Friday, May 31, 2019

periodic table Essay -- essays research papers

The History of the Periodic Table of Elements Dmitri Mendeleev and the early Periodic Table Dmitri Mendeleev was natural in Tobolsk, Siberia on February 7, 1834 .He was the youngest of 14 children born to mare Dmitrievna Korniliev and Ivan Pavlovitch Mendeleev. His father was director of the local gymnasium. female horse Kornilievs family settled in Tobolsk in the early 1700s and introduced paper- and glass-making to Siberia. Unfortunately, Ivan died when Dmitri was quite young, going his wife to support the large family. The death hit them hard economically especially for a large family, which meant that Maria had no other choice just now to find work. Marias family owned a glass factory and they allowed her to take over managing the company so she could support the family. Dmitri, beingness the youngest, appears to have been his mothers favorite child and was provided as many opportunities as she could afford. From his early years, she began to save money for Dmitri to atten d the university. As he grew older, it became apparent that he had a bright future. At the age of 14, he was attending the Gymnasium in Tobolsk and his mother was continuing to plan for his future. In that year, however, a second major family tragedy occurred the glass factory burned to the ground. The family was devastated. Maria was not about to give up her dreams for her son. She knew at this point that Dmitris only hope to go on to school was to win a scholarship. So in his final years at the gymnasium, Maria pushed Dmitri to improve his grades and prepare for entrance exams. After much nagging from his mother and Bessargin, Mendeleev passed his gymnasium exams and prepared to enter the university. In 1849 they moved Moscow. At this point the family included Maria, Dmitri, and Elizabeth (Dmitris older sister). In Moscow, they entered a climate of considerable political uproar, which made the university reluctant to admit anyone from outside of Moscow. Mendeleev was rejected. Mar ia did not give up, however, and the family headed for St. Petersburg. Mendeleev was left alone to face his work at the university. Dmitri fell right into his work at St. Petersburg. Mendeleev graduated and was awarded the medal of excellence for being first in his class. Mendeleev already had his lifes ambitions in mind and, hoping to extend his life as long as possible, he moved to Simferopol in the Crimean Peni... ...spPuAmCmBkCfEsFmMdNoLr189918281917178919401940194519441949195019521953195519571961* Known to ancient civilizationsElement Groups (Families)Alkali Earth Alkaline Earth regeneration MetalsRare EarthOther MetalsMetalloidsNon-MetalsHalogensNoble Gases

Thursday, May 30, 2019

The Awakening and The Yellow Wallpaper -- Chopin Awakening Essays

Kate Chopins story The Awakening and Charlotte Perkins Gilmans story The Yellow Wallpaper draw their power from two truths First, each work stands as a political cry against injustice and at the socio/political genesis of the modern feminist movement. Second, each text is a ostiarius of a new literary history. Kate Chopin and Charlotte Perkins Gilman seem to initiate a new phase in textual history where literary conventions are alterationd to process an ideology representative of the new feminine presence. Two conventions in particular seem of central importance marriage and propriety. Donald Keesey, editor of the critical solicitation Contexts for Criticism, describes convention for us as, devices of structure and plot, techniques of character representation, and a vast reservoir of images and symbols are conventions that most Western literatures, at least, suck in in commonBut like the conventions of language, they have meaning only to those who have learned them (Keesey, 262). Literary convention is on one side the particular tool or image for example, baptism can be used as a literary a convention. It is a convention because it brings with it a set of inferences, i.e. rebirth, renewal, awakening, initiation, etc. This relation of the signifier to the signified is what Chopin and Gilman seek to revise in the conventions of propriety and marriage. The preceding definition of convention leaves us with an important question, namely, What if what the existing conventions imply is insufficient? What if, as in the case of Chopin and Gilman, the mandate (as a reflection of society at large) has failed to recognize the feminine voice? As these authors have shown us, when such is the ... ...ier. New Essays on The Awakening. Ed. Wendy Martin. Cambridge Cambridge UP, 1988. 89-106. Gilman, Charlotte Perkins, The Yellow Wallpaper, The Feminist Press, 1973. Gilmore, Michael T. gross out Against Nature The Problematic Modernism of The Awakening. Martin 59-84 . Giorcelli, Cristina. Ednas Wisdom A Transitional and Numinous Merging. Martin 109-39. Keesey, Donald, Contexts for Criticism. Mayfield Publishing Company, 1994. Martin, Wendy, ed. New Essays on the Awakening. Cambridge Cambridge UP, 1988. Papke, Mary E. Verging on the Abyss The Social illustration of Kate Chopin and Edith Wharton. Westport, CT Greenwood, 1990. Seyersted, Per. Kate Chopin A Critical Biography. Baton Rouge Louisiana State UP, 1969. Showalter, Elaine. Tradition and the Female Talent The Awakening as a Solitary Book. Martin 33-55.

Wednesday, May 29, 2019

Gay, Lesbian and Bisexual Issues - Should Same-Sex Marriage Allowed ? :: Argumentative Persuasive Essays

Should Gay Couples Be Allowed to Marry? Only in the states of Vermont and California are homosexual couples allowed to marry. Same-sex marriage is very important with gay couples and activists in todays society. On January 1, 2002, a bill became effective to give members of registered same-sex and opposite-sex couples the right to adopt a partners child. A reason why the Vermont same-sex union battle received so much nation press is because legislators were responding to a court order, while some ended up losing their jobs to same-sex unions. Religious, governing body, and social groups have debated this issue and it is taking a tenacious time for it to be resolved. Same-sex marriage has some very distinct facts and values important to ones religion, morals, or even what his or her family thinks of the gay lifestyle. Many Mormons oppose gay marriage because they believe offends everything religion stands for. Also, making love to another man betrays everything that is masculine and that people fear that gay people might recruit honest people to the gay lifestyle. Many people are in favor of relate rights for homosexuals. They say that yes, gays should have the same rights in housing, jobs, public accommodations, and should have equal access to government benefits, equal protection of the law, etc (Bidstrup). Focusing more on this issue can help accelerate the outcome of recognizing same-sex marriage. Same-sex marriages should be legalized and recognized because our government guarantees equal rights for all citizens. The government says that every citizen of the United States shall receive equal rights. But, why did they pass the Defense of Marriage chip? The Defense of Marriage Act prohibits the federal government from recognizing same-sex marriages in my opinion this act is immoral and unjust because it restricts the rights of gay and lesbian citizens. The authors of Gays, Lesbians, and Family Values, Elizabeth A. Say and ma rk R. Kowalewski, are distinguished writers on the result of gays and lesbians. They both are very conservative and believe in religious rights when it comes to sexual preference. On September 10, 1996, the U.S. Senate passed the Defense of Marriage Act, which prohibits the federal government from recognizing same-sex marriages and allows soul states to refrain from recognizing them.

