping in
mind the importance of reliability of data transmission over various
communication channels. This code is a type of block code in which n bit
codeword is formed by adding redundant bits of information to the k bits of
information bits where (n>k). The block so formed is used for actual
transmission over a communication channel. 2k codeword's can be formed
from the k information bits which can be used for data transmission. Digital
IJCSBI.ORG
communication and storage use the services of RS code for reliable data
transmission and data storage. This code finds its application in space
communication, storage media, wireless communication, digital television
etc.
2.1 RS Encoder
Consider a finite field of q elements with GF(2m), thus the message f to be
transmitted consists of k elements over GF(2m) given by:
f = (f0,f1,f2,....fk-1) (1)
m
where fi GF(2 ) .
The message polynomial is formed by multiplying the coefficients of
message by appropriate powers of x as follows:
F(x) = f0 + f1x..........+fk-1xk-1 (2)
The parity check polynomial is given by:
B(x) = b0 + b1x + b2t-1x2t-1 (3)
The codeword is thus formed by adding the message and parity check
polynomial as:
V(x) = F(x) + B(x) (4)
The error correction capability of RS code is:
t = (n-k)/2 (5)
2.2 RS Decoder
After the message has been encoded it is transmitted over the channel as a
result which errors can be introduced in the message due to the presence of
noise in the channel thus rendering the message useless, the RS decoder
decodes this message and tries to correct the errors so introduced. The
message received at the decoder is given by:
R(x) = C(x) + E(x) (6)
where C(x) is the original codeword and E(x) is the error introduced in the
message.
The error function E(x) is given by:
E(x) = en-1xn-1 + .........e1x + e0 (7)
0<k<n<2 + 2 (8)
where n is the size of the codeword k is the number of message bits to be
encoded and m is the number of bits per symbol. Thus RS( n, k) can be
expressed as:
(n, k) =(2( 1) , 2( 1) 1 2t) (9)
The number of extra bits or parity bits that are added to the message for
error detection and correction can be calculated as follows:
IJCSBI.ORG
(n-k) = 2t (10)
where t is the number of errors corrected by RS code.
The distance of RS code can be calculated as follows:
dmin=n-k+1 (11)
Reed-Solomon code is based on Galois field.
3. MODULATION
The process of changing one or more properties of a periodic waveform,
called the carrier signal with a modulating signal that typically contains
information to be transmitted is called Modulation. By the use of
modulation a message signal, can be conveyed inside another signal which
can be physically transmitted.
3.1 Binary Phase Shift Keying
The simplest PSK is Binary PSK in which we have only two signal
elements, one with a phase of 00 and other with a phase of 1800.BPSK is as
simple as PSK but it is much less susceptible to noise compared to PSK In
Ask the criterion for bit detection is amplitude but is PSK it is phase. Noise
can change amplitude easier than it can change phase of the signal. PSK is
superior to ASK because we don't need two carrier signals [14].
IJCSBI.ORG
potential bit rate. The concept behind Quadrature amplitude modulation is to
use two carriers, one in phase and other quadrature, with different amplitude
levels for each carrier.[14]
IJCSBI.ORG
The encoder accepts K random information symbols as input. Each of the
input sequences is mapped unique n symbol sequence known as a Codeword.
The codeword thus formed is sent to the next module known as the modulator
which helps in transmitting the codeword over the communication channel.
BPSK and QAM modulation schemes are used by the modulator to transform
the data into signal waveforms. Once the data has been transformed to a
signal waveform, it is sent over to Rayleigh fading channel for transmission.
Rayleigh fading channel mimics the terrestrial environments, thus a lot of
disturbances are present in the channel which can induce errors in the data
being transmitted thus rendering the data corrupt or unusable. At the
receiver end before decoding the data, it has to be separated from the carrier
signal by the process called demodulation, the module performing
demodulation is known as a demodulator. After separating the data from the
carrier wave, the next step is to send the data for decoding. The demodulator
output is connected to the decoder which receives the data and finally
decodes the data into original information sequence also detecting and
correcting errors depending on the error detection and correction capability
of the code being used. Finally bit error ratio (BER) is calculated.
BER Rayleigh
fading
Gain
Error Display
calculator
Remove Phase
component of path
gain
6. RESULTS
In this paper analysis on BPSK and QAM modulation was done by using
RS encoding scheme of block length (15, 11) . BER ratio was calculated by
IJCSBI.ORG
varying Eb/N0 from 0 to 10. Doppler shift value was set as .0001. The
analysis results are given in table 1:
TABLE 1. Performance Comparison for BPSK and QAM modulation and using RS
encoding scheme in the presence of Rayleigh Fading channel.
Figure 4. BER of QAM modulation and BER of BPSK modulation in Rayleigh Fading
channel using RS encoding.
IJCSBI.ORG
From the above graph it was found that QAM modulation
produced better results using RS encoding scheme in presence of Rayleigh
channel under binary environment.
7. CONCLUSIONS
In this paper performance of BPSK and QAM modulation was simulated in
the presence of Rayleigh fading channel using RS encoding scheme. Several
iterations were performed to find out that BPSK modulation outperforms
QAM using RS encoding in presence of Rayleigh fading channel. Eb/No
ratio was varied from 1 to 10 and it was noticed that at every value of
Eb/No QAM modulation performed better than BPSK modulation. The
graph plotted between BPSK and QAM modulation shows the performance
gain of QAM modulation over BPSK modulation in Rayleigh fading
channel using RS encoding.
8. ACKNOWLEDGMENTS
First and foremost, I would like to thank Mr. Sanjay Sharma. (Asstt.
Professor, SCSE, SMVDU, Katra) for their consistent guidance and support
throughout. He exposed me to the excitement of academic research and
provided me with opportunities to sharpen my skills. I have been deeply
impressed by their inspiring advice and timely feedback. Also, I would like
to thank my friends and colleagues for all the assistance.
I would like to thank my family for understanding and supporting me in
pursuing my academic goal. Their unconditional love and encouragement
have always been the source of my strength and I shall be grateful forever.
REFERENCES
[1] Wallace, H., 2001. Error detecting and correcting using BCH codes.
[2] Kumar, S. and Gupta, R., Performance Comparison of Different Forward Error
Correction Coding Techniques for Wireless Communication Systems.
International Journal of Computer science and technology, Vol. 2, issue3,
September 2011.
[3] Shannon , C.E., July and October 1948 . A Mathematical Theory of communication.
bell system journal, vol.24,.
[4] Reed, I.S., and Solomon, G., 1960. polynomial codes over certain finite fields.
Journal of the society for industrial and applied Mathematics, Vol. 8, No. 2, 300-304.
[5] Saraswat, H., Sharma, G., Kumar, S.M. and Vishwajeet., 2012. Performance
Evaluation and Comparative Analysis of Various Concatenated Error Correcting
Codes Using BPSK Modulation .for AWGN Channel. International Journal of
Electronics and Communication Engineering, ISSN 0974-2166 Volume 5, Number
3, pp. 235-244.
[6] Mahajan, S. and Singh, G., May 2011. Reed-Solomon Code Performance for M-ary
Modulation over AWGN Channel. International Journal of Engineering Science and
Technology (IJEST), Vol. 3 No. 5.
IJCSBI.ORG
[7] Sodhi, G . K . a n d Sharma, K.K., 2011. SER performance of Reed Solomon Codes
With AWGN & Rayleigh Channel using 16 QAM. International Journal of
Information and Telecommunication Technology, Vol. 3, No. 2.
[8] Bose, R.C., and Chaudhuri, D.K., 1960. On A Class of Error Correcting Binary
Group Codes. Information and Control 3, 68-79.
[9] Biard, L. and Noguet, D., April 2008. Reed-Solomon Codes for Low Power
Communications. Journal of communications, vol. 3, no. 2.
[10] Puri, A. and Kumar, S., 2013. Comparative Analysis of Reed Solomon Codes and
BCH Codes in the Presence of AWGN Channel. International Journal of
Information and Computing Technology, vol.3 no.3.
[11] Luo, Z. and Zhang, W., February 2013. The Simulation Models for Rayleigh Fading
Channels. IEEE Transactions on Communications, Vol. 61, No. 2.
[12] Yang, S.M. and Vaishampayan , V.M., Low-Delay Communication for Rayleigh
Fading Channels: An Application of the Multiple Description Quantizer.
[13] Grolleau, J., Labarr, D., Grivel, E. and.Najim. M., The stochastic sinusoidal model
for Rayleigh fading channel simulation.
[14] Forouzan, B.A., Data communications and Networking.
[15] Lone, F.R., Puri, A. and Kumar, S., June 2013. Performance Comparison of Reed
Solomon Code and BCH Code over Rayleigh Fading Channel. International Journal of
Computer Applications (0975 8887) Volume 71 No.20.
IJCSBI.ORG
ABSTRACT
The focus of the study was to ascertain whether there is the existence of women money
saving clubs in rural Zimbabwe, explore their operations and avail data which highlight the
need for implementing tailor made Mobile Money Transfer (MMT) for all. These authors
performed literature review to guide the research. To gather information these writers
employed focus group discussion and survey questionnaires to extract information from the
research participants. Participants of the survey research were women who were actively
participating in money saving clubs in rural Zimbabwe. The focus group dialogue
participants incorporated leaders of these rural women money saving clubs. This study will
contribute to the body of knowledge novel information which is imperative for MMT
operators in Zimbabwe. Therefore MMTs or Banks in Zimbabwe should embrace it.
1. INTRODUCTION
The omnipresence of cellular phones has transformed the manner with
which we interrelate among ourselves and unlocked out exhilarating and
unexplored opportunities in support of trade. The prospective of cell phone
is cosmic, as it is on the precipice to develop into, with the introduction of
touchtone phones, the crucial special gadget of preference. The mobile
phone is fast becoming multifunctional from being used to take photos, to
typing and editing documents and to a portable wallet. A mobile money
transfer is the transfer of cash/ credit from one entity to another, using a
mobile device. Mobile money transfers typically entail sending money using
the Short Message Service (SMS). With the rising popularity of cell phones
IJCSBI.ORG
and the increasing need for fresh channels for money transfers, the mobile
money transfer industry is growth bound.
However, this only looks at the SIM cards active on the mobile platforms in
a specified period and not authentic exclusive persons and does not take into
relation such matters as people with multiple cellular phones and dual SIM
phones. mobile phones are a big hit in rural Zimbabwe and are owned by
even most of the unemployed(http://nehandaradio.com/2013/09/04/mobile-
phones-big-hit-in-rural -zimbabwe/). The brisk swelling of cellular phone
diffusion, against a dormant bank outreach, has fashioned a lush position for
mobile money to blossom in Zimbabwe (Ibid). Cellular phone banking may
possibly be the podium for express financial inclusion of citizens that
currently simply require cell phones as a gate pass to an assortment of vital
financial services they under no circumstances used to get before. The
main intrinsic worth of cell phone money transfers are lower costs, more
rapid swiftness and straightforwardness accessibility. In this paper the
researchers will focus on Mobile banking from a transformational
perspective
IJCSBI.ORG
2. BACKGROUND TO THE STUDY
Zimbabwean rural women are engaged in savings and credit union club
activities. Women in specific communities come together to discuss issues
affecting them and identify solutions to problems bedevilling them. They
then craft ways of combating these problems. Over the years the issue of
women clubs has been prevalent in almost all communities in Zimbabwe.
When a club is formed, a committee is selected to run the affairs of the club.
This may differ from place to place but there are popular positions across
clubs like Chairperson, Secretary and Treasurer, whether from which part of
Zimbabwe each and every club usually has these positions.
The concept of money saving clubs first occurred in Zimbabwe in the early
1960s. This was facilitated by a Catholic missionary by the name Brother
Waddelove who was based in Chishawasha a peri-urban area just outside
Harare. According to literature available the very first club commenced in
1963 with merely 20 associates and since then the concept have spread all
over Zimbabwe. By 1984 there were 5,700 clubs nation-wide (Chimedza,
1984). During this time eleven (11) Credit Unions were fashioned and
membership surpassed one thousand (1000). Currently women savings clubs
are a religious issue in every rural community in Zimbabwe.
The organization of the association was premised on the personage and the
persons sense of accountability towards himself/herself and others. Club
members contribute fixed agreed sums of money to the club for keeping on
a weekly, fortnightly or monthly basis. This money is kept by the treasurer
for a specified period which spans up to the whole year. The members will
then gather at the end of the agreed period usually a year to decide what to
do with the money. At times they buy kitchenware and groceries for all
members. This routine goes on and on from year to year and these women
prides themselves in doing that. This concept was borne out of the need by
the poor rural women to develop themselves. This has the elementary
endeavour of mobilising trivial individual financial possessions into
substantial, handy and valuable groups.
In this paper the researchers are concerned with this valuable liquid cash
that each and every womens savings club scattered all over rural Zimbabwe
accumulate all year long and is kept idle by the clubs treasurer. We believe
this money could be used productively if the mobile money transfer is
extended to tap into this valuable resource. This has a ripple effect:
IJCSBI.ORG
a) It captures the valuable cash that lies unused for almost a year
back into the economy for circulation.
b) It can create more wealth for these clubs when they participate in
the MMT as agents.
c) It can bring convenience to the rural people who have to part with
money to go and cash out money they receive through MMT.
3. LITERATURE REVIEW
Mobile money transfer
The terms m-banking, m-payments, m-transfers, m-payments, and m-finance
refer collectively to a set of applications that enable people to use their
mobile telephones to manipulate their bank accounts, store value in an
account linked to their handsets, transfer funds, or even access credit or
insurance products (Donner. J & Tellez. C. A. 2008 page 2). This concept is
currently spreading fast across the globe, in both developed and developing
countries and Zimbabwe is among them.
IJCSBI.ORG
22% of Zimbabwes GDP (Levin. P. 2013). This clearly indicates the
popularity of MMT among Zimbabweans. Regardless of this success
Ecocash has still not reached the levels of success realised by M-Pesa the
Kenya MMT, Yet Kenya has a strong banking system. Availability of
financial services is more imperfect in Zimbabwe than that of Kenya at M-
Pesa's launch in 2007. Netones one wallet has been there for some time
now but has not seen much progress due to lack of clear vision.
There are over 10,000 clubs nation-wide and women account for up to 85
percent of membership (SDF, 1995). In the whole of Inyanga a district in
Zimbabwe there are 1447 clubs, (Kufusa mari A Self Help Assistance
Program survey report 2006).These clubs help to increase rural women in
Zimbabwes economic and social independence from their husbands. The
savings club concept have stood the test of time because the clubs are
usually established in accordance with already existing bonding factors like
membership of the same church, local communities. Zimbabwean women
see these clubs as a forum for saving money, educational opportunities,
training as well as group meeting where new ideas are shared. The clubs
IJCSBI.ORG
offer women the window of opportunity for development. The clubs
promote social and economic development of women.
4. RESEARCH OBJECTIVES
In this study the writers objectives were to ascertain the being of Money-
saving clubs of women in Zimbabwe and determine how much each club is
gathering regularly and give a national standard projection. The findings
from this research will inform MMT service providers in particular and
policy makers in Zimbabwe. In order to achieve the purpose of the
investigation, the researchers used the following questions:
5. METHODOLOGY
According to Powell & Single 1996 a focus group is a cluster of persons
chosen and brought together by researchers to converse and remark on, from
personal experience, the topic that is the subject of the research. (1996:
499) Focus group investigation is a qualitative research technique which
seeks to assemble information that is outside the compass of quantitative
research.
IJCSBI.ORG
These researchers used focus group discussions and questionnaires to draw
out information from the research subjects. Contributors to the
questionnaire research were women that were actively running and
participating in money saving clubs in their communities. On the focus
group discussion participants were women leading these clubs like The
Chairpersons, Secretaries and Treasurers. Calder (1977) recommended that
focus group interviews or discussions are an appropriate technique in
conducting explorative studies. Jarvenpaa and Lang (2005) have also
confirmed the practicability of focus group discussions in studying ground-
breaking mobile services. The focus group scheme is unique not for its
approach of examination, but for its data-collection actions, and for the
character of the information so collected (Wilkinson 1998, p. 182)
6. RESULTS
a. Results from stage one: Focus group discussion.
Every study is carried out to accomplish a particular purpose. Results from
the focus group discussion indicated that there is indeed money saving clubs
scattered all over the country. Participants concurred that there is no
woman in their rightful sense that does not belong to a money saving club of
their choice. Literature also supports the fact that money saving clubs are
prevalent in African communities. The participants to the focus group
discussion echoed the sentiments. Every village community has a money
saving club and it is unheard of that a woman does not belong to a club.
These clubs are said to meet religious on a particular day of the week
depending on the community. If it happens that the club is a composed of
woman who belong to the same church then they can meet after church,
IJCSBI.ORG
otherwise the clubs usually meet on a chisi (sacred day A day that is
honoured in the community when people are prohibited to go to and work in
the fields).
According to participants there are also some elite money saving clubs and
these cut across communities. These usually meet once every month and
their contributions are larger than other common clubs. The money is
usually kept by the treasurer of the club. The secretary simply records the
minutes of the meeting and the money collected for the day and the current
total collected at that time for the year. The Chairperson simply presides
over the meeting. The money is kept for the whole year and at a particular
date gazetted by the club; the committee will go to town and do some
shopping from kitchenware to grocery. The members will then convene a
meeting where will share those goods among themselves. On that particular
day there will be a bit of feasting. Some other clubs do loan out money
collected to members who are willing to borrow but at an interest. But this is
less prevalent in many clubs because members are unwilling to borrow
because of the interest attached.
IJCSBI.ORG
B = (29/157) * 40 = 7.4 = 7
C = (18/157) * 40 = 4.6 = 5
D = (41/157) * 40 = 10.5 = 11
E = (37/157) * 40 = 9.43 = 9
7. DISCUSSION
In this study we found out that there are women money saving clubs in
Rural Zimbabwe and that these clubs meet religiously on a predetermined
date. On average there are around one hundred (100) womens money
saving clubs in a district in rural Zimbabwe and each has an average
membership of Thirty (30). Assuming that each member contribute US$20-
00 this could amount to US$600-00 per club per month. This money could
be around US$6 000 000-00 per month country wide and this could run into
plus US$60 000 000-00 per year potentially lying idle. This means that there
is a lot that can be done by these MMT operators so that they can tap into
this valuable liquid cash into the circulation system.
MMT operators should reduce their tariffs so that they become sustainable
for the rural communities. They also need to come with a deliberate policy
to cater for these money saving clubs, such a policy will see these clubs
being taken on board and operating as Cash agents. Apart from the
IJCSBI.ORG
capturing of valuable cash into circulation this process will also see these
clubs saving in their communities thereby reducing the need for rural people
to travel to shopping centres to cash out money they receive from their
relatives via MMT. The clubs also earn some money by operating as agents
and this is very important for uplifting of the club members welfare.
At the time of writing this piece of work Telecel was muting the idea of
going rural and other unexplored areas. We want to expand our coverage in
the rural area and we are willing to give up part of our commission to
promote agents in those areas so that it is worthwhile for them because they
are putting investment also, (http://www.techzim.co.zw/2014/01/telecel-
zimbabwes-telecash-launch-press-release/)
8. LIMITATIONS
This research was conducted in one district of Zimbabwean and the
researchers assumed that this is generally applicable to all districts in
Zimbabwe. However in reality the findings may be confirmed in other
districts and discarded in others. This was a result of resource limitations on
the part of researchers. Hence future research can be conducted with more
resources and on a wider scale. In this manuscript the authors have confined
the survey research to rural women money saving clubs and therefore we
believe in future research can also be extended to all gender clubs and in all
parts of Zimbabwe.
9. CONCLUSION
In this paper the rationale of the researchers was to ascertain the existence of
women money saving clubs and how much they are saving in rural
Zimbabwe. Findings of this study point out that there is undeniably
effervescent women money saving clubs in rural Zimbabwe. The club
members contribute money every month and this money is kept by the
treasurer for the whole year. The findings corroborate the view that the
Zimbabwean rural women money saving clubs proffer mobile banking
sector with a pleasant outlook for development. This signifies the actuality
that MMT can breed a startling opportunity for income creation and
redistribution among rural women. The need for exciting M-banking
execution in rural Zimbabwe revolve around enhanced network coverage,
better connections as well as reduced costs to guarantee affordability to the
IJCSBI.ORG
entire potential partakers especially in this case, these money saving clubs.
MMT operators might be better off availing the service at slighter costs to
seize more users rather than insisting on lofty tariffs which scare off some
prospective partakers. This will rake in hard liquid cash the economy is
crying for.
10. ACKNOWLEDGEMENT
We would like to recognize the assistance rendered by a number of women
from money saving clubs in Shurugwi of Zimbabwe. The writers
approached these women through their club leaders. We are indeed grateful
to these women for availing themselves for the research and providing data
that enabled this study to be carried out. Otherwise this research would not
have been possible. Their priceless contribution is greatly appreciated.
11. REFERENCES
CALDER, B. J. 1977. Focus groups and the nature of qualitative marketing research.
Journal of Marketing research, 353-364.
CHIMEDZA, R. 1994. Rural financial markets. Zimbabwe's agricultural revolution, 139-
152.
CHIMEDZA, R. & WOMEN, P. O. R. 1984. Savings Clubs: The Mobilization of Rural
Finances in Zimbabwe, Rural Employment Policies Branch, Employment and Development
Department, International Labour Office.
DONNER, J. & TELLEZ, C. A. 2008. Mobile banking and economic development:
Linking adoption, impact, and use. Asian Journal of Communication, 18, 318-332.
NJENGA, A. D. K. 2009. Mobile phone banking: Usage experiences in Kenya.
unpublished MBA thesis of Catholic University of Eastern Africa.
PORTEOUS, D. 2006. Competition and microcredit interest rates.
POWELL, R. A. & SINGLE, H. M. 1996. Focus groups. International journal for quality
in health care, 8, 499-504.
SARKER, S. & WELLS, J. D. 2003. Understanding mobile handheld device use and
adoption. Communications of the ACM, 46, 35-40.
VAUGHN, S. R., SCHUMM, J. S. & SINAGUB, J. M. 1996. Focus group interviews in
education and psychology, Sage Publications.
WILKINSON, S. 1998. Focus groups in health research exploring the meanings of health
and illness. Journal of Health Psychology, 3, 329-348.
BusinessDictionary.com.(2014). credit union. Business Dictionary
http://www.businessdictionary.com/definition/credit-union.html Accessed on 20 March
2014.
FAQ. Black starline cooperative credit union.
http://www.blackstarlinecooperativecreditunion.com/faq.html Accessed on 30 October
2013.
Nyakazeya. P, (2014). Mobile Network scramble for the unbanked. The Finacial Gazzette.
http://www.financialgazette.co.zw/mobile-networks-scramble-for-the-unbanked/ . Accessed
on 9 May 2014.
IJCSBI.ORG
Levin. P, (2013) Mobile money for the unbanked. GSMA.
http://www.gsm.org/mobilefordevelopment/the-incredible-growth-of-ecocash-zimbabwe-a-
chat-with-econet-services-ceo-darlington-mandivenga Accessed on 22 July 2014.
Sinnot.B, Self Help development Fund (SDF). http://www.gdrc.org/icm/sdf.html .
Accessed on 30 September 2008.
Mapamhidze. R, (2013). A life changing experience with money saving clubs. News Day.
http://www.newsday.co.zw/2013/02/26/a-life-changing-experience-with-money-saving-
clubs/ Accessed on 4 August 2014..
Vemuri, A. (2010). Financial services in the mobile age.
http://www.infosys.com/FINsights/Documents/pdf/issue7/financial-services-mobile-age.pdf
accessed Accessed on 16 May 2014
Kabweza, L.S.M. (2014). Zimbabwes telecoms stats (2013): 103.5% mobile penetration
rate . TechZim. http://www.techzim.co.zw/2014/01/zimbabwes-telecoms-stats-2013-103-5-
mobile-penetration-rate/. Accessed on 7 July 2014.
Kabweza, L.S.M. (2014). Zimbabwe Internet statistics: 5.2 million subscriptions. 40%
penetration. TechZim. http://www.techzim.co.zw/2014/01/zimbabwe-internet-statistics-5-2-
million-subscriptions-40-penetration/ . Accessed on 7 July 2014.
The Standard. (2013). Econet set to become a key financial services player. The Standard.
http://www.thestandard.co.zw/2013/04/21/econet-set-to-become-a-key-financial-services-
player/ Accessed on 21 April 2013
Kabweza, L.S.M. (2014). Telecel Zimbabwes Telecash launch: the press release .TechZim.
http://www.techzim.co.zw/2014/01/telecel-zimbabwes-telecash-launch-press-release/.
Accessed on 7 July 2014.
Chifamba, M. (2013). Mobile phones big hit in rural Zimbabwe. Nehanda radio.
http://nehandaradio.com/2013/09/04/mobile-phones-big-hit-in-rural-zimbabwe/. Accessed
on 8 July 2014.
IJCSBI.ORG
Sagayaraj Francis
Department of Computer Science and Engineering,
Pondicherry Engineering College, India
ABSTRACT
e-Learning on web 2.0 encourages the users to collaborate and build the knowledge rather than
being a mere consumer of the knowledge. Web 2.0 provides various tools to perform
collaborative learning, that is to interact, have individual accountability, team work and
personalized guidance. This research article presents an assessment of 23 e-learning systems, a
survey to have the look and feel of 81 tools and sites in web 2.0 which will augment e-learning
2.0, features of an experimental web solution, data collection on the user preferences on it and the
analysis of those attributes.
Keywords
e-Learning 2.0, Web 2.0, Learning Styles, Social Networking, Cloud Computing
I. INTRODUCTION
An individuals way of processing information is said to be cognitive styles (CS)
[1]. Humans have the cognitive ability to acquire and recognize information, map
them to representations and then to knowledge and then use them. Some of the
CS are Cognitive Trait Model and Inductive Reasoning Ability [2]. Learning
Styles are the different ways in which learners perceive and process information
[3]. Several learning styles have been in [4] towards designing e-learning
materials based on multi-learner style [5]. Felder-Silverman's synthesis of these
theories is designed to easily translate them into strategies for a higher education
sector (Table I) [6]. Mostly the authors classify the learners into groups and
propose corresponding inventories and methods. One such model is Sarasin [7].
According to him, the learners are classified into three groups based on their
learning styles namely visual learners, auditory learners and kinesthetic learners.
Visual learners gain knowledge through visual inputs, auditory learners learn
through listening and kinesthetic learners learn through experiments and
IJCSBI.ORG
exploration [8]. This paper is structured as follows. Section II describes about e-
Learning and lists some of the popular e-learning systems used around the world
and provides a comparison table of these systems with Felder-Silverman model.
Section III identifies various ways of utilizing web 2.0 to augment e-Learning.
Section IV and Section V lists the various tools that are available in web 2.0 and
tabulates them. Section V shows the proposed comprehensive eLMS and
discusses its features. Section VI presents the analysis of the attributes on the user
preferences on the designed system. Finally a brief conclusion is described in
Section VII.
II. E-LEARNING
Teaching and learning process has undergone a vast change after the advent of
Internet. As Internet and World Wide Web expanded rapidly e-Learning has
become a major form of education where time and geographical constraints have
been overcome. As pointed out in [9] e-Learning is a learning that involves
acquisition, generation and transfer of knowledge using ICT. This enables
universal learning, overcoming the barriers of time and distance. E-learning
is based on learning objects [10] like audio, video, presentations, documents, etc.,
which are stored in a learning repository from where they are accessed and
processed by the learner. The learning management systems like Black Board,
WebCT, MOODLE etc., support various kinds of teaching learning activities but,
they do not suit all kinds of learners who have different levels of intelligence and
maintains one size fits all approach. Hence, the adaptive and intelligent web
based educational systems [11], which cater to different types of styles of
learning according to the requirements of the learner and their situations.
NetCoach and SIETTE are comparable with modern day LMS. Most of the e-
Learning systems, adaptive or non adaptive, do not relate or collaborate with
external systems and mostly they are stand alone. A search was made for some of
the popular e-learning management systems along with their URL (Table II).
Author Characteristic's
David Accommodatin
Diverging Converging Assimilating
Kolbs g
Peter
Honey
Activists Reflectors Theorists Pragmatists
and Alan
Mumford
IJCSBI.ORG
Dunn and Emotiona Sociologica Physiologica Psychologica
Environmental
Dunn l l l l
Felder-
Active / Sensing / Sequential /
Silverma Visual / Verbal
Reflective Intuitive Global
n
Sarasin
Visual Auditory Kinesthetic
VAK
Web 2.0 is a collection of inter operable web applications that facilitate user
interaction and collaboration with each other as creators of content rather than
passive viewers as in web 1.0. Examples of Web 2.0 are social networking sites,
blog, wikis, mashups, etc. [12]. These tools can be used by the learning
community to interact, share knowledge and augment problem based learning.
This has started a culture of contribution and not mere consumer of knowledge
among the learning community. Web 1.0 was useful for connecting people to the
contents thus useful for finding information and performing basic transactions.
The meeting point of users and resources are called a course [13]. E-learning is
primarily focused on groups. A group is a collection of individuals who are
engaged in a joint work. One such place is a social networking site, which are
very popular among people to stay connected. Social is often referred to as
communication, construction and collaboration [13]. Currently 300 million
people use social software [14] and it is still growing. In social networking, each
individual has a page and profile that one develops and shares with others in the
network. These social networking sites act as pedagogical agent for problem
based learning since it is a combination of personalization and socialization.
These social software provide platform to enable users to build applications for e-
learning and enables them to learn from each others work [14].To broaden and
generalize the data transfer between different social networking sites, Google
brought out an open social development platform in 2007. This platform defines
common API, which can be used to develop sites to provide services to multiple
sites and easily exchange data between different social sites. MySpace,
Friendster, LinkedIn uses open social API. Using REST API, personalized
IJCSBI.ORG
materials and queries can be provided to users. The dimensions of a high quality
education experience are structure, content, service and delivery [15]. Structure is
the foundation of quality content, service and delivery. Content should be
comprehensive, authentic and researched. Services are resources, administration
and technical support for the action done. Delivery is the usability, interactivity
levels of the action performed [16]. All these desirable dimensions could be
easily achieved through web 2.0. It is also very easy to monitor the students
learning process and levels through social media since they are open and
transparent and allow the learners to construct their own learning. The critical
challenge of web 2.0 is identifying the right co learners, content, service, and user
interfaces to facilitate interaction, communication and collaboration. Scaling is
another problem and expensive to implement. Here, Cloud computing comes to
the rescue by providing storage and other services, freeing the users to focus on
applications [17]. Applications like Google docs, presentation, etc., provide
teachers and learners with free and low cost alternative. Browser based
applications are easily accessible even on mobile platforms making learning
possible where Internet is accessible.
Web 2.0 offers a wide variety of tools that can be used for e-learning. Social
networking sites can be used for e-learning. According to Felder-Silverman
Learning Style Model, the learning style can be sensory, intuitive, visual, verbal,
inductive, deductive, active, reflective, sequential and global. There are a number
of tools in web 2.0, which according to the researchers, could be mapped to
Felder Silverman learning styles. Tools such as WebCasting and PodCasting can
be used to broadcast audio/video/slide/recordings, which can complement
classroom environment. Similarly, Wikis for group assignments; wikiversity.org
to collaborate and create contents freely; SuTree.com and Slide.net offers a
variety of resources to learners and teachers; eduSlide allows teachers to group
their content and present them to the learners; Footnote allows the users to access
documents and other resources and prepare online reports;
IJCSBI.ORG
6 Claroline www.claroline.net/
7 CERTPOINT www.certpointsystems.com/
8 Desire2Learn www.desire2learn.com/
9 DoceboLMS www.docebo.com/
10 Dokeos www.dokeos.com/
11 .LRN www.dotlrn.org
12 Latitude learning www.latitudelearning.com/
13 EFront www.efrontlearning.net/
14 HotChalk www.hotchalk.com/
15 ILIAS www.ilias.de/docu/
16 Interactyx www.interactyx.com/
17 Moodle www.moodle.org/
18 Metacoon www.metacoon.net/
19 Meridian Knowledge Solutions www.meridianksi.com/
20 RCampus www.rcampus.com/
21 Saba Software www.saba.com/
22 Sakai www.sakaiproject.org/
23 Studywiz www.studywiz.com/
VoiceThread.com allows tutors to create lessons and add audio narrative along
with it; Visual Thesarus.com provides all the synonyms in graphical format; and
wePapers.com allows sharing of academic/research papers, tutorials, lectures and
test. LMS are learning management systems, which provide the learner with the
learning contents. Personal Learning Environments (PLE) are tools, used by the
learners to gather information, reflect and work on them. Since these tools are not
exclusively meant for LMS, they could lead one to error. So, it becomes
necessary to provide a system with the combination of LMS and PLE under
controlled environment and this process can be done using web 2.0 tools. For
example, SHARek uses social bookmarking and consists of PLE within LMS.
IJCSBI.ORG
Sequential
Reflective
Intuitive
Sensing
Verbal
Global
Visual
Active
LMS
1 N Y P N Y P Y Y
2 Y Y P Y Y P Y Y
3 P Y P P Y P Y Y
4 N Y Y N Y P P Y
5 Y Y P Y Y Y Y Y
6 Y P P P Y Y Y Y
7 P Y Y P Y Y Y Y
8 N Y Y N Y Y P Y
9 Y Y Y P Y Y P Y
10 Y Y P Y Y Y Y Y
11 Y Y P P Y Y Y Y
12 Y Y Y Y Y Y Y Y
13 Y Y P Y Y Y Y Y
14 Y Y Y Y Y Y Y Y
15 Y Y Y Y Y Y Y Y
16 Y Y P P Y Y Y Y
17 Y Y Y Y Y Y Y Y
18 Y Y P P Y Y Y Y
19 N Y P P Y Y Y Y
20 Y Y Y P Y Y Y Y
21 N Y P P Y Y Y Y
22 Y Y Y Y Y Y Y Y
23 N Y P P Y Y Y Y
IJCSBI.ORG
A survey was made to look for e-Learning components such as repository to hold
different items like learning objects, student profile, etc., multimedia,
simulations, gaming, quizzing, searching, socializing, assessment, etc., as
mentioned in Felder-Silverman style of learning. Some of the popular sites/tools
which can be used for e-Learning are tabulated in Table IV.