Hypothetical Southern White Reaction to the Distribution of the Montgom

This source was published just after, and is referring to, the arrest of Rosa may Parks on December 1st, 1955. Parks was arrested for refusing to move from her bus seat for a white passenger when asked to by the racist bus driver, James Blake. The deuce had met before in 1943 when Parks had boarded Blake?s bus from the front door, which was for whites exactly. Blake told Parks to exit the bus and re-enter from the rear door where she was supposed to but as Parks got off of the bus, Blake drove off leaving her to walk home. This defiance by Parks had created a study turning point in civilian rights by sparking the start of the civil rights movement.This source shows us what life was like for the black community, specific every(prenominal)y black women, in the southern states of America. The source is a try of a leaflet distributed in 1955 by the ?Women?s political council,? an anti-segregation group, calling for a boycott on the buses in Montgomery, Alabama. The involvement of wo men in politics only angered the white segregationists further. The boycott, which was originally intended to last only a single day, lasted for a total 381 days and it only ended when the American supreme Court ruled that segregation on the buses was unconstitutional. This would occupy had a rather large impact on the business economy within Montgomery and peradventure even Alabama. Montgomery subsequently changed its laws so that buses were integrated. Even though the supreme court ruled that segregation on the buses was unconstitutional it did not overturn all of the segregation laws. The leaflet repeats the phrase ?Don?t ride the buses to work, to town, to school of anywhere on Monday? to drive home the point to the reader that a major boycott was about to start. During... ... the Ku Klux Klan the people living in that area had taken on board the message of acting as a community and kinda of hiding away in their houses from the convoy, which was what the Ku Klux Klan expect ed, many blacks came out into the streets and waved at the cars as they passed by.Most southern whites were ?pro segregation? and would have been outraged by the scattering of this leaflet. The fact it was distributed by women only added to the hate that the whites felt. To most of the southern ?pro segregation? whites, blacks were just slaves and subordinates. This level of solidarity and unity within the black community would have shocked all of the southern segregationists. I believe the whites also felt scared as the black community was beginning to have some author and influence over the economy, and I think that made most white segregationists feel insecure.

Tuesday, May 28, 2019

Faulkner’s Forefathers in the Film, William Faulkner: A Life on Paper

The role of fathers looms large in this Faulkner documentary. In terms of strictly male lineage, William Faulkner seems trapped in this sort of grey world between universe his own man and the fact that he was so much like his male ancestors. I imagine this is true of all individuals, struggling to make our modal value between ourselves as individuals and as shaped by our contexts. In Faulkners case, however, he seems conspicuously geared towards adopting those traits first shown by his ancestors, the same arrogance, a haughty pride,and a tradition to look for a fight. At the risk of psychoanalyzing far beyond my knowledge, what seemed interesting to me is how the collective Faulkner males seem content to rest on the laurels of their forefathers. Faulkners father, for example, dreams of get his fathers fortune rather than making his own. Faulkner himself loafed through numerous jobs, perhaps only waiting for the colonels writing abilities to be channeled through Faulkners own skills and establish him as a writer. The dynamics of such behavior puzzle me. Is this some sort of inher...

Faulkner’s Forefathers in the Film, William Faulkner: A Life on Paper

The role of fathers looms large in this Faulkner documentary. In terms of strictly male lineage, William Faulkner appears trapped in this sort of grey world between being his own man and the fact that he was so much like his male ancestors. I estimate this is true of all individuals, struggling to make our way between ourselves as individuals and as shaped by our contexts. In Faulkners case, however, he seems conspicuously geared towards adopting those traits startle shown by his ancestors, the same arrogance, a haughty pride,and a tradition to look for a fight. At the risk of psychoanalyzing far beyond my knowledge, what seemed interesting to me is how the collective Faulkner males seem content to rest on the laurels of their forefathers. Faulkners father, for example, dreams of inheriting his fathers fortune rather than making his own. Faulkner himself loafed through numerous jobs, perhaps only waiting for the colonels writing abilities to be channeled through Faulkners own skil ls and establish him as a writer. The dynamics of such behavior puzzle me. Is this some sort of inher...

Monday, May 27, 2019

Evaluate the effectiveness of China’s one child policy Essay

As mainland mainland china realised the need for modernisation, the one fry policy was implemented in June 1979 to achieve three main goals1. To address the broken per capita GNP by increasing the per capita income to $800.2. To accession or improve the standard of sprightliness.3. To keep Chinas total nation size from exceeding 1.2 million by the year 2000.China recognised the easiest way to achieve these goals was by restricting the population growth. That way, there would be a more likely increase in per capita income.Although several attempts have been previously made to control fertility growth, it was little as effective as it was optional and not many complied. However, Chinas one child policy was a completely different matter. By accepting the policy, you were eligible for certain privileges and if you reject it, youll have to pay a fine. These regulations helped enforce the one couple, one child idea.The one child policy proved to be a great success in urban China b ut ineffective in rural China. Regardless of their educational attainment or residence, all women generally desired two children.The one child policy worked best in urban China because of the strong organisation control and social transformations that changed the function of children and reduced the preference for sons. In an urban sample, in some(prenominal) Hebei and Shaanxi, the sex of the first child is insignificant. This lack of sex preference effect was the main ingredient for success of the one child policy.However, this was not the case in rural China where villagers were in favour of traditional preferences for sons. Although the implementation of the onechild policy caused a decline in rural fertility come out from about five to 2.4 children by making farmers realise they needed high quality labourers and not a large number, most rejected the one child certificate. With the majority going on to have a second birth, 22% having a third birth and some having a fourth or 5 th birth. These hazards in the one child policy were mainly caused by the first birth being a girl and living with parents in law.But overall, Chinas one child policy is an effective means of fertility control, despite the minor violation in rural areas. The failure of the one child policy in rural China may be a blessing in disguise. When the generation of parents of single children reach retirement age, the state willing face more financial burdens than it does now. So perhaps the Chinese peasants have saved China from an economic disaster. The current per capita income in China is around $800, the living conditions have definitely improved as most Chinese now enjoy a high standard of living and Chinas population by the year 2000 was recorded to be around 1.26 billion which slightly exceeded the set 1.2 billion mark. The one child policy was a success in that it achieved all its set goals.BibliographyLongman Science 3, BILALI BOOT COLELLA HEFFERNAN MILLER, Pearson Education Austr alia, 2000