IJCSBI.ORG
24 www.marketwatch.com/
25 www.cut-the-knot.org/
26 http://lstat.kuleuven.be/java/
27 http://www.thiswaytocpa.com/career-tools/interview-simulation/
28 http://en.wikipedia.org/wiki/Webcast
29 http://www.librivox.org/
30 www.slideshare.com
31 www.scribd.com
32 www.docs.google.com
33 www.youtube.com
34 http://www.google.co.in/blogsearch?hl=en&tab=wb
35 http://pipes.yahoo.com/pipes/
36 http://www.programmableweb.com/
37 http://www.google.com/talk/
38 https://www.google.com/calendar/
39 http://translate.google.com/
40 https://sites.google.com/
41 http://www.google.co.in/ig
42 www.rapidshare.com
43 www.mediafire.com
44 www.hotfile.com
45 www.4shared.com
46 http://depositfiles.com/
47 http://zshare.net/
48 http://uploading.com/
49 http://www.csse.monash.edu.au/~dwa/Animations/index.html
50 http://www.cosc.canterbury.ac.nz/mukundan/dsal/appldsal.html
51 http://www.cs.jhu.edu/~goodrich/dsa/trees/index.html
52 http://downloads.ziddu.com/downloadfile/12314754/Data_Structures_Thr
53 ough_C_-Yashavant_Kanetkar.rar.html
http://www.dzone.com/links/animated_tutorials_for_data_structure_algorit
54 hms.html
http://www.edsim51.com/
55 http://www.homesoft.gen.tr/products/Sim8085.html
IJCSBI.ORG
56 http://sourceforge.net/projects/picmicrosim/
57 http://www.angelfire.com/electronic2/8085simulator/
58 http://www.samphire.demon.co.uk/
59 http://www.ontko.com/moss/
60 http://vip.cs.utsa.edu/simulators/
61 http://www.cs.kent.ac.uk/people/staff/frmb/moss/
62 http://www.cs.unm.edu/~crowley/osbook/sos.html
63 http://www.freevbcode.com/ShowCode.asp?ID=4079
64 http://samate.nist.gov/index.php/Tool_Survey.html
65 http://pmd.sourceforge.net/
66 http://www.stachliu.com/resources/tools/google-hacking-diggity-
67 project/attack-tools/
http://findbugs.sourceforge.net/
68 https://www.fortify.com/ssa-elements/threat-intelligence/rats.html
69 http://www.modelsphere.org/open_modelsphere.html
70 http://www.sqlpower.ca/page/architect
71 http://www.dbvis.com/
72 http://www.sqlmanager.net/tools/free
73 http://www.elphsoft.com/
74 http://www.isi.edu/nsnam/ns/
75 http://www.cc.gatech.edu/computing/compass/pdns/index.html
76 http://www.ssfnet.org/homePage.html
77 http://www.cisco.com/web/learning/netacad/course_catalog/PacketTracer.
78 html
http://www.filebuzz.com/findsoftware/Free_Network_Simulation_Exe/1.h
79 tml
www.questionwriter.org
80 www.compilr.com
81 www.spicynodes.com
IJCSBI.ORG
languages; make use of open and free educational resources; and provide free
storage and more.
Using the knowledge acquired from the survey listed in Table V, a web based e-
learning system specific for learning Object Oriented Programming Using C++
was developed. It is a minimal working prototype which gives the look and feel
of all the learning components [17] that utilizes various social tools, interactive
environments of Web 2.0, various web based services and cloud. The proposed
system is available at [18]. Some of the key features of the system are as follows:
2. All the video lessons are uploaded to YouTube.com and played here. This is
implemented using the open APIs provided by YouTube.com.
3. Google Gadgets, like Google Calendar are used to publish the Schedule /
Course plan.
4. Links to different sites for non human resources like animations, references,
books, journals, articles and other forms of media are incorporated. Online
quizzes produce the result of the quiz and mail it to the stakeholders about the
learners performance. This was done using Question writer [20]. A
dictionary of all the key words in the C++ language, a custom built software
is also provided.
5. REST API and other API provided by FaceBook are used to build discussion
forum and chat room features for those attending the course.
6. The learners can also test their programs using [21], which provides a
platform for program compilation and execution facility for many
programming languages.
8. Using [22] mind map is generated to represent and structure ideas and
concepts of C++ graphically.
IJCSBI.ORG
Some of the other features included in the system are deriving class diagrams
from source code [23], learning by playing cross word puzzle [24], analyzing the
codes efficiency using static analyzer [25] and sample C++ programs [26].
Frequency Percent
Male 750 69.8
Female 324 30.2
Total 1074 100
IJCSBI.ORG
IJCSBI.ORG
N of Valid Cases 1074
IJCSBI.ORG
VIII. CONCLUSION
This study aims to identify e-learning possibilities using social and other tools
available in web 2.0. This will enhance the e-learning framework by using the
freely available tools to be mashuped together to provide a better e-learning
framework according to the need of the stakeholders. Every requirement can have
different frameworks. Thus, the above research and the experiment, is bound to
motivate and enlighten the stakeholders to go for customized e-learning platforms
according to their requirements.
IJCSBI.ORG
The findings from the analysis of the attributes are as follows,
1. From Table VIII, the top five usage of the system are video lessons, search
other related components on web, lecture presentations, mind map and
question bank respectively.
2. From Figure 1 which provides the statistics on gender wise usage of the
system, the top three usage by male respondents are simulation, lexicon and
e-materials. The top three usage by female respondents are discussion forum,
mind map and video lessons.
3. From Figure 2 which provides the statistics on the usage based on the
educational qualifications of the respondents is that, post graduate students
top three usages are discussion forum, lexicon and lecture presentations. The
top three usages by under graduate students are online quiz, simulation and
animations.
From Figure 3 which provides the statistics on the usage based on the location
of residency is that, urban respondents top three usages are online quiz, online
compilation and question bank. The top three usages of the rural respondents
are e-materials, discussion forum and tutorials.
REFERENCES
[1] RIDING, R. & RAYNER, S. (2006) Recent adaptive e-learning contributions towards a
standard ready architecture. Innovations in Education and Teaching International. 43. p.
121-135.
[2] SOTIRIOS BOTSIOS & DIMITRIOS GEORGIOU. (2008) Recent adaptive e-learning
contributions towards a Standard Ready Architecture. e-Learning. p. 226-230.
[3] DEKSON, D. & SURESH, E. (2010) Adaptive e-Learning techniques in the development of
teaching electronics portfolio A survey. International Journal of Engineering Science and
Technology. 2(9). p. 4175-4181.
[4] GRAF & RITA VIOLA. (2007) In-Depth Analysis of the Felder- Silverman Learning Style
Dimensions. Journal of Research on Technology in Education. 40(1). p. 400-415.
[5] BUTHINA DEEB & ZAINUDIN BIN HASSAN. (2011) Towards Designing e-Learning
Materials based on Multi Learners Styles. International Journal of Computer Applications.
26(3). p. 126-137.
[6] FELDER & SILVERMAN. (1988) Learning and Teaching Styles in Engineering Education.
Engr.Education. 78(7). p. 674-681.
[7] SARASIN, L.C. (1999) Learning Styles Prespectives: Impact in the Classroom. Madison.
WI: Atwood Publishing.
IJCSBI.ORG
[8] MONTEMAYOR, E. & APLATEN, M. (2009) Learning Styles of high and low Academic
Achieving Freshman Teacher Education Students: An Application of Dunn and Dunns
Learning Style Model. University of Cordilleras. 1(4). p. 1-14.
[9] SHAFQAT HAMEED & ATTA BADII. (2009) Impact of the e-learning package on the
quality of student learning experience. European and Mediterranean Conference on
Information Systems (EMCIS2009). p. 13-14.
[10]POLSANI, P. R. (2003) Modalities of Using Learning Objects for Intelligent Agents in
Learning. Journal of Digital Information. 3(4).
[11]BRUSILOVSKY, P. (2000) Adaptive hypermedia: from intelligent tutoring systems to web-
based education. Intelligent Tutoring Systems. 1839. p. 1-7.
[12]http://en.wikipedia.org/wiki/Web_2.0#cite_note-0
[13]CHRISTIAN DALSGAARD. (2008) Social Networking Sites: Transparency in online
education. EUNIS.
[14]MOHAMMED AL-ZOUBE & SAMIR ABOU EL-SEOUD. (2009) Using Social
Networking Sites as a Platform for E-Learning. ICL.
[15]DEBRA MARSH & RACHEL PANCKHURST. (2007) eLEN- eLearning Exchange
Networks: reaching out to bilingual and multicultural University Colloboration, hal.
[16]JENNY LAGSTEN & MATHIAS HATAKKA. The Use of Online Social Networks in
Chinese Colloborative e-Learning Education. Available from: http://oru.diva-portal.org /
smash / get / diva2:424915/FULLTEXT01.
[17]MARIA DOMINIC & SAGAYARAJ FRANCIS. (2012) Mapping of e-Learning
Components to Cloud Computing. International Journal on Engineering Research and
Technology. 1(6). p. 1-5.
[18] http://www.elearn.mcashc.org
[19] www.jumbofiles.com
[20] www.questionwriter.com
[21] www.compilr.com
[22] www.spicynodes.com
[23] http://www.ucancode.net/Visual_C_MFC_Samples/Free-C-CPP-Code-Generate-Tool-UML-
Draw.htm
[24] http://www.sstutor.com/cpp/cword2.htm
[25] http://cppcheck.sourceforge.net/
[26] http://www.syvum.com/squizzes/cpp/
[27]CASQUERO, O. & PORTILLO, J. (2008) iGoogle and gadgets as a platform for
integrating institutional and external services. MUPPLE'08. p. 37-41.
[28] http://vcl.ncsu.edu/
[29] http://elearningshc.hpage.co.in
IJCSBI.ORG
ABSTRACT
School Administration and Management System (SAMS) has the potential to improve
school administration and management, however there is still little research and literature
on this aspect of Information and Communication Technology (ICT) in Education.
In South Africa, Education Management Information Systems (EMIS),has been developed
to assist with educational information needs encompassing education planning as well as
implementation of relevant education policies at central government level. At school level
South African (SA) SAMS is the basic standard for all school data collection to improve
and standardize data collection.The aim of this study was to explore and describe the
critical success factors for the adoption of SA-SAMS by school personnel in South Africa.
The data collected by means of a survey conducted in 51StarSchools in Limpopo Province
of South Africa was analysed by means of Structured Equation Modelling. The results
indicated that social factors and facilitating condition are critical in the adoption of SA-
SAMS;the training offered to teachers was not tailor-made for this specific group of rural
teachers. Although teachers believed SAMS was useful they are not using it as a result of
how it was implemented.
Keywords
School, Administration, Management, ICT, TAM.
1. INTRODUCTION
The use of computerized information systems for education has increased
massively in industrialized countries over the past two decades, and now
developing countries are also starting to utilize their potential (Bisaso et al.,
2008). Developing countries are disadvantaged in the use of CISs partly
due to constraints in skills, expertise, spatial barriers, finances, availability
of computer equipment and other capacity related limitations (Heeks, 2002).
Research has been undertaken on the necessity of integrating Information
and Communication Technologies (ICTs) into schools (Chai, Hong, Teo,
IJCSBI.ORG
2009; Pynoo et al., 2010). But most of this research is basedon improving
teaching and learning and less on school management and administration
(Visscher, 1999, Demir, 2006). The introduction of ICTs for administration
and management purposes in schools may contribute to improved
performance and strengthened educational leadership (Telem, 1996).School
Administration and Management System (SAMS) has the potential to
improve school administration and management (Telem, 1996; Anderson &
Dexter, 2005; Flanagan & Jacobsen, 2003).SAMS is designed to suite the
structure, management tasks and special needs of schools (Telem, 2001).
SAMS provides information and various reports from databases in order to
facilitate decisions making in line with the aims of a school (Demir, 2006).
Information is an essential resource produced by Information Systems, and
is a key constituent to the management and decision-making in any
organization (Gxwati, 2011).The United Nations Educational Scientific and
Cultural Organization (UNESCO) posited that information systems are
integral to the management, planning and evaluation of an education system
(Gxwati, 2011). This awareness has led to the creation of Education
Management Information Systems development in many countries,
including South Africa. The effective use of Information Systems is
dependent on quality data that is complete, relevant, accurate, timely, and
easily accessible.
Research conducted in various countries e.g. Turkey and America (Demir,
2006);Israel (Telem, 2005) confirms that school management information
systems intensify organizational and managerial success. Efficiency in
decision-making intensifies at schools where a school administration and
management system (SAMS) is used. SAMS reduces the workload, makes
management processes more efficient (Telem, 2005).
School personnel must know how to take advantage of ICTs to improve the
administration and management of their schools (Anderson & Dexter,
2005).As leaders, school managers should learn how to use technology
while fulfilling their responsibilities and this may increase the use of
technology in schools.
In South Africa (SA), the national Department of Education developed
SAMS known as SA-SAMS. SA-SAMS is a fully integrated computer
solution that addresses all aspects of school administration and
management. It is cost effective and easy to use (South Africa, 2006).SA-
SAMS entails useful functionalities including the timetable module that
assists in the complicated task of allocating subjects and classes to educators
(South Africa. 2006). SA-SAMS was designed with non-computer literate
users in mind and it uses the graphic user interface instead of a complicated
menu structure.
IJCSBI.ORG
Bialobrzeska and Cohen (Bialobrzeskand Cohen, 2005) contend that when
information and communication technology (ICT) projects in the countrys
schools do not succeed, it is because the principals are not properly
informed about what ICTs can and cannot do. This hampers their ability to
manage the integration of ICTs in their schools because the presence of
technology alone seldom leads to its widespread use.
Thus there is a need to provide support for principals and other senior
managers in managing the integration of computers and related resources in
schools. This view is further captured in the White Paper on e-Education
South Africa(2006): Education leaders do not yet fully appreciate the
benefits of e-Administration for institutions It is important that
educational leaders at all levels of the system are provided with the
necessary support to enable them to manage the introduction of ICTs and
the related change process.
Inequalities reflected in South African society are manifested in ICT
integration in schools (South Africa, 2004). Prior to 1994 South Africa had
several racially and ethnically separated education departments and each
had its own methods and systems of data collection and processing (South
Africa, 2007). After 1994 there was a need to develop one uniform National
Education Information System. Education Management Information
Systems(EMIS) is the information system which was implemented in South
African education to bring about improvement in information discrepancies
which existed before 1994 (Gxwati, 2011).
EMIS was developed to address the national education information needs
(South Africa, 2007). EMIS is an integrated education information system
for the management of education in South Africa. EMIS objectives include,
amongst others, promoting the development and operation of education and
training management information systems for accountability, planning and
monitoring to achieve quality and ensure effective service delivery within
the national education system. The output from EMIS assists provincial and
national departments to plan effectively and make informed
decisions(Van Wyk, 2006).EMIS is meant to assist with educational
information needs encompassing education planning, decision-making,
financial allocation, accounting, monitoring and evaluation as well as
implementation of relevant education policies(South Africa, 2007).In a
complex post-apartheid South Africa there are greater demands to do well
within fiscal constraints. The utilization of Information Systems is
fundamental to managing strategically and to deploy resources optimally.
The National Department of Education (South Africa, 2007) also recognized
this need and has implemented the Education Information Policy to enhance
and encourage information use in the Education System. This policy
IJCSBI.ORG
provides guidelines to establish EMIS in all provincial education
departments of South Africa (Gxwati, 2011).
South Africa consists of nine provinces and each province is responsible for
national policy implementation. One of the greatest challenges has been the
coordination of EMIS with provincial Education Departments (South
Africa, 2007). EMIS as a national system is dependent on the
implementation of the Information Systems in the provinces. EMIS
nationally can only move as fast as the slowest province(South Africa,
2007). If provinces lack the necessary resources or accurate schedules, full
implementation of EMIS will be impossible.
The National Education Policy Act of South Africa requires the Minister of
Education to determine national policy for the management information
systems, including the provision of data in accordance with the international
obligations of the government, to monitor and evaluate standards of
education provision, delivery and performance through the use of national
education statistics provided by EMIS (South Africa, 1996).
At school level, South African School Administration and Management
System (SA-SAMS) is the basic standard for all school data collection to
improve and standardize data collection at school level (South Africa,
1996).SA-SAMS is a customized computer application specifically
designed to meet the management, administrative and governance needs of
SA schools (South Africa, 2006).
SA-SAMS provides the standards for all school data and school
administration systems at ground level(South Africa, 2011).SA-SAMS has
proved to be a robust computer application specifically designed to meet the
management, administrative and governance needs of public schools in
South Africa (South Africa, 2006). SA-SAMS contains information about
learner data, parent data, class list information, fee information, school
budget, curriculum, maps, and timetabling and human resource modules.
SA-SAMS is the first step in building a national education unit of education
information collection system (South Africa, 2007).
The SA national Department of Basic Education (DBE) has provided
schools with SA-SAMS, which is a cost effective, easy to use and fully
integrated computer solution encompassing all aspects of school
administration and management requirements (South Africa, 2006). The
DBE has provided SA-SAMS to the countrys nine provinces for
implementation, and each Province chooses its own strategy for SA-SAMS
implementation in its schools. The provincial education departments are
responsible for the user support and training of SA-SAMS (South Africa,
2001).
IJCSBI.ORG
Limpopo Province where this research was conducted Mokwena
(2010)decided to implement SA-SAMS in the Dinaledi schools. Dinaledi
is a Sotho word for Stars.
Thus, the question this paper sought to answer was: What are the critical
success factors which will lead to the adoption of SA-SAMS by South
African school personnel in view of the advantages offered by SA-SAMS
and the effort of the Department of Education in developing and making the
SA-SAMS freely available to schools.
2. CONCEPTUAL MODEL AND RESEARCH HYPOTHESIS
DEVELOPMENT
Technology Acceptance Model(TAM) is considered the most influential,
powerful, and parsimonious and commonly employed theory for describing
an individuals acceptance of information systems(Lee, 2004). TAM is
considered one of Information Systems (IS) fields own theory (Lee, 2004).
Other user acceptance theories include Theory of Reasoned Action (TRA),
Model of PC Utilization (MPCU), Innovation Diffusion Theory (IDT)and
Unified Theory of Acceptance Use of Technology (UTAUT). This study
employed Technology Acceptance Model (TAM) as an underpinning
theory. Even critics of TAM like Bagozzi (2007) acknowledge that the
strength of TAM is its parsimony. TAM takes the view that the intention to
accept and use technology is determined by the individuals perception of
the ease of use and usefulness of the technology(Davis, 1989).TAM has
been applied successfully in the business environment Davis (1986, 1989)
and Davis and Venkatesh (1995) and in higher education settings to predict
user intention to use technology. TAM makes a provision to add external
factors. This study added facilitating conditions and Social Factors as
external factors.
IJCSBI.ORG
2.1 Tam Constructs
The two specific beliefs that TAM uses to predict acceptance and actual
system usage are perceived usefulness and perceived ease of use as depicted
in Figure 1. Perceived ease of use is defined as the degree to which a
person believes that using a technology would be free of effort (Venkatesh
& Davis, 2000). Perceived usefulness is defined as the degree to which a
person believes that using a particular technology would enhance his or her
job performance. Perceived usefulness is also influenced by perceived ease
of use (Venkatesh & Davis, 2000) Users are often willing to cope with some
difficulty of use if the system provides critically needed functionality
(Davis, 1989).
TAM posits that the actual technology use is directly caused by behavioural
intentions. Behavioural intention is a measure of the strength of ones
intentions to perform a specific behaviour. Intention can be measured well
in advance of actual use.
The relative advantage attribute found in Innovation Diffusion Theory(IDT)
is often considered to be the Perceived Usefulness construct in TAM, and
the complexity attribute is similar to Perceived Ease of Use concept in
TAM. This suggests that TAM and IDT reaffirm and often complement
each other.
The Social Cognitive Theory (SCT) stemmed from the Social Learning
Theory (SLT). Although there are several versions of SLT, they all share the
assumption that response consequence such as reward, or punishment
influences an individuals behaviour. This is the same idea found in TAM
that the perception of ease of use and usefulness influences people to accept
or reject a technology.
Usefulness usage relationship is relatively stronger than the ease-of-use
usage relationship (Venkatesh & Bala, 2008). This is because users are
inclined primarily to accept an application for its functionality, and secondly
for its ease of use. Users are often willing to cope with some difficulty of
use if the system provides critically needed functionality Davis, 1989.
Perceived usefulness is also influenced by perceived ease of use (Venkatesh
& Davis, 2000) because if the users find the system too difficult to use they
may not be able to overcome this hurdle in its acceptance and use, and
therefore they may never discover the usefulness of the system. If users find
the system easy to use they may quickly accept and start using it and
therefore discover its usefulness. We therefore hypothesis that:
H1 Perceived Usefulness of SA-SAMS has a significant positive
relationship with intention to use
IJCSBI.ORG
H2 Perceived Ease of Use of SA-SAMS has a significant positive
relationship with intention to use
H3 Perceived Ease of Use of SA-SAMS has a significant positive
relationship with Perceived Usefulness
IJCSBI.ORG
Social factors refer to an individual users perception of opinions or
suggestions of the significant referents about his/her behaviour. This
determines the degree to which an individual perceives the demands of
others on that individuals behaviour.
Social factors are a strong determinant of behaviour intention and a wide
range of social behaviours. Social factors have been tested empirically and
had significant direct effect on behaviour. We therefore hypothesize that:
H6 Social Factors have a significant positive relationship with
Perceived Usefulness of SAMS.
H7 Social Factors have significant positive relationship with the
Perceived Ease of Use of SAMS
3. METHODOLOGY
The data collection instrument was developed by the researcheron the basis
of previous research (Davis, 1989; Davis & Venkatesh 1995; Venkatesh &
Davis, 2000; Venkatesh & Bala, 2008), with the aim of finding out the
critical success factor for the adoption of SA-SAMS by School personnel in
Limpopo Province. The questionnaire modified and applied the scales of
Ease-of-Use, Usefulness and Behavior Intention previously developed and
tested by Davis (1986,1989).A five-point Likert scale was used throughout
the questionnaire for statements that required scaling. The codes for strongly
agree (SA), agree (A), uncertain (U), disagree (D), and strongly disagree
(SD) were used throughout the questionnaire where statements required
respondents to choose one of these options. The demographic information
was requested at the end of the questionnaire to allow the respondents to
concentrate on the main survey questions first, as can be seen in Appendix
A.
3.1 Data Collection
Limpopo Province has implemented SA-SAMS in Dinaledi schools. This
study was based on these schools where the SA-SAMS was implemented.
The appropriate sampling method in this situation was the
purposive/judgmental sampling because sometimes it is appropriate to select
a sample on the basis of the knowledge of a population its elements and the
purpose of the study. The respondents in this study were all school
personnel including principals, teachers as well as clerks/secretaries.
The questionnaire was designed in two stages pre-pilot and pilot study. The
questionnaire was pre-tested in full two times. The Pretest survey was
conducted with Tshwane University of Technology statistical services and
with three colleagues with PhDs and with 15 academics. Based on the two
pretests surveys above it was concluded that the measurement scales in the
draft questionnaire had acceptable level content face validity. The
IJCSBI.ORG
questionnaire was then piloted with school personnel in the three Dinaledi
Schools in the Capricorn District of Limpopo Province.
A total of 1020 final questionnaires was distributed to school personnel of
all the 51 Dinaledi schools in Limpopo Province. The questionnaires were
hand delivered and collected by the researcher. Of the 513 responses
received 418 were usable for analysis.
The cohort of 418 respondents consisted of 224 (54%) men and 194 (46%)
women. Their modal age group was from 36 to 45 (48%), followed by the
age group from 46 to 55 (26%). The majority176 (42%)of the respondents
held teaching diplomas and 122 (29%) held bachelor degrees. Only 86
(20%) of respondents held postgraduate degrees. Their reported positions
indicated that 33 (8%) of the respondents occupied management positions
(principals and deputy principals); 143 (31%) were heads of departments;
the majority, 226 (54%), were teachers as expected, and 16(4%) were
clerks/secretaries.
3.2 Statistical Procedure
Descriptive statistical analysis was implemented using SPSS 18.0. In order
to test the hypotheses by structural equation modeling (SEM), AMOS 18
was employed. Structural equation modeling (SEM) generally consists of a
measurement model and a structural model. The measurement model
specifies the rules governing how the latent variables are measured in terms
of observed variables; the measurement model relates the measured
variables to the indicators. The measurement model is sometimes referred to
as confirmatory factor analysis.
The structural equation model is a flexible comprehensive model that
specifies the pattern of relationships among independent and dependent
variables. Hypothesized relationships among the constructs (latent
variables) are called the structural model. The structural portion of the SEM
model refers to the direct and indirect effects among latent variables
(constructs) and observed variables (factors).
3.3 Analysis of the Measurement Model
In the measurement model both convergent and discriminant validity were
checked. Convergent validity implies the degrees to which indicators of a
factor that are theoretically related should correlate highly. All factor
loading (lambda and lambda) exceeded0.70. Discriminant validity was
confirmed by examining correlations among the constructs. A correlation of
0.85 or higher indicates poor discriminant validity in SEM. The results of
this study suggest adequate discriminant validity. The correlation matrix is
shown in appendix B.
IJCSBI.ORG
In order to secure accuracy and consistency, reliability tests were carried out
using Cronbachs alpha () for each construct. Table 1 shows the
Cronbachs alpha () for each of the three constructs. Each construct
suggested that the value of was above 0.70.
Table 1: Reliability Coefficients of Scales (Cranachs Alpha)
No. of Cronbachs
Variable
Items Alpha
Perceived
Usefulness 5 0.95
(PU)
Perceived
Ease of Use 6 0.92
(PEOU)
Facilitating
Conditions 4 0.88
(FCond)
Social
Factors 5 0.92
(SoFact)
Behaviour
Intention 3 0.91
(BI)
(N = 418, Scale = 5-
point Likert scale).
IJCSBI.ORG
Table 2. Measures of fitness
Fit Value Recommended
measures Value
2 461.7 p>.05
(p=000)
RMSEA .112 <.05
GFI .917 >.90
NFI .903 >.90
IFI .917 >.90
The general structural model was used to test the bivariate relationships
between the constructs in the model. Hypothesis testing was conducted
within the context of SEM. The relationship between two constructs could
be examined while holding other constructs in the model constant.
Hypotheses were examined by confirming the presence of a statistically
significant relationship in the predicted direction as shown in Table 3.
SA-SAMS ease of use (PEOU) was found to be non-significant in
predicting behavior intention (BI) to use SA-SAMS. Usefulness of SA-
SAMS (U)was significant in predicting BI and accounted for a 45%
variance.Social Factors and Facilitating Conditions are insignificant in
determining ease of use of SAMS. The two external factors only facilitating
conditions were identified to be significant. PU and PEOU are both
significant in relation to BI.
Table 3. Hypotheses test
Regression Indirect Direct p- Hypothesis
HYPOTEHEIS
Weight Effect. Effect. Value Results
PEOU <--- Supported
.164 .000 .495 ***
FCond (H5)
PEOU<--- SoFact Not
.028 .000 .102 .039
(H7) Supported
PU<--- PEOU Supported
.494 .002 .000 ***
(H3)
PU<--- FCond Not
-.034 . 279 .118 .026
(H4) Supported
IJCSBI.ORG
Regression Indirect Direct p- Hypothesis
HYPOTEHEIS
Weight Effect. Effect. Value Results
(H6) Supported
BI<--- PU (H1) .490 .000 .449 *** Supported
BI<--- PEOU Supported
.156 .253 .163 .010
(H2)
4. RESULTS
The results of the survey indicated that respondents with less than five years
computer experience numbered 125 (54%). The age bracket 36-45 indicated
that the levels of computer literacy were very low, compared to the level of
education recorded as99.8% tertiary education qualification. More than half
of the respondents, 230 (55%) had never used the SA-SAMS even though it
has been already five years since SA-SAMS was implemented in the
Dinaledi schools. Only 16 (4%) of the respondents classified themselves as
expert frequent users and 227 (73%) regarded themselves as non-users. Out
of those 27% who used the SA-SAMS, 162 (58%) used it only once a
month, and 48 (17%) used it more than four times a week. This indicated
low levels of use of SA-SAMS.
School personnel in Limpopo Province are not using SA-SAMS The results
indicated that school personnel rejected SA-SAMS on the basis of social
factors which included the fact that SAMS was introduced to help the
department at the expense of the teachers who had to do the training at their
own time and travel to the training venues at their own expense. In addition
the teachers indicated that they did not find SA-SAMS easy to use, due to
their low level of computer literacy. The teachers have also indicated that
the training they received was not relevant to them, as they were not
consulted in designing the training program and implementation of SA-
SAMS. The training was not targeted to the address the needs of the
teachers. Teachers indicated that they believed SA-SAMS would help them
with how they keep their register and improve their marks processing. The
perception of SAMS being difficult to use seems to be discouraging the
school personnel from using SA-SAMS with the result that they are not
experiencing it advantages. This study has shown that the implementation of
SA-SAMS in Limpopo province was a total failure, which refers to an
initiative never implemented or a case where a system is implemented and
immediately abandoned. The South African school environment is highly
unionized. In the press release of the African National Congress, the ruling
party in South Africa, in October 2009 entitled ANC appalled by SADTU
strike threat in Soweto the ANC indicate that it was appalled by the
IJCSBI.ORG
conduct of SADTU by threatening strike action set to disrupt examinations
in Soweto and further deplore that week`s irresponsible act by hundreds of
Soweto teachers who abandoned lessons to discuss deductions on their
salaries.
Naidu reported in the Star newspaper that the South African Democratic
Teachers' Union (SADTU) say they are ready to challenge the KwaZulu-
Natal Education Department after it issued them with a court order
preventing them from continuing their strike action. This is a clear
indication that social factors have a great bearing on the South African
school personnel.
5. CONCLUSION
To manage well, one needs a strategic plan, which will guide all the actions
of the organization. This strategic plan for implementing a new system
should include a change management plan. Without change-management a
system may be rejected despite its technical superiority because of peoples
natural inclination to resist change. Management support has proven to be
an important factor for promoting the acceptance of a new innovation. Lack
of visible support from the Limpopo Department of Education has resulted
in the failure of SA-SAM implementation in the provincial schools. The
junior staff members that were given the responsibility to spearhead the
implementation of the SA-SAM employed the trail-and-error strategy,
which has led to the rejection of SA-SAMS by school personnel. The roll
out of the implementation of SA-SAMS was done without a project
management tool or system. The training of school personnel should be
targeted to the needs of the teachers and not general, based on the needs of
officials tasked to implement the system. According to the teachers the
training was supposed to include in-depth training in Windows as well as
application programs such as word processing and spreadsheets. The
teachers felt that they were treated as junior partners and therefore not
respected.
The human factor in the implementation of new systems is sometimes more
important than the technical factors as it has shown in the case of Limpopo
province implementation of SA-SAMS.
REFERENCES
[1] Anderson, E. and Dexter, S., 2005. School Technology Leadership: An empirical
investigation of prevalence and effect. Educational Administration Quarterly, Vol. 41,
No.1, pp.4982.
[2] Bagozzi, R.P., 2007. The Legacy of the Technology Acceptance Model and a
Proposal for a Paradigm. Shift. Journal of the Association for Information Systems,
Vol. 8, pp.244254.
IJCSBI.ORG
[3] Bialobrzesk, M. and Cohen, S.,2005. Managing ICTS in South African schools: A
guide for School Principals.
[4] Chai, C.S., Hong, H.Y. and Teo, T.,2009.Singaporean and Taiwanese Pre-service
Teachers' beliefs and their attitude towards ICT use: A comparative study. The Asia-
pacific Education Researchers, Vol. 18, No. 1, pp. 117128.
[5] Davis, F., 1986.Technology Acceptance Model for Empirically Testing new End-User
Information Systems: Theory and Results. PhD thesis, MIT.
[6] Davis, F., 1989. Perceived Usefulness, Perceived Ease of Use, and User Acceptance
of Information Technology. MIS Quarterly, Vol. 13, No. 3, pp. 319340.
[7] Davis, F. and Venkatesh, V., 1995. Measuring User Acceptance of Emerging
Information Technologies: An Assessment of Possible Method Biases. In Proceedings
of the 28th Annual Hawaii International Conference on System Sciences, pp.727-736.
[8] Demir, K., 2006. School Management Information Systems in Primary Schools. The
Turkish Online Journal of Education Technology, Vol. 5, No. 2, pp.113.
[9] Flanagan, L. and Jacobsen, M., 2003.Technology Leadership for the twenty-first
century Principal. Journal of Educational Administration, Vol. 41, No. 2, pp.124142.
[10] Gxwati, N.I., 2011.The Education Management Information System of the Free State
Department of Education - A Systems Analysis. Masters thesis, University of
Stellenbosch.
[11] Heeks, R., 2002. Information systems and developing countries: failure, success, and
local improvisations. The information society, Vol. 18, pp.101112.
[12] Lee, A., 2004.Technology acceptance model past and future. Communications of the
Association for Information Systems, Vol.12, pp. 752780.
[13] Mentz E., and Mentz, K., 2003. Managing technology integration into schools a
SouthAfrican perspective. Journal of Educational Administration, Vol. 41, pp.86200.
[14] Mokwena, S., 2010. Turning technology presence into technology use: the case of
South Africa. In Z. Abas et al. (Eds.), Proceedings of Global Learn Asia Pacific,
pp.495-501. AACE.
[15] Pynoo, B., Devolder, A.,Tondeur, J., Van Braak, J.,Duyck, W. and Duyck,
P.,2010.Predicting secondary school teachers acceptance and use of a digital learning
environment: A cross-sectional study. Computers in Human Behavior, Vol. 27 No.1,
pp.568575.
[16] Bisaso R., Kereteletswe, O., Selwood A, and Visscher, J.,2008.The Use of
Information Technology for Educational Management in Uganda and Botswana.
International Journal of Educational Development, Vol. 28, No. 6, pp.656668.
[17] South Africa. 1996. South African Schools Act, no. 84 of 1996. 15 November.
[18] South Africa. 2006. Department of education, user guidelines on how to get started
with SA-SAMS School Administration and management information system.
[19] South Africa.2006. User Guidelines on how to get started with SA-SAMS School
Administration and management information system. Department of Education.
[20] South Africa.2007. Education Management Information System (EMIS); ensuring
quality through education districts.
[21] South Africa.2011. Dinaledi Schools, Thutong portal learning support space.
IJCSBI.ORG
[22] South Africa.2011. National Assembly for written reply question 229, 02 September. .
[23] South Africa Department of Education. 2004. Draft white paper on E-education. In
Government Gazette, (General Notice 1869) : 26734:6-35, Aug. 26. Government
Printer Pretoria.
[24] Telem, M.,1996.MIS implementation in schools: A systems socio-technical
framework. Journal of Computers and Education, Vol. 27,No. 2, pp.8593.
[25] Telem, M., 2001. Computerization of School Administration: Impact on the
Principals role - A Case Study. Journal of Computers and Education, Vol. 37,
pp.345362.
[26] Telem, M., 2005. The Impact of the Computerization of a High Schools Pedagogical
Administration on Homeroom Teacher-Parents Interrelations: A Case Study. Journal
of Teaching and Teacher Education, Vol.21, No. 6, pp.661678.
[27] Van Wyk, C.,2006. The Development of an Education Management Information
System from a Sense making Perspective and the Application of Quantitative Methods
to Analyze Education Data Sets. PhD thesis, University of Stellenbosch.
[28] Venkatesh, V. and Davis, F.,2000.A Theoretical Extension of the Technology
Acceptance Model: Four longitudinal field studies. Management Science, Vol. 46, No.
2, pp.186204.
[29] Venkatesh, V., and Bala, H., 2008. Technology Acceptance Model 3 and a Research
Agenda on Interventions. Journal of compilation, Decision science institute, Vol.