Sunday, May 26, 2019

Lord of the Flies Lit Analysis Essay

Do novels have a deeper meaning to them than what the author writes? Golding reflects the two sides of human nature in Lord of the Flies by using resource. vision is conveyed to develop the hidden meanings of human nature through the use of specific references through the themes of light and dark imagery. Golding conveys dark imagery throughout the novel by making references to evil. From the beginning of the novel the author introduces to the reader that something sinister is impending. He uses specific language to show the reader that the boys are like approaching animals, within the diamond haze of the beach something dark was fumbling along (LOF 20). The choir in a way symbolizes a militaristic group being set forth as a companionship of boys, marching approximately in step in two parallel lines and dressed in strangely eccentric dress(LOF 20).It is evident that the choir is evil because the book is written in the World War II period and it is likely that the choir symboli zes the Nazi Party which many people would be able relate them too animals or savages. Imagery is often developed when characters in the novel are savage like. Dark imagery reveals the character Jack to be evil when, He passed like a shadow under the darkness of the tree and crouched, looking down at the trodden at his feet (LOF 53). Jack is being compared to an animal trying to hunt down his prey while crouching down. Again we can compare him to Hitler who was the leader of the Nazi party as Jack is the leader of the evil boys on the island.The darkness on the island spreads to every boy like it is within everyone. Darkness poured out, submerging the ways between the trees bowl they were dim and strange as the bottom of the sea (LOF 62). Before the boys got on the island it was a peaceful island, by acting like savages they spread darkness on the island, which is the evil in each and every one of them. The darkness was submerging or killing any goodness on the island. This is a re levant comparing to the war as well as it killed hope in good people specifically the Jews who were persecuted by another group of people who thought they were better. As darkness overtook the island it also over took Europe during the dark times of World War II. Thus, dark imagery is utilize to show men can be evil human beings.Golding uses light imagery over the course of the novel to symbolize shade over savagery. Light imagery is often shown when something good or hopeful is going to occur. The boys make a signal fire in hopes that they will be rescued, The flame nearly invisible at fist in that bright sunlight, enveloped a small twig, grew, was enriched with color and reached up to a branch which exploded with a sharp crack(LOF 45). The fire is a symbol of civilization and hope that they will get rescued which is shown through the imagery used in the quote. The comparison can be made to the genteel people during WW11. They behaved in a way that was good and moral. The Engli sh boys on the island are trying to maintain civility by doing things like making a fire. Light imagery is illustrated by portraying Simon with goodness. When he is described Golding uses a lot of light imagery, The water rose further and dressed Simons coarse hair with luminosity (LOF 169).When Golding uses words like bright when describing characters it is often because the character is good and civilized, he is often compared to Jesus Christ. Reference to the saviour is associated with hope. Hope is also something that the victims of the Nazi party had to have in order to survive. At the beginning of the novel Golding uses colors and light to describe the character of Ralph as, All the shadows on Ralphs face hero-worship green above, bright below from the lagoon. A blur of sunlight was crawling across his hair (LOF 16). Golding uses these colors to describe Ralph because he was one of the more civilized boys on the island. The comparison here can be made to describe Ralph as be ing good and bright and full of light and Jack as the opposite is dark and evil. To end, it is evident that light imagery symbolizes civilization.The two sides of human nature are evident with the use of dark and light imagery. Imagery is used as a compelling literary technique illustrating how light and dark translates into good and evil. The use of foreshadowing is an indicator of things to come, which was used as an effective legal instrument when referring to light and dark imagery.

Saturday, May 25, 2019

Sms Banking

Manoj V, Bramhe / world-wide daybook of Engineering and technology Vol. 3 (6), 2011, 472-479 SMS tack SECURE MOBILE BANKING Manoj V, Bramhe Department of In arrive atation engine room, RTM Nagpur university St. Vincent Pallotti College of Engg. And Technology, Nagpur, India telecommunicateprotected com gazump M- jargoning has emerged as one of the main division of m-commerce. diligent situateing services consists of in initializeion inquiry, nonifications and alerts, drills and payment convert. prompt found masking is utilize for connecting client handset with hope boniface for all such(prenominal) services. genuine M- shoreing coats employ by imprecates be facing security measure challenges for payment transfer jargons be utilize rock-steady payment admittance and other security measures which increases personify and infrastructure for bank but major day-to-day banking natural coverings be inquiries, notifications and alerts. The puzzle with current banking practical applications is that they calculate data directly to client in bailiwick school school text editionual matter form compromising with security. We present SMS establish safe roving banking which enhances security with minimum cost.In this approach bank hides customer proceeding data is reassure SMS using AES centro bilateral cryptographic algorithmic program and charge it customer application support handset. guest application decrypts data in stiff manner. Keywords M-banking, MD5, AES, MPIN I. INTRODUCTION M-banking arranging is one which bears all daily banking operations to customer with one click of his liquid handset with supported application. M-banking governance has potential to provide access or livery of very specific and highly necessary instruction to customer as given in 2.Growth in the M- banking comp bothing is driven by dissimilar facilities handle convenience of banking operations, greater reach to consumers and Integrati on of other m-commerce services with busy banking. In M-banking in that respect is no place restriction, it is highly shrewdness coefficient as growth of active phones atomic number 18 more than computers, it is fully personalized and private increasing execution authenticity and is 100% gettable all the duration with users. However, there ar several challenges that need to be addressed to completely utilize the benefits of the M- fixing standardized handset compatibility, security, scalability, reliability.Due to increase in use of expeditious handsets for almost m-commerce applications, Chances of nimble hacking for financial benefits are heavily increased. Currently mostly all banks in India and out location are orchestrateing text SMS directly to the customer handset for introductory bank services without whatever security which sess be accessed by either venomed person and asshole use this study for acquiring access to customer grade. OTA (Over-the-air) spry data hind end be hacked in net piddle path from bank to customer mobile handset including MPIN, a give-and-take use for user identification in M-banking.Thus there is a need of batten down and cost stiff tooth root which can be substantially provided on all types of handsets. Our objective is to provide cost effective, bushel, fast M-banking solution combining features of cryptography. In this paper we take up presented SMS based steady-going mobile banking with minimum cost using cryptography. II. M-BANKING CHANNELS M-banking can be executed using dissimilar take wish well SMS, USSD, GPRS, WAP predict based application, SIM masking. All of these conduct are employ separately or combined for various banking operations ISSN 0975-4024 decline 2011- Jan 2012 472Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 A. Short gist attend to (SMS) SMS is the simplest form of mobile banking. It is largely used for informat ion-based services. SMS has the maximum reach amongst consumers since all the mobile phones support SMS. Short meats are terminald and forwarded by SMS centres. These meanss hold in some security issues. B. unregulated Supplementary work Delivery (USSD) USSD is a technology unique to GSM. It is a capability built into the GSM standardized for support of transmitting information over the signalling channels of the GSM network.USSD provides seance-based communication. Turnaround response metres for interactive applications are gyper for USSD than SMS. In USSD, the interaction is in the form of a continuous academic term as opposed to SMS. USSD is visible(prenominal) on all handsets. C. Wireless(prenominal) Application Protocol (WAP) / General Packet Radio Service (GPRS) GPRS is a packet-switched data service available to GSM users. GPRS enables services such as WAP access, Mul clock timedia Messaging Service (MMS), and Internet communication services such as email and Wor ld Wide Web access in mobile phones. . WAP is wireless application protocol used over GPRS. It is similar to Internet banking.The consumers handset needs to be WAP enabled. WAP banking is open to similar threats as Internet banking. D. Phone-based Application Phone based applications are essential in various languages like J2ME, . moolah having advantages that it can use GPRS, USSD or SMS, MMS to carry the consumer data/instruction in an encrypted format and it is operator independent. These are secure application which re offices on supported handset. E. SIM Application Tool Kit The SIM Application Toolkit allows for the service provider or bank to house the consumers mobile banking plug-in within the SIM card. STK is the most secure regularity of mobile banking.It allows the bank to load its own encryption fall upons onto the SIM card with the banks own certain application. III. CURRENT M-BANKING Even though various channels are available for M-banking most of the banks uses SMS as basic and cheap channel for basic banking operations. Currently all banks in India like ICICI, HSBC, SBI etc are not using any encryption techniques in SMS based M-banking placement. They are using simple text based SMS for customer queries in which they directly send explanation information to customer wholly hiding some digits of eyeshade number which can be easily hacked by any hacker or seen by anyone from pith inbox.Even though some banks do provide some other channel like GPRS and WAP but cost of implementation is more and these facilities are not available on all types of mobile handset thereof there is a need of secure and cost effective solution which can be easily provided on all types of handsets. A. Issues in M-banking 1) Lack of Standards The overlook of standards gives rise to lot of local and fragmented versions of m-payments offered by various stakeholders. Standards need to address security and quiz c formerlyrns of customers as well as interoperab ility between various implementations. ) Device constraints There are technical issues related to the mobile dodges . The mobile phones suffers from various constrains like less processing power and memory, bandwidth, short battery life story , frequent disconnections, tiny screens, poor resolution and privacy issues. 3) Security Issues Securing m-Commerce is even more difficult than fit out operation. Device constraints raise the questions as to whether there leave be adequate security for users without compromising the ease of use and speed.Current real time M-banking application of various banks uses plain text meats without any security algorithm for sending data hence any spiteful user can access customer all- master(prenominal)(a) data on mobile and used it for malicious purpose thus direct sending of data is not suggestible for M-banking. SMS are prone to spoofing and there are issues related to SMS encryption. However technology manufacturers are developing improved security for applications with authentication and encryption technologies and many claims that the ISSN 0975-4024Dec 2011- Jan 2012 473 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 transaction using mobile machination is fully secure. There are many techniques for secure M-banking operations but major research work has been done on Cryptography and steganography techniques. Cryptography is a process of converting plaintext data into cipher text using cryptographic algorithms. They insure basic security requirements like authentication, confidentiality, integrity and non-repudiation. B. Basics of Short pass ServiceShort Message Service (SMS) is the ability to send and receive text substances to and from mobile telephones. SMS was launched as a part of GSM1 standard. from each one short core is up to 160 characters in length. The 160 characters can comprise of words, numbers, or punctuation symbols. Short Message Service is a st ore and forward service this means that messages are not sent directly to the recipient but via a network SMS Centre. SMS comprises two basic point-to-point services as Mobile-originated short message (MO-SM) and Mobile-terminated short message (MT-SM).Mobile-originated short messages are transported from MOcapable handset to SMSC whereas Mobile-terminated short messages are transported from SMSC to the handsets. The examine no. 1 shows a typical governing body of network elements in a GSM network supporting SMS. Fig. 1. Basic model of SMS based M-banking The benefits of SMS to proofreaders are convenience, flexibility, and seamless integration of messaging services and data access, delivery of notifications and alerts, guaranteed message deliver, reliable, low-cost communication mechanism, increased subscriber productivity, delivery of messages to ultiple subscribers at a time. The SMSC (Short Message Service Centre) is the entity which does the job of store and forward of mess ages to and from the mobile station. The SME (Short Message Entity), which is typically a mobile phone or a GSM modem, can be located in the fixed network or a mobile station, receives or sends SMS. The SMSC usually has a configurable time see for how long it exit store the message. SMS access SMS Gateway is an interface between software applications mobile networks.An SMS Gateway allows interfacing software applications to send and/or receive SMS messages over mobile network. A GSM Modem modulates outgoing digital signals from a computer or other digital device to signals for a GSM network and demodulates the incoming GSM signal and converts it to a digital signal for the computer or other digital device. IV. PROPOSED SOLUTION Current real time M-banking application of various banks uses plain text messages without any security algorithm for sending data in SMS banking hence any malicious user can access customer important data on mobile.Proposed secure M-banking is based on sym metric cryptographic techniques