39,No. 2, pp.273315.
[30] Visscher, A. J., 1991. School Administrative Computing: A framework for analysis.
Journal of Research on Computing in Education, Vol. 24, No. 1, pp.19.
IJCSBI.ORG
APPENDIX A: The Questionnaire
B PERCEIVED USEFULNESS
IJCSBI.ORG
publishing marks
U5 Overall SA- SA A U D SD
SAMS will be
very useful
C PERCEIVED EASE OF USE
Based on my knowledge of SA-SAMS
E1 Learning to operate SA A U D SD
SA-SAMS is easy
for me
E2 It is easy to do the
SA A U D SD
school timetables
with SA-SAMS
E3 SA-SAMS makes SA A U D SD
processing marks
easy
E4 It is easy to publish SA A U D SD
student marks with
SA-SAMS
E5 It is easy to learn SA A U D SD
the different aspects
of SA-SAMS
E6 My interaction with SA A U D SD
SA-SAMS is clear
and understandable
D. INTENTION TO USE SA-SAMS
IJCSBI.ORG
E SOCIAL FACTORS
E2 The school SA A U D SD
management
E3 Head Office SA A U D SD
SAMS staff
E4 My subordinates SA A U D SD
F PERSONAL INFORMATION
We are requesting the following personal information about you to help us in the data analysis. You
will not be identified with any information provided. Please tick the appropriate box for your
response.
IJCSBI.ORG
APPENDIX B: Correlation Matrix
U1 U2 U3 U4 U5 E1 E2 E3 E4 E5 E6 BI1 BI2
U2 .72
1
U3 .67 .77
7 7
U4 .63 .77 .87
6 3 8
U5 .63 .75 .78 .78
9 6 5 8
E1 .41 .40 .36 .37 .39
6 5 7 8 9
E2 .42 .59 .55 .54 .55 .56
0 2 1 4 4 6
E3 .39 .51 .62 .55 .54 .49 .77
8 7 1 7 3 5 7
E4 .38 .53 .61 .64 .61 .50 .75 .84
2 4 0 2 6 2 8 2
E5 .39 .48 .46 .47 .48 .61 .64 .63 .69
1 3 4 1 3 0 2 0 0
E6 .37 .43 .42 .42 .44 .70 .64 .55 .58 .73
8 9 8 0 3 4 4 1 4 8
BI .39 .43 .46 .43 .47 .35 .41 .37 .44 .39 .39
1 7 7 0 1 7 8 1 5 4 5 0
BI .37 .40 .44 .42 .43 .29 .39 .35 .39 .33 .36 .72
2 4 2 0 4 8 0 1 4 7 6 9 0
BI .32 .39 .40 .40 .37 .22 .36 .34 .38 .28 .30 .64 .75
3 5 5 6 7 7 7 6 0 3 9 4 3 1
IJCSBI.ORG
Suhas H. Patil
Professor and Head
Bharati Vidyapeeth University College of Engg,Pune
Jyoti S. Tryambake
PG Student
Department of IT, SCOE, Pune
ABSTRACT
In a Wireless Sensor Network (WSN), Security is a key challenge due to its dynamic
topology, open wireless medium, lack of centralized infrastructure, intermittent
connectivity, resource constrained sensor nodes. These weak entities make WSN easily
compromised by an adversary to device abundant attacks resulting in disastrous
consequences. Black Hole can be one of them wherein it exploits a trustworthiness of a
network by promising routing of data packets to the destination knowing that it has a
shortest path but in reality it drops all packets and consequently threatens reliability. In
order to accomplish secure packet transmission, an efficient and trust based secure protocol
is proposed to defend against single and cooperative Black Hole attack. A proposed
protocol incorporates trust metric estimation to determine honesty of nodes during secure
path formation. A proposed system builds a Hierarchical Cluster Topology and is
experimentally evaluated to demonstrate its effectiveness in detecting and preventing
efficiently the Black Hole attacks. Besides, comparison of proposed protocol with one of
the existing approach [9] proves that proposed system is efficiently reduces possibility of
misbehaving nodes being a part of network communication process and achieves better
packet delivery ratio, throughput and less end-to-end delay. The Simulation results signify
that the proposed protocol performs satisfactorily in secure routing and is robust against
both single and cooperative Black Hole attacks in a dynamic environment.
Keywords
Wireless Sensor Network, Security, Black Hole attack, Hierarchical Cluster Topology.
1. INTRODUCTION
Wireless Sensor Network (WSN) finds its applications [1] in multiple areas
like; homeland security, environment and monitoring purposes, military,
agriculture and manufacturing tasks etc. where security is an important
IJCSBI.ORG
perspective [4] comes into picture. For an extensive wireless network, it is
not viable to observe and protect each individual node from variety of
attacks. To make entire network system unsteady attackers may perhaps
launch different types of security threats mostly during routing phase.
Attacks on routing ([2], [3]) can be done in two phases; first phase is attack
on routing protocol by jamming the flooding of information to a node. For
example, Hello flood attack, Acknowledgement spoofing etc. and another
phase belongs to attack on packet delivery mechanism by creating a
predefined path in order to direct traffic towards it. Black Hole attack [5] is
one of the examples that falsely advertises a less enough distance route to
the destination and forces entire traffic to go through Black Hole region.
Significant research effort has been spent on designing defense mechanisms
for Black Hole attack studied in [16]; which are complex, energy inefficient
and scarce to protect a network when multiple nodes act cooperatively to
perform malicious activity and may have devastating impact on overall
network. In this paper, an efficient and trust based secure routing protocol to
discover and prevent Single and Cooperative Black Hole attack is presented.
The approach is straightforward and trust based to determine honesty of
nodes in order to accomplish secure packet transmission.
Main contribution of this work is divided into three phases. In first phase,
simulations of solution proposed for Black Hole attack by Mohammad
Wazid et al. [9] is implemented. Second phase enhances the algorithm to
improve accuracy in preventing Black Hole attack. Proposed algorithm does
not give any implementation details of existing algorithm but addresses
several issues of [9] during performance. In third phase, a comparison of
proposed mechanism with the existing solution [9] is performed in terms of
performance parameters [17] such as Packet Delivery Ratio, Throughput,
End-to-end Delay.
Rest of the paper is structured as follows: Section 2 briefly survey existing
security solutions in WSN for Black Hole attack. Section 3 describes
proposed security protocol for single and cooperative Black Hole attack in a
dynamic WSN. In Section 4, performance of the proposed security solution
is evaluated and presented in the form of graphs. Section 5 concludes the
paper.
2. RELATED WORKS
To encounter a single as well as team of Black Hole attacks, Karakehayov
Z. [6] has suggested a REWARD (Receive, Watch, Redirect) method with
the help of two broadcast messages; MISS and SAMBA to identify Black
Hole nodes. This method works well for different levels of security. Tiwari
M. et al. [7] have introduced the concept of watchdogs to watch behavior of
nodes that facilitates further to detect malicious nodes performing
anonymous activity. D S. et al. [8] have proposed a novel approach to
IJCSBI.ORG
improve data delivery in the presence of a Black Hole attack that uses
concept of multiple base stations deployed in WSN using mobile agent. The
purpose of multiple base stations is to ensure high packet delivery in the
presence of attack. Atakli I. M., Hu H. et al. [11] have developed a
Weighted Trust Evaluation (WTE) mechanism for hierarchical sensor
network architecture. This mechanism is applied to Cluster Head at every
cycle to detect anonymous activity. Dr. Virmani D. et. al. [12] proposed an
exponential trust based mechanism to detect malicious node. Trust factor
drops exponentially with each consecutive packet dropped which helps in
detecting the malicious node. Janani C et. al. [13] introduced TARF a robust
trust aware routing framework for WSNs mainly protects a WSN against the
replay attacks and also, proved to be powerful against strong attacks such as
wormhole attacks and Sybil attacks. An innovative approach is proposed by
Athmani S. et al. [10] based on periodic control message exchange
mechanism between a sensor node and a base station. This mechanism
requires a bit energy load due to packet exchange scheme.
Wazid M. et al. [9] considered a tree topology in WSN for their work and
invented a detection and prevention mechanism for Black Hole attack. This
tree topology consists of sensor nodes, router nodes and a coordinator node
(CO). Coordinator node supervises all nodes in the network, carries out
authentication phase and thus detects the intruder node if any in the network
with the help of waiting time parameter. The mechanism [9] has come
across several shortcomings such as this algorithm works for static sensor
network and did not consider mobility of nodes. Indeed, a Black Hole node
is removed from particular cluster but in future it may affect another cluster
as a result, there are very less chances for WSN to become completely safe
against Black Hole attack. Besides, this method is not suitable for
cooperative Black Hole attack. This paper simulates proposed system that
improves the existing solution [9] and makes it more efficient and accurate
to prevent Black Hole attacks. At the end, a performance is measured both
for proposed and existing system.
3. PROPOSED SECURITY SOLUTION
Basic idea is to develop robust and reliable solution to detect and prevent
Black Hole attack in dynamic WSN with minimum energy consumption and
less delay. The proposed solution builds hierarchical cluster topology and
identifies single as well as cooperative Black Hole attack in a mobile
environment. Most of the solutions discussed earlier identify malicious node
only after an attack is taken place. To circumvent this situation, the existing
system [9] is improved with introducing trust model to decide a
trustworthiness of nodes going to participate in communication process.
Proposed system tries to eliminate infected and misbehaving node from
being a part of communication process. Initially, proposed security solution
IJCSBI.ORG
builds a Hierarchical Cluster Topology to achieve energy efficiency
criterion ([14], [15], [16]). Soon after, a security protocol is applied to the
network to identify any anonymous activity. Following section describes
Cluster formation, Black Hole Attack Scenario and implementation of
efficient and trust based secure protocol is elucidated thereafter.
3.1 Hierarchical Cluster Topology
Proposed system uses Hierarchical Cluster Topology consists of four levels
in WSN comprising a Sensor Node (SN), Cluster Head (CH), Coordinator
Node (CO), Base Station (BS) as shown in Figure 1.
CO1
CH5 CH7
CH6
BS SN13 SN21
SN14
SN20
SN15 SN18
SN19
SN16
CO2 SN17 CO3
CH4
SN1 CH1
CH2
SN2 CH3
SN11
SN3
SN10
SN4 SN5 SN6
SN7 SN8 SN9
IJCSBI.ORG
Efficiency: A node from the cluster having high efficiency i.e. high
battery backup can be periodically selected.
All sensor nodes are in the monitoring zone of coordinator node. CO is
mainly responsible for authentication, checking for node failure and
detection of Black Hole node if exists in the network.
Level-4: These are high-bandwidth sensing and communication nodes form
fourth level of the network and are known as the Base-Station (BS).
CH6 CH6
BS BS SN21
SN2
SN1 1 SN13 SN20
3 SN1 SN20 SN14 SN18
4 SN1 SN1 SN15
5 8 SN1 SN1
SN1 SN1 9 SN16 SN17 9
CO2 6 7 CO3 CO2
CLUSTER 1 CO3
CH4 CH4
SN1 CH1 SN1 CH1 CLUSTER 2
CH2 CH2
BBECOMES CH3 BBECOMES CH3
SN2 BLACK HOLE SN2
SN11 BLACK
SN3 HOLE SN1
SN10 SN3
1
SN4 SN5 SN6 SN1
SN7 SN8 SN9 SN4 SN5 SN6
SN7 SN8 SN9 0
(a) Single Black Hole Attack (b) Cooperative Black Hole Attack
Figure 2. Black Hole Attack
Figure 2 (a) illustrates Single Black Hole attack in the network. Sensor
nodes SN1, SN2, SN3 sense the events and report it to its Cluster Head 1
(CH1). Similarly, SN4, SN5, SN6 report to Cluster Head 2 (CH2). Later,
CH1 and CH2 aggregate collected data and forward it to Cluster
Coordinator CO. If CH2 becomes a Black Hole node then it absorbs entire
traffic towards it and drops all packets instead of transmitting to CO.
In Figure 2 (b), CH2 and SN11 Black Hole nodes work together to take
control over entire network. When a sensor node say SN2 from cluster 1 and
SN9 from cluster 2 send a route request to the destination, Black Hole nodes
CH2 and SN18 respond immediately with fake route reply packet
pretending as they are immediate neighbors to the destination and so contain
shortest path to towards it. After receiving a route reply SN2 and SN9
would reject all legitimate reply packets coming from neighboring nodes
and they start sending data packets to Black Holes believing that packet will
reach the destination. Later on, CH2 may transmit those packets to SN18
and SN18 will drop all packets and vice versa.
3.3 Black Hole Attack Detection and Prevention Using Proposed Trust
Model
As discussed earlier, a Trust for a node corresponds to its prior performance
in the form of its packet delivery and looking forward its presence into a
IJCSBI.ORG
Looping. Looping is term where node transmits and receives same packets
from neighboring nodes. Looping is evaluated because it highly affects data
packet delivery, throughput, may cause more delay and mainly cause
devastating impact on nodes energy.
3.3.1 Trust Model
Proposed Trust metric is an additional piece of action carried out in
waiting_time based Black Hole attack detection mechanism [9]. As soon as
a network is established and nodes initiate neighbor discovery procedure, a
Trust for every node is evaluated before actual Black Hole attack detection
process begins. A Trust Model is distributed in two phases; First phase is
associated with Nodes Discovery and Trust Initialization and Secondly,
Nodes Selection and Revocation are described further.
3.3.1.1 Nodes Discovery and Trust Initialization
After a specific interval nodes discovery process is carried out by sending
hello packets. A node broadcasts hello packets to discover its neighbors. On
reception of hello packets, neighboring nodes would decide trustworthiness
of a node from which they are receiving hello packets. Suppose node i
discovers its neighbors by sending hello packets. On reception of hello
packet, a node j would decide a trustworthiness of node i depending upon its
prior performance in the form of packet transmission. An initial trust metric
for a neighbor node i is initialized by calculating its packet delivery ratio.
In next case, node j has to look up the presence of node i in the loop list, if
node i is present in the loop_list then its trust value decreased by some
constant factor denoted as down. If node i is not present in the loop_list,
then increase its trust value by some constant factor say up. Add neighbor
into neighboring list and consequently updates corresponding trust value for
node i and store it into trust table.
If a node is present in the loop_list then
new_trust_ = down * trust_ ; // down = const value
Otherwise
new_trust_ = up * trust_ ; // up =const value
Update trust value for neighboring nodes
3.3.1.2 Nodes Selection and Revocation
In this phase a trustworthy node would be selected for communication and
untrustworthy node will be blacklisted. By the time, neighboring node j
receiving a route request packet from node say i, its trustworthiness would
be evaluated. To estimate this, firstly, a packet delivery ratio of a neighbor
node is calculated. At the same time, an old trust value is obtained for node
i. If the Delivery_ratio for node i is found less than old trust value of node i
then decrease the trust value for node i by some constant factor denoted as
down, and do not accept route request from node i. If trust value is found
IJCSBI.ORG
greater than its delivery ratio then increase its trust value by some constant
factor say up. Lastly update corresponding trust value for node i.
(i) A node receiving route request packet from neighboring nodes,
Obtain the Delivery_Ratio (DR_i) and trust_i values for
neighboring nodes
If (DR_i < trust_i) then
new_trust_ = down * trust_i + DR_i ;// down = const value
remove a neighboring node from a list
Otherwise
new_trust_ = up * trust_i + DR_i ; // up =const value
Update trust value for neighboring nodes
In addition, obtain the energy value for a neighbor node and verify
how much energy it has consumed till it process further.
Verification should be done for both trust and energy values.
(ii) If trust and energy values are reached beyond predetermined
trust_threshold and energy_threshold then discard a packet.
Proposed protocol runs a periodic service as similar to many routing
protocols. After a precise interval, nodes discovery process initiated which
creates neighboring nodes list. Nodes illustrate trust of their neighbors by
examining their packet delivery ratio and occurrence into loop list. Initially,
Trust metric is estimated in nodes discovery procedure that looks up for a
node in Looping. If a corresponding node is under influence of looping,
trust factor associated with it get decreased otherwise it may further be
incremented. Similar case is evaluated under route request circumstance
where Route request procedure determines energy consumption for
requested node. In this case a trust value evaluation for a node is solely
depends upon its delivery ratio. This trust metric reduces chances of a
failure or infected node to become a part of a communication process in the
network. And thus, node crossing trust threshold and consuming more
energy would be kept aside from a path generating process and so, secure
path can be formed to the destination node. Later on, Cluster Coordinator
node takes a responsibility to identify a malicious and failure node inside
the network with the help of waiting_time procedure [9].
4. SIMULATION
4.1 Simulation Environment
Proposed work is simulated using network simulator tool NS2. A network
of square surface of 10001000m2 is constructed for simulation purpose.
Initially, proposed experimental model is built on 50 nodes distributed
randomly and move arbitrarily on a simulation area. Later on, it is evaluated
for rising number of nodes such as for 75,100 and 125. All nodes have same
power level and same maximal transmission range of 100m. A CBR
IJCSBI.ORG
(Constant Bit Rate) application is attached that generates constant packets
through UDP connection. CBR packet size is preferred to be 512 bytes long.
A node initiates packet transmission from a random location and when
destination is reached a transmission process repeats after 25m/s pause.
Simulation takes place for 200 seconds. Simulation parameters are
summarized below in Table 1.