where common secret observe is shared among bank customer and bank waiter. Proposed Architecture consists of 4 components as Customer Mobile application, argot horde application, Bank side mobile / GSM Modem, Bank database and wireless OTA 1. Our solution uses windows mobile as client application weapons platform and . crystalise framework as legion side software. Customer interested in using M-Banking facilities has to catch up with adjustment however once with corresponding bank. Bank has all necessary details of customer in database.Bank sends Customerside mobile application developed for windows mobile to user. Application will be installed once on windows mobile supported handset. This application consists of Login screen along with get posing come upon option, card screen for bank services options, and encryption and decoding screens for outgoing and incoming secure SMS and send message screen to send SMS to server GSM handset /Mode m. Application will be updated as and when bank updates it. ISSN 0975-4024 Dec 2011- Jan 2012 474 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479Bank will have GSM mobile Handset / GSM modem affiliated to bank application server. GSM handset will be connected to application server using either Bluetooth or USB cable having SIM card installed in it which has caper of receiving, processing and replying customer SMS continuously. GSM handset/ modem are cheaper and can be easily installed but have slow speed for message handling which can be increased by connecting modem with SMSC centre over internet. inviolate M-Banking server side application is developed in windows compatible environment like VB. NET which can be installed on bank application server.Application is consisting of SMS Service, instruction get out, score Details Manage, User Request modules to receive and process secure encrypted message from customer mobile. SMS Ser vice module is responsible for retrieving and replying secure SMS cable carmatically whenever they reaches server GSM handset / Modem. Bank database consists of various tables storing customer details pertaining to his personal information, musical score information and transaction information. Bank database stores customer confidential information like his MPIN, Mobile identification pin and encryption secernates in encrypted and secure manner.We have discussed various major types of M-Banking channels as SMS, GPRS, WAP and USSD out of which every channel has own advantages and disadvantages. WAP and GPRS are good and provide school term based security but they are handset dependent and besides in rural part of India all mobile operators are not providing respective services. USSD is used along with SMS and requires separate infrastructure. Thus SMS channel is simple, easy to implement, cheaper and widely used channel which is device independent. Current SMS based M-banking s ervice has many drawbacks s SMS is inherently developed in GSM for non-sensitive message transfer among users. Mutual authentication, text encryption, end-to-end security and non-repudiation is not present in design of GSM architecture 16. Major issues with SMS based banking are SMS Spoofing which is an attack where malicious user sends out SMS message which appears to be sent by schoolmaster sender. Current SMS architecture allows hiding original senders address by altering respective country in original SMS header. Also SMS has encryption only during path from base transreceiver station and mobile station. End-to-end encryption is not available.V. IMPLEMENTATION We have use proposed solution in . NET platform for windows mobile in windows environment. Customer mobile application in . NET framework runs on supported windows mobile handset for which we have used HTC mobile and bank server application is running in . NET along with any GSM handset connected in Bluetooth / USB mode to it. We have added secure SMS structure which provides tautological security along with satisfying security parameters. This secure SMS will add extra security features like cryptographic and hashing algorithm to satisfy confidentiality, integrity, authentication and non-repudiation.Our system is based on secure SMS protocol and it uses SMS as media to send and receive encrypted information. . A. control SMS Message social structure The secured SMS message is divided into multiple demesness to accommodate for the various security checks call for for the protocol. Figure no. 2 shows the structure overview for a secure SMS message. The use of each labelled structure is explained below. Account No. Session Key Cipher Text (6 digit) (Generated From MPIN) (Plain Text + MPIN) Message Digest Fig. 2. Secure SMS message Structure Secure SMS message structure proposed by us consists of 4 fieldss as shown in above figure.Account Number It is customer account number in bank which is fi rst field used for authentication purpose. This information is stored in plain test format so that at the server end, information can be retrieved to get required keys from database. Session key It is onetime key randomly generated from customer MPIN inputted in bank server database during M-Banking registration process. This key is stored in 2nd field of message. Customer makes a request to get academic term key from his handset to bank server. Bank server will reply this with encrypted session keys stored in file, which will be stored on customer handset. ISSN 0975-4024Dec 2011- Jan 2012 475 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 Cipher Text This text is created from combination of plain text and MPIN and stored in tertiary filed of message structure. Main idea behind this is to protect data from malicious attacker. As MPIN is most important data and from which session keys are created to be used for encryption and decr yption purpose, hence it s send in encrypted manner. Message Digest Message project is used for checking integrity. Customer message digest is metrical from combination of plain text and MPIN and stored in 4th field of secure SMS.MD5 algorithm is used to account message digest on both ends. This genuine digest will be equalized with calculated digest at bank server end , if not found of same size then message will be discarded as fake transaction and no message will be send to mobile handset from which request is sent. B. direct Secure SMS from Client Mobile Whenever customer wish to make any transaction using M-banking, he will run application installed on handset and provide all necessary details. We have used 6 transactions for testing purpose and information collected from user on his handset is used to generate secure SMS.After registration customer will get mobile application installed once on his windows mobile. Customer will enter 4-digit MPIN which will be stored in server database in encrypted format using his rallying cry. For non-repudiation purpose we have added concept of one time session key. master of ceremonies uses customer MPIN to generate session key randomly and again stored them in encrypted format. Customer runs the banking application and feed details of 6-digit account number, 4-digit MPIN and 4digit password and click button to get session key. host sends generated session key to customer handset which will be stored in encrypted format on his handset.Customer goes to menu screen, chooses requires account type and type of transaction he wish to perform and goes to next screen. Mobile client application shows 4 entries on next screen consisting of session key legitimate, generated fixed plain text message depending upon transaction chosen, cipher text created from combination of plain text and MPIN and 4-part secure message. Secure SMS contains account number in plain text, session key in encrypted format, cipher text create d from plain text and MPIN and message digest calculated from message.Customer will send message to sever using as general message. C. Receiving and Replying Secure SMS from boniface Module Proposed Server is running on computer installed with required software like VB. NET, Windows mobile device centre and SDK, . NET union framework, MS-access and Server side application. Server side application has four modules as SMS Service, development Manage, Transaction Manage and User Requests. SMS service module retrieves SMS received at Server side handset and decode it to get original inquiry send by customer.Server application process query, get required data from bank database and then sends it in encrypted format to customer mobile through bank side modem. Whenever Customer sends any secure SMS containing his transaction query to server side GSM Modem, Server application automatically retrieves secure SMS and deletes it from server attached handset to avoid flooding of message inb ox. We have used ActiveX control for this purpose. Bank Server application splits received secure SMS in same 4-parts. Server reads first part, a plain text 6-digit account number and compares it with database stored account number.If match is not found, it will send message Wrong Account Number to customer handset. If account match is found then server uses 2nd part of secure SMS, which is session key send by user to decrypt tertiary part of received secure SMS. After decrypting 3rd part of SMS, server application gets combination of plaintext as customer original transaction query followed by 4-digit MPIN. Server application compares received MPIN with stored MPIN from server table if a match is not found, will send message Wrong Pin Number to customer handset.Server calculates message digest of 3rd part received using MD5 algorithm and compare it with received massage digest, 4th part of secure SMS to check for message integrity. If match is not found, server generates message o n server side simulated Transaction and sends nothing to customer side handset as it may be off any malicious user. If all security checks are proper, Server application process query of customer and get required data from database encrypts data using session key received from customer and sends automatically to customer handset.VI. EXPERIMENTAL RESULTS We have developed two applications for client and server side. Mobile client application is developed using . NET compact framework and VB. NET, installed on windows mobile supported HTC mobile device. This application is used by customer for various M-banking transactions to send encrypted secure SMS to bank ISSN 0975-4024 Dec 2011- Jan 2012 476 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 Server and gets back encrypted reply from bank Server.Client and Server side application performs symmetric encryption and decryption using 256-bit AES symmetric encryption algorithm. MD5 algori thm is used for hashing purpose. Server side bank application is developed using VB. NET it uses SMS toolkit, an ActiveX control to retrieve and process secure SMS automatically. Server side application also contains certain modules for database management of customer account and transactions Normally symmetric cryptographic algorithm dont have non-repudiation as both party shares common secret key but we have used session key concept for maintaining non-repudiation property of encryption.Since Session key is used only once and created randomly, no two users can have common session key and it is created from MPIN, a master key which customer only knows so he cannot deny that he has done transaction. We have carried out 6 types of transaction including Account Balance, Mini transactions, Cheque Book Request, Cheque tip request, Pay Bill and Fund Transfer. Following are some sample client application module. The figure no. 3 shows session key, user query in fixed plain text format, c ipher text generated from combination of plain text and his MPIN and 4-part secure SMS message generated as per format discussed.This last message is sent to server. Fig. 3. Generating 4-Part Secure Message This secure SMS is retrieved by server side SMS service module. Server application split message and decrypt it to get original transaction query of customer. This query is processed to get response data from database which is firstly encrypted and then send to customer handset. Customer handset get auto reply from server side in cipher text, which is decrypted on mobile by client side application to get server response in plain text. The Figure no. 4 shows response obtained automatically from server for account balance.This reply consists of 3 parts. First part is common session key used by server and client. Second part is cipher text received from server application in secure manner. Third part is plain text message obtained after decrypting secure message received from server . Client mobile application uses 256-bit AES algorithm to decrypt message using common session key. This message will be hidden from customer and he will only get last-place query results in plain text format but for result purpose we have shown this screen. ISSN 0975-4024 Dec 2011- Jan 2012 477Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 Fig. 4. Secure Reply from Server To be a secure system, it must satisfy Confidentiality, Authentication, Integrity and Non-Repudiation Secure SMS system maintains confidentiality using AES cryptography and Non-Repudiation using session key. Here 3-factor authentication is used for authentication and security purpose whereas Message integrity is carried out using MD5 algorithm. VII. CONCLUSION AND FUTURE WORK We have utilise a secure SMS based Mobile Banking system.The system allows user to carry out all banking transaction securely from anywhere, anytime. All messages from user windows mobile a re sent in encrypted format to bank server. Bank server decrypt message, process query and encrypt result in SMS. Server sends message to customer which will be decrypted on his handset. The evaluation of the system was studied for varying banking transaction and under various security threatening malicious activities were recorded. Performance of the transaction is studied. We have executed few banking transaction from HTC windows mobile and using VB.Net server side application. We have used LG GSM mobile as server attached mobile device. Experiments shows that secure SMS Mobile banking provides cost effective and secure system with satisfying Confidentiality, Authentication, Integrity and Non-Repudiation using symmetric cryptography. Application can be used on any windows mobile supported handset from anywhere as no GPRS and WAP are required. We have implemented system using symmetric key AES algorithm. In future better power consumption algorithm like blowfish can be tried out.St eganogrpahy can also be applied for secure M-banking transactions. We can use concept of STK, SIM application toolkit where bank can stored the application and encryption keys on SIM. REFERENCES 1 2 3 4 5 Mohammad Shirali-Shahreza and M. Hassan Shirali-Shahreza, Mobile banking Services in bank area, SICE yearly Conference 2007, Japan Martinez Borreguero, F. Javier and Chaparro Pelaez, Julian,Spanish Mobile Banking Services An Adoption Study, transactions of the International Conference on Mobile handicraft 2005.Mohammad Shirali-Shahreza,Improving Mobile Banking Security Using Steganography , International Conference On Information Technology. Przemyslaw Krol, Przemyslaw Nowak, Bartosz Sakowicz,Mobile Banking Services Based On J2ME/J2EE, CADSM2007. Yousuf S. AlHinai, Sherah Kurnia and Robert B. Johnston,Adoption of Mobile, Commerce Services by Individuals A Meta-Analysis of the Literature, Sixth International Conference on the Management of Mobile Business . ISSN 0975-4024 Dec 201 1- Jan 2012 478 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. (6), 2011, 472-479 6 7 8 9 10 11 12 13 14 15 16 T N T Nguyen, P Shum and E H Chua,Secure end-to-end mobile payment System. Ashutosh Saxena, Manik Lal Das and Anurag Gupta,MMPS A Versatile Mobile-to-Mobile payment System, Proceedings of the International Conference On Mobile Business 2005. Iuon-Chang Lin and Yang-Bin Lin,An Efficient Steganography Scheme for M- Commerce. Mohammad Shirali-Shahreza and M. Hassan Shirali-Shahreza, Text Steganography in SMS, 2007 International Conference on Convergence Information Technology.Sandeep Singh Ghotra, Baldev Kumar Mandhan, Sam Shang Chun Wei, Yi verse, Chris Steketee, Secure Display and Secure transactions Using a Handset, Sixth International Conference on the Management of Mobile Business. Jiehua Wang, Song Yuan, A Novel Security Mobile Payment System Based On Watermarked Voice Cheque. M. Shirali-Shahreza, Stealth Steganography in SMS, Proceedings o f the third IEEE and IFIP International Conference on Wireless and Optical communications Networks 2006.Kewin Chikomo, Ming Ki Chong, Alpan Arnab, Andrew Hutchison, Security of Mobile Banking. Dilla Salama Abdul Minaam. Hatem M. Abdul Kadir, Mohily Mohamed Hadhoud, Evaluating the effects of Symmetric Cryptographic algorithms on Power Consumption for different data types, International Journal of Network Security, garishness 11, September 2010. Managing the Risk of Mobile Banking Technologies, Bankable Frontier Associates. Deshpande Neeta, kamalapur Snehal, Implementation of LSB Steganography and its Evaluation for various bits. ISSN 0975-4024 Dec 2011- Jan 2012 479Sms BankingManoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 SMS BASED SECURE MOBILE BANKING Manoj V, Bramhe Department of Information Technology, RTM Nagpur university St. Vincent Pallotti College of Engg. And Technology, Nagpur, India emailprotected com Abstract M-banking h as emerged as one of the main division of m-commerce. Mobile banking services consists of information inquiry, notifications and alerts, applications and payment transfer. Mobile based application is used for connecting customer handset with bank server for all such services.Current M-banking applications used by banks are facing security challenges for payment transfer banks are using secure payment gateway and other security measures which increases cost and infrastructure for bank but major day-to-day banking applications are inquiries, notifications and alerts. The problem with current banking applications is that they send data directly to customer in plain text form compromising with security. We present SMS based secure mobile banking which enhances security with minimum cost.In this approach bank hides customer transaction data is secure SMS using AES symmetric cryptographic algorithm and send it customer application supported handset. Customer application decrypts data in s ecure manner. Keywords M-banking, MD5, AES, MPIN I. INTRODUCTION M-banking system is one which provides all daily banking operations to customer with one click of his mobile handset with supported application. M-banking system has potential to provide access or delivery of very specific and highly necessary information to customer as given in 2.Growth in the M-Banking is driven by various facilities like convenience of banking operations, greater reach to consumers and Integration of other m-commerce services with mobile banking. In M-banking there is no place restriction, it is highly penetration coefficient as growth of mobile phones are more than computers, it is fully personalized and private increasing transaction authenticity and is 100% available all the time with users. However, there are several challenges that need to be addressed to completely utilize the benefits of the M-Banking like handset compatibility, security, scalability, reliability.Due to increase in use of mob ile handsets for many m-commerce applications, Chances of mobile hacking for financial benefits are heavily increased. Currently mostly all banks in India and outside are sending text SMS directly to the customer handset for basic bank services without any security which can be accessed by any malicious person and can use this information for getting access to customer account. OTA (Over-the-air) mobile data can be hacked in network path from bank to customer mobile handset including MPIN, a password use for user identification in M-banking.Thus there is a need of secure and cost effective solution which can be easily provided on all types of handsets. Our objective is to provide cost effective, secure, fast M-banking solution combining features of cryptography. In this paper we have presented SMS based secure mobile banking with minimum cost using cryptography. II. M-BANKING CHANNELS M-banking can be executed using various channels like SMS, USSD, GPRS, WAP Phone based Application, SIM Application. All of these channels are used separately or combined for various banking operations ISSN 0975-4024 Dec 2011- Jan 2012 472Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 A. Short Message Service (SMS) SMS is the simplest form of mobile banking. It is largely used for information-based services. SMS has the maximum reach amongst consumers since all the mobile phones support SMS. Short messages are stored and forwarded by SMS centres. These messages have some security issues. B. Unstructured Supplementary Services Delivery (USSD) USSD is a technology unique to GSM. It is a capability built into the GSM standard for support of transmitting information over the signalling channels of the GSM network.USSD provides session-based communication. Turnaround response times for interactive applications are shorter for USSD than SMS. In USSD, the interaction is in the form of a continuous session as opposed to SMS. USSD is avail able on all