Table 1. Simulation Parameters
Parameters Values Parameters Values
Environment Area 1000 * 1000 Packet Size 512
Topology Hierarchical Cluster Energy model 100 J
No. of Nodes 50, 75, 100, 125 Pause time 25 m/s
Simulation time 200 Sec. Traffic source CBR
Transmission Range 100m Channel Type Wireless
4.2 Simulation Results
The performance of proposed protocol is analyzed against Black Hole attack
in terms of amount of data packets delivered to the Base Station and delay
caused during this transmission. For this purpose, two Black Holes are
assumed randomly deployed in a network and act individually as well as
cooperatively. With the presence of Black Holes, performance is measured
in terms of Packet Delivery Ratio (PDR), Throughput, End-to-end Delay at
several intervals for existing system [9] say Solution 1 and also for proposed
system say Solution 2 shown in following graphs.
IJCSBI.ORG
Figure 3 shows comparison of solution proposed by [9] and proposed
solution, by which several observations such as the Solution 1 [9] heavily
suffers from Black Hole attack. Figure 3(a) depicts that Solution 2 raises
PDR by 30 to 40% whereas in Figure 3 (b), Solution 2 achieves better
throughput almost twice the throughput obtained in Solution 1. However
Figure 3 (c) demonstrates impact of attack on end-to-end delay. Solution 2
accomplishes less end-to-end delay than Solution 1 since it takes less time
to find a secure route by exempting misbehaving nodes at initial stage.
In Solution 1, a node responding to route request can be selected to form a
secure path and further, a Coordinator node is responsible to detect any
anonymous activity by waiting for incoming packets over a period of time.
This procedure may introduce more delay and also affects throughput.
Whereas, Solution 2 prefers a node with its trust assessment that presents its
prior performance. If a node is observed performing well then that would be
selected to form a secure path. Consequently, it can be stated that trust based
solution mitigate significantly Black Hole attack. Evaluation of
trustworthiness of nodes gives better results as compared to waiting_time
based Black Hole attack detection procedure. Trust Metric estimation
achieves improved Packet Delivery Ratio (PDR), Throughput and obtains
less end-to-end delay. Proposed solution is additionally tested for increasing
number of nodes to examine its scalability and adaptability for real-time
scenarios. For this purpose, PDR, Throughput and Delay are investigated for
varying number of nodes and with the presence of Black Hole attack.
Following Figure 4 shows results of performance parameters for varying
number of nodes.
(a) No. of Nodes Vs Packet Delivery Ratio (b) No. of Nodes Vs Throughput
IJCSBI.ORG
Figure 4 (a), Figure 4 (b) and Figure 4 (c) signify that proposed solution
works satisfactorily for increasing number of nodes. There is no significant
difference achieved in PDR, Throughput and Delay for increasing number
of nodes. It is observed that trust based solution detects Black Hole nodes
despite rising number of nodes and proficiently scalable to real time
environment. Most importantly, to optimize effective utilization of proposed
system under real time scenarios and greater number of nodes additional
resources need to be provided.
5. CONCLUSION
Introduction of proposed efficient and secure routing protocol to identify
single and cooperative Black Hole attack chains in a self-motivated
environment and thereby generates a secure routing path from source node
to the destination node. Proposed protocol encloses a feasible trust based
solution that examines trustworthiness of neighboring nodes. This approach
keeps misbehaving nodes aside from being a part of a network
communication process before actual Black Hole detection procedure is
initiated. Proposed protocol has formed a Hierarchical Cluster Topology and
simulated at several intervals. A proposed solution as well as solution
proposed by [9] is simulated using Network Simulator Tool NS2 and
performance is analyzed in terms of Packet Delivery Ratio, Throughput and
End-to-end Delay. Simulation results depict that proposed system has been
highly effective and adaptable under dynamic environment circumstances
and accomplishes significant improvement than existing solution [9].
Additionally, a trust based solution is experimentally observed to be
scalable to medium-scale test bed environment for different simulated
conditions. A trust based system is packet traffic efficient and time efficient
as it facilitates significant improvement in data delivery for dynamic
topology with minimum delay.
REFERENCES
[1] Akyildiz I.F., Su W., Sankarasubramaniam Y., Cayirci E., Wireless sensor networks:
a survey, Elsevier Science B.V., Computer Networks 38 (2002), 393422, 2002.
[2] Goyal P., Parmar V., Rishi R., MANET: Vulnerabilities, Challenges, Attacks,
Application, IJCEM International Journal of Computational Engineering &
Management, Vol. 11, January 2011.
[3] Razak S. A., Furnell S. M., Brooke P. J., Attack against Mobile Ad Hoc Networks
Routing Protocols, University of Plymouth.
[4] T. Kavitha, D. Sridharan, Security Vulnerabilities in Wireless Sensor Networks: A
Survey, Journal of Information Assurance and Security, Vol. 5, pp. 031-044, 2010.
[5] Sen J., Koilakonda S., Ukil A., A Mechanism for Detection of Cooperative Black
Hole Attack in Mobile Ad Hoc Networks, Tata Consultancy Services Ltd.
[6] Karakehayov Z., Using REWARD to detect team black-hole attacks in wireless sensor
networks, In ACM Workshop on Real-World Wireless Sensor Networks, 2005.
IJCSBI.ORG
[7] Tiwari M., Arya K. V., Choudhari R., Choudhary K. S., Designing Intrusion
Detection to Detect Black Hole and Selective Forwarding Attack in WSN based on
local Information, Fourth International Conference on Computer Sciences and
Convergence Information Technology, IEEE, 2009.
[8] Sheela.D, Srividhya.V.R, Begam A, Anjali and Chidanand G.M., Detecting Black
Hole Attacks in Wireless Sensor Networks using Mobile Agent, International
Conference on Artificial Intelligence and Embedded Systems (ICAIES'2012) , July 15-
16, 2012.
[9] Wazid M., Katal A., Singh R., Sachan, Goudar R. H., Singh D. P., Detection and
Prevention Mechanism for Blackhole Attack in Wireless Sensor Network,
International conference on Communication and Signal Processing, IEEE, April 3-5,
2013.
[10] Athmani S., Boubiche D. E., Bilami A., Hierarchical Energy Efficient Intrusion
Detection System for Black Hole Attacks in WSNs, IEEE, 2013.
[11] Atakli I. M., Hongbing H., Yu Chen, Wei-Shinn Ku, Zhou Su, Malicious Node
Detection in Wireless Sensor Networks using Weighted Trust Evaluation, SpringSim,
2008.
[12] Dr. Virmani D., Hermrajani M., Chandel S., Exponential Trust Based Mechanism to
Detect Black Hole attack in Wireless Sensor Network.
[13] Janani C., Chitra P., Trust Evaluation Based Security in Wireless Sensor Network,
International Journal of Latest Trends in Engineering and Technology (IJLTET), Vol.
2 Issue 1, January 2013.
[14] Wei C., Yang J., Gao Y., Zhang Z., Cluster-based Routing Protocols in Wireless
Sensor Networks: A Survey, International Conference on Computer Science and
Network Technology, IEEE, 2011.
[15] Singh S., Singh M. P., Singh D. K., A Survey of Energy-Efficient Hierarchical
Cluster-Based Routing in Wireless Sensor Networks, International Journal of
Advanced Networking and Applications, Vol. 02, Issue 02, pp. 570-580, 2010.
[16] Tryambake J. S., Pathak G. R., Patil S. H., A Survey on Black Hole Attack Detection
and Prevention Methods in MANET and WSN, 3rd International Conference on
Recent Trends in Engineering and Technology (ICRTET2014), Elsevier Publication,
Vol. 1, 28-30 March, 2014.
[17] Ebenezar jebarani M.R. and Jayanthy T., An Analysis of Various Parameters in
Wireless Sensor Networks Using Adaptive Fec Technique, International Journal of
Ad hoc, Sensor & Ubiquitous Computing (IJASUC), Vol.1, No.3, September 2010.
IJCSBI.ORG
ABSTRACT
With the fast progress in mobile computing technology, there is growing strongly request
for processing real-time transaction in a mobile environment. In real-time database use in
mobile environments, mobile hosts (mobile users; mobile clients) can access shared data
without regard to their physical location and can be updated by each mobile client
independently at the same time. These conditions go to inconsistency of data. Real-time
database system use in mobile environments, provide consistency of data items is a
challenging issue in case of concurrent access. There are several concurrency control
techniques that are proposed in literature to prevent data inconsistency. General
characteristics of mobile environments like mobility, low bandwidth, limited battery power,
limited storage, frequent disconnections etc. makes concurrency control more difficult. This
paper proposed a method that based on Modified SCC-2S Algorithm in JEE architecture.
Proposed method Concurrency Control Mechanism using Modified SCC-2S Algorithm
solves write-write conflict for real-time database in mobile environment. In proposed
system, Fixed Host (FH) has Database System module to perform database operation.
Mobile Hosts (MHs) use On-Demand Mode to request data from FH. Therefore, MH can
save storage and can live as thin client. Moreover, proposed method does not need
compensating transaction for roll back transaction and can reduce memory usage in FH.
Besides, proposed method can reduce the number of miss deadlines and improve
effectiveness for concurrent transactions in mobile environment.
Keywords
concurrency control, modified SCC-2S Algorithm, fixed host, mobile host, mobile
environment
1. INTRODUCTION
In todays Information Epoch, database is essential component of any
Information system and in any environment either it is traditional,
distributed, centralized, real-time or mobile. Database is a structured way to
organize information. To manage the database, there are several methods for
accessing the database in any system. Among them, centralized databases
IJCSBI.ORG
are persistent but are inadequate of processing with dynamic data that
constantly changes [6].
Real-time Database System (RTDBS) derived from traditional database
systems and provide the same capabilities, but they are defined by timing
constraints associated with the transactions of the data. Since the data is
associated with a period of time for which the data is valid and can be
considered to represent the true state of the system at a given time [2].
Moreover, real-time database system is processing system that is designed
to manage workloads whose state is constantly changing and to stop trying
reliable responses [6]. RTDBS must process transactions and guarantee
database consistency [2].
There are two kinds of transactions in database management system.
They are read-only transactions (ROTs) and update transactions (UTs).
These transactions can have four ACID properties. These properties are
Atomicity, Consistency (Concurrency), Isolation (Independence) and
Durability (or Permanency) [1]. An update transaction (UT) is a transaction
which can perform both read and write operations on database. An ROT is a
transaction that contains only read operations which do not modify data. If
an ROT conflicts with a UT, the processing of ROT is delayed till the
corresponding UT terminates. Also, if a UT conflicts with an ROT, the
processing of UT is delayed till ROT gets the access to the objects. Also, if
a UT conflicts with another UT, the processing of UT is delayed till another
UT gets the access to the objects. As a result, the throughput performance
(number of transactions processed per second) deteriorates as data
contention increases [1].
Real-time Database System (RTDBS) used in Mobile Environment
provide information to Mobile Host (Mobile User). In mobile environment,
Mobile Users (Mobile Host) can initiate transactions and that transactions
may be executed at Mobile User (MU) or Fixed Host (FH). Most of the
transactions used in mobile environment are flat transactions. In modern
world, most applications are complex and long-running and flat transactions
could not work properly in these applications. Moreover, flat transactions
can perform only commit or rollback and cannot save intermediate results. If
transactions were rollback, the whole transaction will be restarted. To solve
this problem, proposed method (Concurrency Control Mechanism Using
Modified SCC-2S Algorithm) based on closed-nested transactions model
because nested transactions are suited for complex application and can save
intermediate result. Nowadays, Airline Businesses are very popular and
most of the users want to access this information from mobile environment.
To reach the desire destination, most of the airlines use transit. So, there is
an issue to control concurrent access in Airline Reservation System.
IJCSBI.ORG
Proposed method aims for controlling concurrent access in airline
reservation system.
The rest of this paper is organized as follows: Section 2 present
proposed method. Section 3 provides general rules for proposed method and
mathematical expression for proposed method. Section 4, analyses proposed
method and other concurrency control algorithms and section 5 draws the
conclusion.
2. PROPOSED METHOD
In proposed system, mobile user sends query using an uplink channel
(pull process). To process the request, database server (including two
databases) in Fixed Host (FH) use proposed method Concurrency Control
Mechanism using Modified SCC-2S Algorithm that avoids conflict (access
the same data). After the database operation had performed, FH returns the
result back to corresponding MH. MH does not require having Database
System (DBMS) module to perform database operations. So, MH acts as a
thin client.
If two or more transactions enter the system concurrently, the system uses
Concurrency Control Mechanism using Modified SCC-2S Algorithm to
control concurrent access. Proposed system compared proposed method
with Two-shadow Speculative Concurrency Control (SCC-2S). SCC-2S
require standby shadow if conflicts occur between transactions. In SCC-2S,
transaction with late time creates standby shadow. Standby shadow means
the copy of the original query that does not contain the portion of the query
that the primary shadow is already performed. Standby shadow creations
require extra processing power and resources. It is not suitable for mobile
environment either concurrency control is performed MHs or FH. Because
MHs has limited storage, concurrency control is performed in MH is not
suitable using SCC-2S. Similarly, concurrency control is performed in FH is
not suitable because SCC-2S requires a lot of resource to consume so FH
can become bottleneck when a lot of concurrent update occurs.
IJCSBI.ORG
retrieval) in spite of the difference of the principal and philosophical design.
The purpose of O/R mapping is to solve the Object-Relational impedance
mismatch issue and provides the seamless conversion between them
reducing the typical and complicated work from developers. It can be used
in matching with Struts, Spring, and Hibernate JEE (Java Enterprise
Edition) framework. The work of the Synchronizer is to synchronize
between threads. Transactions from mobile host enter the system as a
thread. In JEE, synchronize method can be used to control the work of
threads.
There are many kinds of lock used in database management system. They
are database level, table level, page level, row level or field (attribute) level
[4]. Proposed method performs concurrency control in row level. So,
proposed system use row level lock. So, proposed method not need to lock
database, table and page level. So, many transactions can perform database
operation concurrently. In proposed method, transaction with late times
block if conflict occurs between transactions. It cannot require creating save
point and log files. Database server can perform this work automatically and
can save intermediate result. If commit transaction release lock, it resumes
its execution form the point that conflict occurs.
T10 s Wx V/C
T20 s Rx A T2
Deadline
T21 Blocked Rx V/C
S: Begin Transaction
A:Abort
IJCSBI.ORG
Fig. 1 Schedule with a standby shadow promotion for Read-Write conflict for SCC-2S
Illustration of how proposed method works is, shown in Fig. 2, The two
mobile hosts MH1 and MH2 access the same data item x. MH1 execute
Transaction T1 to write data item x. MH2 execute Transaction T2 to write
data item x. In our proposed method, both transactions T1 and T2 start
working. When T2 attempts to write object x, a potential conflict is detected.
At this point, T2 is stop working and store previous perform result. This is
done Database Management System automatically. If T1 successfully
validates and commits, transaction T2 resumes its execution. There is no
need for standby shadow creation. So, it reduces standby shadow creation
time and memory usage.
IJCSBI.ORG
T1 s Wx V/C
T2 Conflict occur
s Wx and waiting T2
Deadline
T2 Wx V/C
Time
S: Begin Transaction
IJCSBI.ORG
transaction. The reach time for Transaction T2 (MH2) for RGN-DMK transit
is later than Transaction T1 (MH1). So, MH2 wait MH1 finish it process at
the point if conflicts occur. After finish transaction T1 (MH1) transaction T2
(MH2) resumes its operation is shown in fig 4.
T1
10 30 50 70
Conflict
NYU_RGN occur and
Waiting
T2
20 40 70
RGN_DMK DMK_DPS
T2
70 90 110
Due to the nature of network latency, processing speed and other nature,
etc conflicts can occur different time or at the same time. Moreover, in these
days most of the concurrency control mechanisms consider priority theory
to provide high response and throughput. So, proposed method added rules
for the conflicts occur at the same time. To illustrate proposed method,
proposed system use two databases in FH. Proposed method assume all
require data for transaction T1 (MH1) can get only one database and require
data for transaction T2 (MH2) need more than one database. Transaction T2
waits the end of transaction T1 and save immediate results. Fig. 5 shows
the two mobile hosts MH1 and MH2 access the same data item at the same
time and Fig. 6 illustrates proposed method with examples.
IJCSBI.ORG
T1 s Wx V/C
Conflict occur
T2 s Wx and waiting T2
T2 Wx V/C Deadline
Time
S: Begin Transaction
Fig. 5 Schedule with Write-Write conflict at the same time by proposed method
time(ms)
NPT_RGN RGN_DMK DMK_BWN
T1
10 30 50 70
RGN_DMK DMK_DPS
T2
70 90 110
Transaction T1
commit at time 70 and T2
operation start again and finish at
time 110
IJCSBI.ORG
3. GENERAL RULES FOR PROPOSED METHOD
(CONCURRENCY CONTROL MECHANISM USING MODIFIED
SCC-2S ALGORITHM)
IJCSBI.ORG
Let T = T1, T2, T3, ... , Tm be the set of uncommitted transactions in the
system. For each conflict transaction Tr in the system , a set WaitFor(Tr) is
maintained, which contains a list of tuples of the form (Ts , x), where Ts
T and x is an object of the shared database. (Ts, x) WaitFor (Tr) implies
that Tr must wait for Ts before being allowed to read or write object x. The
notation (Ts, - ) WaitFor(Tr) is used where there exists at least one tuple
(Ts , x) WaitFor(Tr), for some object x. Details of the Concurrency
Control Mechanism using Modified SCC-2S Algorithm is defined as
follows: detected, and the way they are resolved.
New transaction Tr is requested for execution, it execute without any
interrupt.
Mathematical expression for write/write conflict
Whenever a transaction Tr wishes to write an object x that has been
written by Transaction Ts, if the time of transaction Tr write an object x
is a little late than the time of transaction Ts write an object x then,
If (Ts, x) WaitFor (Tr) then add transaction Tr in the waiting list
such as (Ts, x) WaitFor (Tr).