handsets. C. Wireless Application Protocol (WAP) / General Packet Radio Service (GPRS) GPRS is a packet-switched data service available to GSM users. GPRS enables services such as WAP access, Multimedia Messaging Service (MMS), and Internet communication services such as email and World Wide Web access in mobile phones. . WAP is wireless application protocol used over GPRS. It is similar to Internet banking.The consumers handset needs to be WAP enabled. WAP banking is open to similar threats as Internet banking. D. Phone-based Application Phone based applications are developed in various languages like J2ME, . NET having advantages that it can use GPRS, USSD or SMS, MMS to carry the consumer data/instruction in an encrypted format and it is operator independent. These are secure application which resides on supported handset. E. SIM Application Tool Kit The SIM Application Toolkit allows for the service provider or bank to house the consumers mobile banking menu within t he SIM card. STK is the most secure method of mobile banking.It allows the bank to load its own encryption keys onto the SIM card with the banks own developed application. III. CURRENT M-BANKING Even though various channels are available for M-banking most of the banks uses SMS as basic and cheap channel for basic banking operations. Currently all banks in India like ICICI, HSBC, SBI etc are not using any encryption techniques in SMS based M-banking system. They are using simple text based SMS for customer queries in which they directly send account information to customer only hiding some digits of account number which can be easily hacked by any hacker or seen by anyone from message inbox.Even though some banks do provide some other channel like GPRS and WAP but cost of implementation is more and these facilities are not available on all types of mobile handset thus there is a need of secure and cost effective solution which can be easily provided on all types of handsets. A. Issu es in M-banking 1) Lack of Standards The lack of standards gives rise to lot of local and fragmented versions of m-payments offered by different stakeholders. Standards need to address security and privacy concerns of customers as well as interoperability between various implementations. ) Device constraints There are technical issues related to the mobile devices . The mobile phones suffers from various constrains like less processing power and memory, bandwidth, short battery life , frequent disconnections, tiny screens, poor resolution and privacy issues. 3) Security Issues Securing m-Commerce is even more difficult than wired transaction. Device constraints raise the questions as to whether there will be adequate security for users without compromising the ease of use and speed.Current real time M-banking application of various banks uses plain text messages without any security algorithm for sending data hence any malicious user can access customer important data on mobile and used it for malicious purpose thus direct sending of data is not suggestible for M-banking. SMS are prone to spoofing and there are issues related to SMS encryption. However technology manufacturers are developing improved security for applications with authentication and encryption technologies and many claims that the ISSN 0975-4024Dec 2011- Jan 2012 473 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 transaction using mobile device is fully secure. There are many techniques for secure M-banking operations but major research work has been done on Cryptography and steganography techniques. Cryptography is a process of converting plaintext data into cipher text using cryptographic algorithms. They insure basic security requirements like authentication, confidentiality, integrity and non-repudiation. B. Basics of Short Message ServiceShort Message Service (SMS) is the ability to send and receive text messages to and from mobile telepho nes. SMS was launched as a part of GSM1 standard. Each short message is up to 160 characters in length. The 160 characters can comprise of words, numbers, or punctuation symbols. Short Message Service is a store and forward service this means that messages are not sent directly to the recipient but via a network SMS Centre. SMS comprises two basic point-to-point services as Mobile-originated short message (MO-SM) and Mobile-terminated short message (MT-SM).Mobile-originated short messages are transported from MOcapable handset to SMSC whereas Mobile-terminated short messages are transported from SMSC to the handsets. The figure no. 1 shows a typical organization of network elements in a GSM network supporting SMS. Fig. 1. Basic model of SMS based M-banking The benefits of SMS to subscribers are convenience, flexibility, and seamless integration of messaging services and data access, delivery of notifications and alerts, guaranteed message deliver, reliable, low-cost communication me chanism, increased subscriber productivity, delivery of messages to ultiple subscribers at a time. The SMSC (Short Message Service Centre) is the entity which does the job of store and forward of messages to and from the mobile station. The SME (Short Message Entity), which is typically a mobile phone or a GSM modem, can be located in the fixed network or a mobile station, receives or sends SMS. The SMSC usually has a configurable time limit for how long it will store the message. SMS Gateway SMS Gateway is an interface between software applications mobile networks.An SMS Gateway allows interfacing software applications to send and/or receive SMS messages over mobile network. A GSM Modem modulates outgoing digital signals from a computer or other digital device to signals for a GSM network and demodulates the incoming GSM signal and converts it to a digital signal for the computer or other digital device. IV. PROPOSED SOLUTION Current real time M-banking application of various banks uses plain text messages without any security algorithm for sending data in SMS banking hence any malicious user can access customer important data on mobile.Proposed secure M-banking is based on symmetric cryptographic techniques where common secret key is shared among bank customer and bank server. Proposed Architecture consists of 4 components as Customer Mobile application, Bank Server application, Bank side mobile / GSM Modem, Bank database and wireless OTA 1. Our solution uses windows mobile as client application platform and . NET framework as server side software. Customer interested in using M-Banking facilities has to make registration only once with corresponding bank. Bank has all necessary details of customer in database.Bank sends Customerside mobile application developed for windows mobile to user. Application will be installed once on windows mobile supported handset. This application consists of Login screen along with get session key option, menu screen for bank s ervices options, and encryption and decryption screens for outgoing and incoming secure SMS and send message screen to send SMS to server GSM handset /Modem. Application will be updated as and when bank updates it. ISSN 0975-4024 Dec 2011- Jan 2012 474 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479Bank will have GSM mobile Handset / GSM modem connected to bank application server. GSM handset will be connected to application server using either Bluetooth or USB cable having SIM card installed in it which has task of receiving, processing and replying customer SMS continuously. GSM handset/ modem are cheaper and can be easily installed but have slow speed for message handling which can be increased by connecting modem with SMSC centre over internet. Secure M-Banking server side application is developed in windows compatible environment like VB. NET which can be installed on bank application server.Application is consisting of SMS Servi ce, Information Manage, Account Details Manage, User Request modules to receive and process secure encrypted message from customer mobile. SMS Service module is responsible for retrieving and replying secure SMS automatically whenever they reaches server GSM handset / Modem. Bank database consists of various tables storing customer details pertaining to his personal information, Account information and transaction information. Bank database stores customer confidential information like his MPIN, Mobile identification pin and encryption keys in encrypted and secure manner.We have discussed various major types of M-Banking channels as SMS, GPRS, WAP and USSD out of which every channel has own advantages and disadvantages. WAP and GPRS are good and provide session based security but they are handset dependent and also in rural part of India all mobile operators are not providing respective services. USSD is used along with SMS and requires separate infrastructure. Thus SMS channel is s imple, easy to implement, cheaper and widely used channel which is device independent. Current SMS based M-banking service has many drawbacks s SMS is inherently developed in GSM for non-sensitive message transfer among users. Mutual authentication, text encryption, end-to-end security and non-repudiation is not present in design of GSM architecture 16. Major issues with SMS based banking are SMS Spoofing which is an attack where malicious user sends out SMS message which appears to be sent by original sender. Current SMS architecture allows hiding original senders address by altering respective field in original SMS header. Also SMS has encryption only during path from base transreceiver station and mobile station. End-to-end encryption is not available.V. IMPLEMENTATION We have implemented proposed solution in . NET platform for windows mobile in windows environment. Customer mobile application in . NET framework runs on supported windows mobile handset for which we have used HTC mobile and bank server application is running in . NET along with any GSM handset connected in Bluetooth / USB mode to it. We have added secure SMS structure which provides extra security along with satisfying security parameters. This secure SMS will add extra security features like cryptographic and hashing algorithm to satisfy confidentiality, integrity, authentication and non-repudiation.Our system is based on secure SMS protocol and it uses SMS as media to send and receive encrypted information. . A. Secure SMS Message Structure The secured SMS message is divided into multiple fieldss to accommodate for the various security checks required for the protocol. Figure no. 2 shows the structure overview for a secure SMS message. The use of each labelled structure is explained below. Account No. Session Key Cipher Text (6 digit) (Generated From MPIN) (Plain Text + MPIN) Message Digest Fig. 2. Secure SMS message