Transaction Tr must wait Transaction Ts commit time and save it
intermediate result in the log file automatically (Database Server can
perform this work automatically). When Transaction Ts commit,
release all of its acquire lock and transfer its locks to the
transactions in the WaitFor list. At that time, transaction Tr resume
its execution and acquire the require lock.
IJCSBI.ORG
Whenever it is decided to commit transaction Ts, then release all of its
acquire lock and transfer it locks to the transactions in the WaitFor list.
IJCSBI.ORG
can get this row. That row is unavailable to other users until the acquired
user release that row . So, if conflicts occur between transactions, conflicted
transactions perform database operation again. PCC can detect conflicts
immediately when they occur and resolve these conflicts using blocking.
PCC algorithm is mostly useful in situations where it is harmful for the
record to change during transaction processing time. But, PCC is not useful
in a disconnected architecture. To use PCC in Mobile Environment,
connections are open only long enough to read or update the data, so this
method requires sustaining locks for long periods. PCC blocking based
conflict resolution policy require a lot of resource. Moreover, this method
can miss the deadlines as a result of unbounded waiting due to blocking.
When the original SCC-2S method is analyzed, it can only handle read-
write conflicts. When compares with read and write conflict, read priority is
lower than write priority. So, in this method, read transaction only executes
as a standby shadow. In real time database system, concurrent users can
encounter Read-Write conflict as well as Write-Write conflict. Therefore,
proposed system manipulates this condition. Moreover, concurrency control
methods use priority theory to increase performance and to reduce deadline.
So, proposed method also added priority theory.
IJCSBI.ORG
5. CONCLUSIONS
Most concurrency control method used for real-time database system in
mobile environment solves consistency issue (concurrent access). Proposed
method provides high respond time and throughput. Moreover, proposed
method decreases the number of missed deadlines; reduce battery power and
memory usage in the system. Moreover, MHs cannot require to have
database system module and MHs can live thin clients.
IJCSBI.ORG
REFERENCES
IJCSBI.ORG
ABSTRACT
In wireless mesh networks, the legacy stations lead to heavy congestions in network due to
buffer overflow. Using buffer control mechanisms this drawback is achieved fairly as it services
the high priority nodes first and lower priority nodes are kept waiting till back-off time period.
In order to address this problem, this paper proposes an optimized congestion scheme for
legacy nodes which will help to reduce the back-off time period of lower priority nodes and
reduce congestion considerably.
Keywords
MHCCA (modified hybrid coordination function controlled channel access), MP(Mesh point),
MPP(Mesh Portal), MAP(Mesh Access point),end-to-end delay.
1. INTRODUCTION:
Wireless Local Area Network (WLAN) mesh networking are easy to use , low
cost and very flexible because of which they have become very popular [9].
A mesh network is generally set up different in location which have limited
infrastructure in order to give connectivity in ubiquitous way. Wireless mesh
networks consist of radio nodes organized in mesh topology. It consists of mesh
clients, gateways and mesh routers. Any WLAN mesh network is consisted of
MPs (Mesh points)to provide multi-hop connectivity using the wireless
network interface so that it can be applied laptop computers and in consumer
electronic devices [8].Cell phones, laptops and few other wireless devices are
nothing but the wireless mesh clients. Mesh routers will forward the packets to
wireless mesh routers which will in turn forward the traffic to gateways. These
gateways may or may not be connected to the internet as shown in figure 1.This
traffic flow is bi-directional. Generally a mesh network is reliable and but offers
redundancy. When any node fails to operate, the rest of the nodes can still
connect with each other, directly or indirectly through one or more intermediate
IJCSBI.ORG
nodes. 802.11, 802.15, 802.16, cellular technologies or combinations of more
than one type of wireless technology are been used to implement wireless mesh
networks.
2. LITERATURE SURVEY:
Wireless LAN mesh networks are dynamically self-organized and self-
configured. This paper [4] uses the following terminology as per IEEE standard
802.11.
1) Legacy stations (STAs): legacy stations are those nodes which exist in
network but are not in use for a longer period.
2) Mesh Point (MP): MP is analogues to an access point that directs the
frames on the basis of their MAC header information.
3) Mesh Access Point (MAP): MAP in a MP having wireless LAN
functions for access points jointly with MP functions.
4) Mesh Portal (MPP): MPP is also a MP which is juxtaposed with mesh
portal with a well-equipped gateway function in order to enhance the
functionality of MP.
IJCSBI.ORG
5) IEEE 802.11 e Enhanced distributed channel access:
IEEE 802.11 e is a valid standard defined by IEEE that is specifically
used for wireless LAN networks. EDCA protocol is a prolong form of
IEEE 802.11. DCF (distributed co-ordination function) performs an
effective use of CSMA/CA to provide channel access between multiple
stations. EDCA [5] works upon priority levels or access categories.
6) IEEE 802.11 e Hybrid coordination function controlled channel
access(HCCA):
HCCF is the most advance and complex standard that is used for
wireless mesh networks. It enhances the network with advanced traffic
priority. It is well equipped with a hybrid controller (HC) i.e. medium
controller.
7) IEEE 802.11 s:
IEEE 802.11 s is reserved for mesh networks. It defines how actually a
mesh network interconnected using mesh points. It can be used for both
static as well mobile networks.
The IEEE 802.11 MAC layer provides two types access mechanisms:
Distributed Coordination Function (DCF) and Point Coordination Function
(PCF) [10]. PCF is a MAC with centralized working and so not applied in
distributed mesh networks [7].While DCF is the basic access mechanism of the
IEEE802.11 and it is based on Carrier Sense Multiple Access with Collision
Avoidance (CSMA/CA). The MAC protocol of 802.11e which is the Hybrid
Coordination Function (HCF) has supporting feature for both contention-based
and controlled channel access [11].The Enhanced Distributed Channel Access
(EDCA) mechanism implements HCF, which is nothing but an extension of the
DCF mechanism which with the help of multiple access categories (ACs)
enables distributed differentiated [6] access to various the wireless channel.
IJCSBI.ORG
to use the access media. But then, in HCCA mode, the CP will be used by
implementing CAP (Controlled Access Phase).Because priority is not assigned
amongst the accepted or requested stations.
In the HCCA, irrespective of their importance the QAP will serve all stations
according to their arrivals .That is why, a very important role is played by
admission control for both policies and mechanisms. Also since EDCA is
designed for single-hop networks then using EDCA to multi-hop networks such
as WLAN mesh network may lead to performance degradation. In WLAN
mesh networks, [1] EDCA-compliant relay access points (APs) can lead to
congestion because of the decrease in number of transmission opportunities.
The legacy stations residing in wireless mesh networks sometimes tend to cause
buffer overflow. This may lead to congestion control and degrades the
performance of the network. In order to address this problem, a congestion
control mechanism was adopted. However, few drawbacks were noticed in this
buffer control mechanism. In order to resolve this, an optimized way of
handling congestion control is been introduced in this paper.
3. PROPOSED WORK:
In wireless mesh networks, HCF (hybrid coordination function) controlled
channel access (HCCA) can be used in a modified way alias M-HCCA i.e.
modified HCCA. In this paper, an enhanced way of implementing HCCA in
order to improve its performance is proposed.
IJCSBI.ORG
Figure 3 Flowchart
The nodes with lower priority are served in that quantum slice. Due to this,
higher performance and higher throughput is achieved since fairness is
achieved.
IJCSBI.ORG
4. SIMULATION RESULTS:
4.1 Simulation Scenario:
The proposed scheme is simulated using Qualnet 4.5.1 [3] with simulation
parameters mentioned in table 1. Table 2 and 3 show the AODV statistics and
application statistics respectively. Table 4 shows CBR client and CBR server
parameters. Figure 4 shows the network scenarios without the use of ROC. The
simulation settings done to implement proposed scheme are shown in figure 5
and figure 6 shows the priority mechanism for the same. After the simulation is
performed with required settings, figure 7 shows the network topology with the
proposed scheme.
Table 1 Experimental parameters
IJCSBI.ORG
No.
1 RREQ packets initiated 69 0
2 RREQ packets retried 49 5
3 RREQ packets initiated for local 0 0
repair
4 RREQ sent for alternate route 0 0
5 RREQ received 111 77
6 RREQ discarded for blacklist 0 0
7 RREQ received by destination 6 66
8 RREP packet initiated at destination 6 66
9 RREP packet received 70 17
10 RERR packets initiated 0 0
11 RERR with n flags 0 0
12 RERR discarded 0 0
13 RERR packets received 100 4
14 HELLO message sent 0 0
15 HELLO message received 0 0
16 No. of routes selected 69 15
17 Total no of hop count 271 38
IJCSBI.ORG
IJCSBI.ORG
IJCSBI.ORG
IJCSBI.ORG
Finally it can be concluded that the proposed scheme of m-HCCA is helpful in
improving throughput and efficiency of the network and thus achieves better
network performance by providing fairness to the lower priority nodes.
6. ADVANTAGES:
1) Higher priority nodes are provided with fairness with the use of URG
pointer.
2) Lower priority nodes are not starved and are served in round-robin
fashion with specific time slice.
3) End-to-end delay is reduced.
4) Throughput and overall performance of network is improved.
7. LIMITATIONS:
1) Buffered nodes can further be served with better priority schemes.
2) Security of nodes with carrying URG pointer should be taken care
against attacks.
8. CONCLUSION:
An effective, simple and modified way of implementing HCCA congestion
control scheme for wireless mesh networks is been put forth n this paper. At
first, the analysis of the reasons behind the inefficiency and unfairness on the
nodes for transmission in wireless mesh networks was done. An experimental
setup was done in order to analyze the results and applicability of this proposed
work. The usage of URG pointer provides fairness to nodes with higher priority
for transmission. Because of this the end-to-end delay and throughput of
network is improved considerably. Thus the performance of network is
enhanced. The upcoming work in this will be studying the behavior of network
in more complex scenarios. Also the effect of variable time slice for lower
priority nodes using round-robin scheduling can be studied and worked upon as
the future scope.
9. REFERENCES:
[1] Jun, K., Shiro, S., Nobuyoshi, K., Shigeo, S. and Tutomu, M., 2013Relay Access Point
Congestion Control Scheme using Buffer Control for Wireless LAN Mesh networks. Wireless
Personal Multimedia Communications (WPMC) 16th International Symposium, pp. 1-5.
IJCSBI.ORG
[2] Saranyu, H. and Anan, P. 2010Priority based HCCA for IEEE 802.11e. International
Conference on Communications and Mobile Computing. Vol. 6,pp. 485 489.
[3] Qual Net 4.5.1 Installation Guide Version 4.5.1, University of California, Los Angeles
(UCLA), July 2008.
[4]Hidenori, A., Shinji, T. and Akira, Y., 2006 IEEE 802.11s Wireless LAN Mesh Network
Topology , NTT Docomo Technical Journal , Vol 8. No.2
[5] Yamada, A., Atsushi, F., Sadeghi, B., and Yang, L., 2006EDCA Based Congestion Control
for WLAN Mesh Networks. Vehicular Technology Conference, VTC 2006-Spring. IEEE
63rd Vol.3, pp. 1288-1292.
[6] Vasilios, A. and Costas, C. 2006Resource Control for the EDCA and HCCA Mechanisms in
IEEE 802.11e Networks. Modeling and Optimization in Mobile, Ad Hoc and Wireless
Networks, 4th International Symposium , pp. 1-6.
[7] Sadeghi, B., Yang, L. and Yamada, A.,2005 MAC Components in IEEE802.1ls IEEE802.11-
05/0167rl, March.
[8] Conner, W.S. and Agre, J., 2005 IEEE 802.11 TGs Usage Models. IEEE 802.11 Task Group
S, Submission 11-04-0662-16-000s.
[9] Matsumoto, Y., Hagiwara, J., Fujiwara, A., Aoki, H., Yamada, A., Takeda, S. and Yagyu, K.,
2004 A Prospective Mesh Network Based Platform for Universal Mobile Communication
Services. IEICE General Conference.
[11]Gu, D. and Zhang, J., 2003 QoS Enhancements in IEEE 802.11 Wireless Local Area
Networks .IEEE Communication Magazine, pp. 120124.
IJCSBI.ORG
ABSTRACT
Nowadays, we live in network area. The area through which the formation of various social
network, new communicative and informing methods are introduced to the widespread social
communications. A social network is a social structure which is made out of individuals and
meanwhile, by the pass of time, the analyzing these social network will gain increasing primacy.
In this research, one of the parameters of social network analysis called edge betweenness
centrality is introduced. Edge betweenness is an edge to compute the shortest paths between pair
of no desin the network that passes through it most frequently.In this research, to detect the
communities through edge betweenness centrality algorithm, a method is introduced in such a
way that each edge by receiving one fuzzy membership degree in the interval [1,0] the measure of
its effect on the network will be different. One of the features of this algorithm that makes it
distinguished from others is the application of fuzzy logic to detect the communities of social
network. Then by introducing the density of each cluster the density measure of the communities
graph is computed through considering the fuzzy detected structures. The finding of the
implementation of algorithm indicated that introduced algorithm to compute the density of
samples and to detect the number of mono-nodes while clustering has revealed more accuracy
rather than the related works.
Keywords
Social Networks, Community Detecting, Community Clustering, Membership Degree, Edge
Betweenness.
1. INTRODUCTION
The researches have revealed that mostly there are some common features among
real networks, such as biological systems and cooperating scientific systems.
Among these common features community structure has attracted the focus of
attention. The community system is defined to explicate the clustering of social
networks. A community structure of network can be simply divided into different
community [1]. The connection between the different nodes in community is
denser in proportion to the connection of these nodes with other nodes. Although
IJCSBI.ORG
there is not any general definition of community yet; however some accepted
measurable parameters are investigated to recognize these kinds of community
structure and their importance in determined networks to improve the efficiency
and the time of implementation [2]. But in this research study we believe that to
realize the detection of communities in social networks the priority should not be
given to the time of implementation. Of course, known that clustering is a NP
HARD algorithm, a kind of algorithm should be introduce that when we have
polynomial it can solve the problem. Therefore, giving priority to and much
attention the time of implementation can reduces the accuracy in community
detecting and will result in the fact that a number of communities that are really
present in social network be lost due to the improvement of the time of
implementation. Structure of the present paper is as follow: Next part is assigned
to review of literature. In part 3, edge betweenness centrality algorithm and its
characteristics have been described. Proposed method is presented in part 4, and
description of Simulation is presented in part 5. Finally, part 6 includes
conclusion and some future works.
2. RELATED WORKS
Clustering, put it in another term, the recognition of communities as one of
interests to the science of data mining has been investigated and studied. Usually,
a community in network is a group of nodes that their connection in intra-
community arrangement is more than to the rest of the network [3].This intuitive
definition has been formalized in a number of competing ways, usually by way of
a quality function, which quantifies the goodness of a given division of the
network into communities. Some of these quality functions measures like
modularity and normalized cuts are more common than other cases but none of
them has gained public acceptance since one criterion in all situations is not
workable. Algorithms for community discovery deal to problem as well as the
features of efficiency from different perspectives. However, this will obviously
improve a particular quality criterion. Spectral methods, Kerighan-lin (KL)
algorithm and flow-based postprocessing are examples of algorithm that attempt
obviously to particular standard quality[4].Hierarchical methods are one of the
traditional methods of community clustering. In this hierarchical clustering
method, a hierarchical structure in a tree model is dedicated to the final clusters
according to the amount of their commonness. This hierarchical tree is called
dendrogram. The methods of hierarchical clustering techniques are usually
according to Greedy and Stepwise-optimal algorithms. The clustering methods
according to productive hierarchical structure through them are usually divided
into Bottom-Up (agglomerative) and Top-Down (Divisive) algorithms[5].
Agglomerative algorithms begin to function with a node as a community in the
network and they merge similar communities in each stage. This repetitive
process continues until an ideal number of communities emerge up or the other
nodes for merging are dissimilar to one another. The divisive algorithms operate
in regressive manner, they commence to function with a complete network as a
community and in each stage determine one community then divided it into two
IJCSBI.ORG
parts and this procedure will continue until culminating in clusters containing one
member. Clauset and his associates [6] introduced a hierarchical method through
that the nodes of graph are divided according to a greedy algorithm that the
modularity resulted from this division reaches its maximum. Another method of
clustering is partitioning method. The algorithm of partitioning clustering will
gains one partition from data instead of the structure that dendrogram produces
through a hierarchical technique. The partitioning method is useful as well as in
total data collections this is one of the advantages of this method since prevents
the dendrogram structure that involves a lot of computations. One of the
problems relevant to the algorithms of partitioning is the selection of ideal
clusters number and preliminary [7]. Most of the community discovery
algorithms discussed in this section were designed with the implicit assumption
that the underlying network is unchanging. This is in the case that in real social
networks the relation among nodes changes by the pass of time and consequently
their membership in different communities will as well as change [8].
4. METHODOLOGY
This section deal with the introduction of a method applied for community
clustering in the social network graphs. Of course the intended graph in our
IJCSBI.ORG
suggested method is a kind of directed and weighted graph. The method
introduced in this research study is based on a divisive algorithm. As well as, our
suggested method is verbalized through the algorithm of edge betweenness
centrality. Considering the issue that in social network edge is the representative
of relationship between two individuals, it can be concluded that edges, the most
frequently used to compute the shortest paths pass through them, are the bridges
which much density is available on their two ends under the graph. The
difference here creates in Newman -Girvan algorithm is that the value between
two nodes will no longer be identical, but by accepting one fuzzy degree in the
[0,1] interval in proportion to other edges will be more valuable and consequently
the proportion of this edge in the edge betweenness centrality will be different. It
should be added that the degree of fuzzy membership is attributed to each edge
on the premise of the measure of the relationship among individuals in social
network. If the detecting of these edges is conducted by using the shortest paths
under created graphs in the first stage is regressively continuing, almost the
maximum of communities in graph can be detected. The stages of conducting the
suggested method are as the following:
ALGORITHM 1:BREADTHFIRSTSEARCH
1. The initial node called A, da=0 and gained the weight Wa=1.
2. Each node i in the neighborhood of A will gain the distance ofd=da+1=1 and
the weight of Wi= Wa= 1.
3. One of the three following choices will be performed for each node j in the
neighborhood of node i:
If the node j has not receive distance to which the distance of dj= di+ 1=
1and the weight of Wj= Wi will be dedicated.
If the node j already has received the distance and dj= di+ 1, the weight of
node will Wi be increased. It means that Wj= Wj+ Wi .
If the node j has already received and dj< di+1 no operation will be
performed.
4. From the stage (3) the algorithm will be repeated as long as no node is
remained to investigate.
The weight attributed to node i, in fact, verbalize the number of independent
paths of initial node to node i. These weights are necessary to compute edge
betweenness centrality, for two connected nodes i and j (that j is more far that i
from the resource A) a fraction of the shortest paths between i and j nodes that
passes through i is determined via Wi/ Wj. Now, the following stages will be
conducted to compute edge betweenness through the all shortest paths from
resource A.
ALGORITHM 2: THE COMPUTATIONOFEDGE BETWEENESS
1. All the leaves under the title node B should be searched.
2. The amount of Wi/ Wj will be dedicated to the edges between i and j.
3. Now, the movement is performed from the farthest edges from the source A, it
means lowest level to up, towards node A. The amount of one plus the total
IJCSBI.ORG
number of graph on the neighboring edges (present lower to this edge without
mediator) is dedicated to the edge between the node i to j and the conclusion will
be multiplied by amount Wi/ Wj.
4. The algorithm will be repeated from the stage (3) until it reaches node A.
At present, this procedure, for the total number of node (n), will be repeated as
initial node and the gained conclusion in each stage to each edge will be pulsed
(aggregated) to compute total betweenness by time for all edges. All the
computations are again performed for all other edges after each time an edge is
deleted. The dependence of this algorithm on many computations will result in
the fact that it be only employed for the networks with ten thousands nodes and in
the wider networks their growth of time will be intractable. Now, after the
clustering of social network graph, the internal density of each cluster will be
computed by considering formula (1). Naturally, determining the dense time of a
cluster is performed by computing the density of graph. The under graph density
gained by the cluster is considered as intra-cluster density. In the following
formula the u and v are two intended vertexes in cluster G. The intra-cluster
density measure is computed via the following formula:
, } ,
= (1)
( 1 )
IJCSBI.ORG
After the designing the graph of collected data, the code relevant to execution is
written in Visual Basic. Net language and are executed on the collection of data
as the following:
IJCSBI.ORG
Drawing attention to the execution of suggested method the nodes of the main
graph are categorized into 6 grouping cluster.
In this section the suggested method is compared with the previous method in the
area of community detecting, especially the standard Newman and Girvan and
the algorithm of Clauset and his associates which are hierarchical methods, and
the conclusions of the research are gathered in the following table. The results of
the two algorithms became simulated using NodeXL software (version 2012).
IJCSBI.ORG
Table 1. The comparison of algorithms
Clauset-Newman- 6 0.07 2
Moore
Fuzzy Edge 6 0.21 1
Betweenness
6. CONCLUSION
In this article through modeling the social networks to a graph, in which the
nodes are the same individuals or groups and the edges are the same
communications between the individuals and groups, a huge graph containing so
many numbers of nodes and edges is created. We could explicate a new
algorithm to perform the clustering of the network and explore the structure of
community containing nodes and edges. Also, drawing attention to the point that
the nearer the density of the intra- clustering is to 1, the higher the quality of
clustering. The findings of simulation and the evaluation of density gained from
this algorithm signify the matter that the suggested algorithm is more efficient in
smaller graphs, since the smaller the graph, the more it is liable that the detected
clusters in the graph have a fewer node number and consequently, the intra-
cluster density even with fewer number of edges will quickly desire to 1. We
IJCSBI.ORG
could also reduce to much extent the number of mono-node clusters which have
undesirable effects on creating earned clusters and the average density.
FUTURE WORKS: To detect the nodes located at high degree centrality or the
nodes located to the high closeness centrality rather than the other nodes in social
network and introduce them as the centers of clusters in the algorithm of edge
centrality in Newmans algorithm. Also, the amount of the influence of a node,
called Eigenvector centrality in the graph of a social network can be introduced
and determined as the core of clusters and the leader node in the graph.
REFERENCES
[1] U. Brands, D. Delling, M. Gaertler, R. Gorki, M. Hoofers, Z. Mikulski, D. Wagner 2008. On
modularity clustering.IEEE Transactions on Knowledge and Data Engineering. 20, 2, pp. 172-
188.
[2] R. Xu 2005.Survey of Clustering Algorithms. In: IEEE Transactions on NeuralNetwork, vol.
16, no. 3:645678.
[3] M. Girvan, M.E.J. Newman 2002. Community structure in social and biological networks.
Proceedings of the National Academy of Sciences USA. 99, 12, pp. 78217826.
[4] L. Freeman 1979. Centrality in social networks: Conceptual clarification. Social Networks.
Elsevier Sequoia S.A., Lausanne - Printed In the Netherlands. 2, 2, pp. 215-239.
[5] M.E.J. Newman 2010. Networks: An Introduction. Oxford University Press; 1 edition. pp. 1-
34.
[6] A. Clauset, M.E.J. Newman, C. Moore 2004. Finding community structure in very large
networks. Physical Review E, 70, 6, pp. 66-111.
[7] P. Zhao, C. Zhang, S. Chatterjee 2011. A new clustering method and its application in social
networks, Pattern Recognition Letters, Elsevier, 32, 2109-2118.
[8] O. Green, D. Bader 2013. Faster betweenness centrality based on data structure
experimentation.International Conference on Computational Science, ICCS. Available online at
www.sciencedirect.com. Volume 18, pp. 399-408.
[9] M.E.J. Newman, M. Girvan 2004. Finding and evaluating community structure in networks.
Phys. Rev. E, 69(2):026113-026120.
IJCSBI.ORG
ABSTRACT
The ABI Research believes that the number of mobile cloud computing users is expected to grow
from 42.8 million (1.1% of total mobile users) in 2008 to 998 million (19% of total mobile users) in
2014. The security risks have become a hurdle in the rapid adaptability of the mobile cloud computing
technology. Significant efforts have been devoted in research organizations and academia to securing
the mobile cloud computing technology. In this paper we proposed a lightweight authentication
protocol for mobile cloud environment. Our proposed protocol has many advantages such as:
supporting user anonymity, local authentication and also resistance against related attacks such as
replay attack, stolen verifier attack, modification attack, server spoofing attack and so on.
Keywords
mobile cloud computing, security risks, lightweight authentication, local authentication.
1. Introduction
Due to inherent challenges of wireless communications such as insecure nature and
problems related to heterogeneity, security and privacy issues are too complex in
mobile cloud computing. And also due to energy constraints in mobile devices,
mobile users need to lightweight security mechanisms. As a security factor,
authentication methods are grouped to four classes. 1. what you are? (e.g.
fingerprint), 2. what you have? (e.g. smart cards), 3. what you know? (e.g.
passwords) and 4. what you do? or implicit authentication. Authentication is the
most important factor to protect systems against attacks. Especially in wireless
mobile communications, authentication methods should be lightweight, also
computation and communication costs should be little. Firstly lamport in 1981
proposed an authentication scheme over an open channel [1]. Chang and Wu
proposed smart cards for remote user authentication protocols [2]. Then many two
factor authentication protocols have been proposed [3-7]. Chow et al proposed an
authentication framework for mobile cloud users [8]. Their proposed authentication
scheme was implicit authentication. Schwab and li proposed an entity authentication
scheme for mobile cloud environment [9]. They used fuzzy password authentication
in their scheme. Hoon and Euiin also proposed an authentication scheme using
IJCSBI.ORG
profiling technique in mobile cloud computing [10]. The rest of the paper is
organized as follows: in Section 2, we propose our scheme. Section 3 and 4 describe
the security and performance analysis respectively. And finally section 5 concludes
the paper. The notations to be used in this paper are in Table 1.
Table 1. Notations
IJCSBI.ORG
provider and cloud service provider are fully trusted together. Proposed protocol
consists of registration phase and mutual authentication with session key agreement
phase that are described below.
2.1 Registration phase
In this phase mobile user performs registration phase via secure channel as follows.
Note that registration phase is done only once when mobile user wants to join the
mobile network.
1) The mobile user submits his/her IMSI as identity and some personal secret
information to the server.
2) Now the server checks this ID and if already exists in server database rejects it,
Mobile user must prepares unique ID. It is clear to see that in this step identity
management is provided. Now server can compute authentication key AK = H (X ||
IMSI) which X is a high entropy secret random number and H() is a collision-free
one-way hash function.
3) The server returns AK and SPMU to the mobile user, which SPMU is service
permissions of mobile network allocated to the mobile user by server.
2.2 Mutual authentication with session key agreement
After registration whenever mobile user wants to use mobile network services,
he/she must be authenticated. Hence he/she sends a login request message to the
server and then server verifies the authenticity of the login request message as
follows.
1) The mobile user generates a random number r1 and message R1 = (SPMU || r1),
then encrypts R1 by the AK. He/she sends M1 = (TMSI, EAK (R1), H (TMSI, MACLAS,
EAK (R1)) to LAS. For protecting user anonymity instead of using IMSI, TMSI is
used.
2) After receiving M1, the server computes H*(TMSI, MACLAS, EAK (R1)), then checks
H = H* for detecting modification attack. If H is not equal to H* and TMSI is not
valid, LAS aborts the current session. Hence denial of service can be eliminated.
Then decrypts the R1 and obtains the SPMU and r1. Now LAS generates r2, CertMU
and message R2 = (CertMU || r1 || r2), also it generates SK = H (TMSI || r1 || r2) and
sends M2 = (MACLAS, EAK (R2), H (MACLAS, TMSI, EAK (R2)).
3) After receiving M2, mobile user computes H*(MACLAS, TMSI, EAK (R2)) then
checks H = H* for detecting modification attack. If H is not equal to H* mobile user
IJCSBI.ORG
aborts the current session, Hence denial of service can be eliminated. Then decrypts
the R2 and obtains the CertMU, r1 and r2. Also it checks random number r1 to avoid
replay attacks. Mobile user generates SK = H (TMSI || r1 || r2), hereafter both sides
use SK for encrypting the messages instead of AK. Note that AK and SK are valid
only for this session.
IJCSBI.ORG
random number X* and generates the new authentication key AK* = H (X* || IMSI).
Now LAS sends AK* to mobile user through the secure channel.
3. Security analysis
In this section security features of our proposed protocol is presented and we
demonstrate proposed protocol can withstand against related security attacks.
3.1 No clock synchronization problem: many proposed authentication protocols use
timestamps to avoid replay attacks but timestamp mechanism is difficult and
expensive in wireless mobile communications [11] and distributed networks
[12,13,14]. Our proposed protocol is nonce-based and does not have clock
synchronization problem.
3.2 Session key agreement: in our proposed protocol a session key is generated
which uses random numbers like r1 and r2. This session key provides secure
communications over open channel by encrypting the exchanged messages.
3.3 Modification attack resistance: to avoid modification attacks in our proposed
protocol, collision-free one-way hash function is used. If an adversary sends a
modified message, recipient can easily detect it by checking the hash values.
3.4 Replay attack resistance: our proposed protocol includes random numbers to
avoid replay attacks. Guessing the value of random numbers is very hard for
attackers because they are refreshed in each session and authentication time.
3.5 Authentication key change phase: When an authentication key is leaked, mobile
user needs to a new authentication key. Our proposed protocol supports
Authentication key change phase. As mentioned after checking the validity of mobile
user, LAS selects a new random number X* and generates the new authentication
key AK* = H (X* || IMSI). Now LAS sends AK* to mobile user through the secure
channel.
3.6 Stolen verifier attack resistance: our proposed protocol is robust against stolen
verifier attack because server does not keep any secret table or any pre-shared secret
key. Hence adversary cannot gain any valuable information from this attack.
3.7 Server spoofing attack resistance: our proposed protocol provides mutual
authentication for both participants. Mobile user authenticates the LAS and also LAS
can authenticate the mobile user. Hence sever spoofing attack is ineffective.
3.8 Local authentication: as mentioned proposed scheme implements local
authentication. Local authentication has two big advantages: it saves bandwidth and
IJCSBI.ORG
removes latency.
3.9 User anonymity: user anonymity means protecting real identity of user against
public, no server [15]. Our proposed scheme satisfies user anonymity, because in the
registration phase IMSI (real identity of user) transmits through secure channel. In
the authentication phase instead of IMSI, TMSI transmits to LAS.
3.10 Parallel session attack resistance: both two identities of mobile user and LAS
exist in the hash functions of exchanged messages M1 and M2. This mechanism
prevents parallel session attack and our proposed scheme is robust against parallel
session attack.
3.11 Known plaintext attack resistance: the attacker does not know AK = H (X ||
IMSI), because IMSI transmits through secure channel in the registration phase and
in the authentication phase TMSI transmits to LAS instead of IMSI. Also X is a high
entropy secret random number that attacker cannot access it. Hence our proposed
protocol is robust against Known plaintext attack.
4. Performance analysis
In this section we evaluate the performance of our proposed protocol. Note that a
good authentication scheme for mobile cloud computing must be lightweight. In
order to be lightweight we used symmetric encryption, since it has very low
computation cost. Our proposed scheme analysis is shown in
Table 2.
Table 2. Computation cost of our scheme
IJCSBI.ORG
Comparing the two tables, it is clear to see our proposed scheme is more
efficient than LMAM. Respectively CH, CR and CSYM are hash functions cost,
random numbers cost and also symmetric encryptions cost.
5. Conclusion
In this paper we proposed a lightweight authentication protocol for mobile
cloud computing. The time for remote authentication protocol is long,
especially in the wireless mobile communications. Hence this protocol provides
local authentication. In this protocol mobile user is authenticated in his/her
mobile network, hence this mechanism provides low latency and saves
bandwidth. Also our proposed protocol satisfies user anonymity, mutual
authentication and so on. In terms of resistance against related attacks, our
proposed protocol is robust against replay attack, stolen verifier attack,
modification attack, server spoofing attack and so on. It is important to note
that, proposed protocol is according to real communication scenarios.
References
[1] L. Lamport, Password authentication with insecure communication, Communications of
the ACM 24 (11) (1981) 770772.
[2] C. Chang, T. Wu, Remote password authentication with smart cards, IEE Proceedings-
Computers and Digital Techniques 138 (3) (1991) 165168.
[3] J. Shen, C. Lin, M. Hwang, A modified remote user authentication scheme using smart
cards, IEEE Transactions on Consumer Electronics 49 (2) (2003) 414416.
[4] I. Liao, C. Lee, M. Hwang, A password authentication scheme over insecure networks,
Journal of Computer and System Sciences 72 (4) (2006) 727740.
[5] C. Lee, M. Hwang, I. Liao, Security enhancement on a new authentication scheme with
anonymity for wireless environments, IEEE Transactions on Industrial Electronics 53 (5)
(2006) 16831687.
[6] J. Xu, W. Zhu, D. Feng, An improved smart card based password authentication scheme
with provable security, Computer Standards & Interfaces 31 (4) (2009) 723728.
IJCSBI.ORG
[7] K. Yeh, C. Su, N. Lo, Y. Li, Y. Hung, Two robust remote user authentication protocols
using smart cards, Journal of Systems and Software 83 (12) (2010) 25562565.
[8] R. Chow, M. Jakobsson, R. Masuoka, J. Molina, Y. Niu, E. Shi, and Z. Song,
Authentication in the clouds: a framework and its application to mobile users, in
Proceedings of the 2010 ACM workshop on Cloud computing security workshop (CCSW),
pp. 1 - 6, 2010.
[9] David Schwab, Li Yang, Entity Authentication in a Mobile-Cloud Environment, CSIIRW
'12, Oct 30 - Nov 01 2012, Oak Ridge, TN, USA ACM 978-1-4503-1687-3/12/10.
[10] Hoon jeong, Euiin choi, user authentication using profiling in mobile cloud computing,
AASRI Procedia 2 (2012) 262 267, Doi: 10.1016/j.aasri.2012.09.044.
[11] A. Giridhar, P. Kumar, Distributed clock synchronization over wireless networks:
algorithms and analysis, in: Proceedings of the 45th IEEE Conference on Decision and
Control, IEEE, 2006, pp. 49154920.
[12] D. Mills, Internet time synchronization: the network time protocol, IEEE Transactions on
Communications 39 (10) (1991) 13931482.
[13] J. Han, D. Jeong, A practical implementation of IEEE 15882008 transparent clock for
distributed measurement and control systems, IEEE Transactions on Instrumentation and
Measurement 59 (2) (2010) 433439.
[14] R. Baldoni, A. Corsaro, L. Querzoni, S. Scipioni, S. Piergiovanni, Coupling-based internal
clock synchronization for large-scale dynamic distributed systems, IEEE Transactions on
Parallel and Distributed Systems 21 (5) (2010) 607619.
[15] D. Wanga, Chun-guang, Cryptanalysis of a remote user authentication scheme for mobile
clientserver environment based on ECC, Information Fusion 14 (2013) 498503.
[16] D. He, M. Ma, Y. Zhang, C. Chen, J. Bu, A strong user authentication scheme with smart
cards for wireless communications. Computer Communications, 34 (2011) 367374.