Structure Secure SMS message structure proposed by us consists of 4 field ss as shown in above figure.Account Number It is customer account number in bank which is first field used for authentication purpose. This information is stored in plain test format so that at the server end, information can be retrieved to get required keys from database. Session key It is onetime key randomly generated from customer MPIN inputted in bank server database during M-Banking registration process. This key is stored in 2nd field of message. Customer makes a request to get session key from his handset to bank server. Bank server will reply this with encrypted session keys stored in file, which will be stored on customer handset. ISSN 0975-4024Dec 2011- Jan 2012 475 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 Cipher Text This text is created from combination of plain text and MPIN and stored in 3rd filed of message structure. Main idea behind this is to protect data from malicious attacker. As MPIN is most important data and from which session keys are created to be used for encryption and decryption purpose, hence it s send in encrypted manner. Message Digest Message digest is used for checking integrity. Customer message digest is calculated from combination of plain text and MPIN and stored in 4th field of secure SMS.MD5 algorithm is used to calculate message digest on both ends. This received digest will be compared with calculated digest at bank server end , if not found of same size then message will be discarded as fake transaction and no message will be send to mobile handset from which request is sent. B. Sending Secure SMS from Client Mobile Whenever customer wish to make any transaction using M-banking, he will run application installed on handset and provide all necessary details. We have used 6 transactions for testing purpose and information collected from user on his handset is used to generate secure SMS.After registration customer will get mobile application installed once on his windows mobile. Customer will enter 4-digit MPIN which will be stored in server database in encrypted format using his password. For non-repudiation purpose we have added concept of one time session key. Server uses customer MPIN to generate session key randomly and again stored them in encrypted format. Customer runs the banking application and feed details of 6-digit account number, 4-digit MPIN and 4digit password and click button to get session key. Server sends generated session key to customer handset which will be stored in encrypted format on his handset.Customer goes to menu screen, chooses requires account type and type of transaction he wish to perform and goes to next screen. Mobile client application shows 4 entries on next screen consisting of session key received, generated fixed plain text message depending upon transaction chosen, cipher text created from combination of plain text and MPIN and 4-part secure message. Secure SMS contains account number in plain t ext, session key in encrypted format, cipher text created from plain text and MPIN and message digest calculated from message.Customer will send message to sever using as normal message. C. Receiving and Replying Secure SMS from Server Module Proposed Server is running on computer installed with required software like VB. NET, Windows mobile device centre and SDK, . NET compact framework, MS-access and Server side application. Server side application has four modules as SMS Service, Information Manage, Transaction Manage and User Requests. SMS service module retrieves SMS received at Server side handset and decode it to get original query send by customer.Server application process query, get required data from bank database and then sends it in encrypted format to customer mobile through bank side modem. Whenever Customer sends any secure SMS containing his transaction query to server side GSM Modem, Server application automatically retrieves secure SMS and deletes it from server a ttached handset to avoid flooding of message inbox. We have used ActiveX control for this purpose. Bank Server application splits received secure SMS in same 4-parts. Server reads first part, a plain text 6-digit account number and compares it with database stored account number.If match is not found, it will send message Wrong Account Number to customer handset. If account match is found then server uses 2nd part of secure SMS, which is session key send by user to decrypt 3rd part of received secure SMS. After decrypting 3rd part of SMS, server application gets combination of plaintext as customer original transaction query followed by 4-digit MPIN. Server application compares received MPIN with stored MPIN from server table if a match is not found, will send message Wrong Pin Number to customer handset.Server calculates message digest of 3rd part received using MD5 algorithm and compare it with received massage digest, 4th part of secure SMS to check for message integrity. If matc h is not found, server generates message on server side Fake Transaction and sends nothing to customer side handset as it may be off any malicious user. If all security checks are proper, Server application process query of customer and get required data from database encrypts data using session key received from customer and sends automatically to customer handset.VI. EXPERIMENTAL RESULTS We have developed two applications for client and server side. Mobile client application is developed using . NET compact framework and VB. NET, installed on windows mobile supported HTC mobile device. This application is used by customer for various M-banking transactions to send encrypted secure SMS to bank ISSN 0975-4024 Dec 2011- Jan 2012 476 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 Server and gets back encrypted reply from bank Server.Client and Server side application performs symmetric encryption and decryption using 256-bit AES symmet ric encryption algorithm. MD5 algorithm is used for hashing purpose. Server side bank application is developed using VB. NET it uses SMS toolkit, an ActiveX control to retrieve and process secure SMS automatically. Server side application also contains certain modules for database management of customer account and transactions Normally symmetric cryptographic algorithm dont have non-repudiation as both party shares common secret key but we have used session key concept for maintaining non-repudiation property of encryption.Since Session key is used only once and created randomly, no two users can have common session key and it is created from MPIN, a master key which customer only knows so he cannot deny that he has done transaction. We have carried out 6 types of transaction including Account Balance, Mini transactions, Cheque Book Request, Cheque Stop request, Pay Bill and Fund Transfer. Following are some sample client application module. The figure no. 3 shows session key, user query in fixed plain text format, cipher text generated from combination of plain text and his MPIN and 4-part secure SMS message generated as per format discussed.This last message is sent to server. Fig. 3. Generating 4-Part Secure Message This secure SMS is retrieved by server side SMS service module. Server application split message and decrypt it to get original transaction query of customer. This query is processed to get response data from database which is firstly encrypted and then send to customer handset. Customer handset get auto reply from server side in cipher text, which is decrypted on mobile by client side application to get server response in plain text. The Figure no. 4 shows response obtained automatically from server for account balance.This reply consists of 3 parts. First part is common session key used by server and client. Second part is cipher text received from server application in secure manner. Third part is plain text message obtained after decrypting secure message received from server. Client mobile application uses 256-bit AES algorithm to decrypt message using common session key. This message will be hidden from customer and he will only get final query results in plain text format but for result purpose we have shown this screen. ISSN 0975-4024 Dec 2011- Jan 2012 477Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 Fig. 4. Secure Reply from Server To be a secure system, it must satisfy Confidentiality, Authentication, Integrity and Non-Repudiation Secure SMS system maintains confidentiality using AES cryptography and Non-Repudiation using session key. Here 3-factor authentication is used for authentication and security purpose whereas Message integrity is carried out using MD5 algorithm. VII. CONCLUSION AND FUTURE WORK We have implemented a secure SMS based Mobile Banking system.The system allows user to carry out all banking transaction securely from anywhere, anytime. All mes sages from user windows mobile are sent in encrypted format to bank server. Bank server decrypt message, process query and encrypt result in SMS. Server sends message to customer which will be decrypted on his handset. The evaluation of the system was studied for varying banking transaction and under various security threatening malicious activities were recorded. Performance of the transaction is studied. We have executed few banking transaction from HTC windows mobile and using VB.Net server side application. We have used LG GSM mobile as server attached mobile device. Experiments shows that secure SMS Mobile banking provides cost effective and secure system with satisfying Confidentiality, Authentication, Integrity and Non-Repudiation using symmetric cryptography. Application can be used on any windows mobile supported handset from anywhere as no GPRS and WAP are required. We have implemented system using symmetric key AES algorithm. In future better power consumption algorithm l ike blowfish can be tried out.Steganogrpahy can also be applied for secure M-banking transactions. We can use concept of STK, SIM application toolkit where bank can stored the application and encryption keys on SIM. REFERENCES 1 2 3 4 5 Mohammad Shirali-Shahreza and M. Hassan Shirali-Shahreza, Mobile banking Services in bank area, SICE Annual Conference 2007, Japan Martinez Borreguero, F. Javier and Chaparro Pelaez, Julian,Spanish Mobile Banking Services An Adoption Study, Proceedings of the International Conference on Mobile Business 2005.Mohammad Shirali-Shahreza,Improving Mobile Banking Security Using Steganography , International Conference On Information Technology. Przemyslaw Krol, Przemyslaw Nowak, Bartosz Sakowicz,Mobile Banking Services Based On J2ME/J2EE, CADSM2007. Yousuf S. AlHinai, Sherah Kurnia and Robert B. Johnston,Adoption of Mobile, Commerce Services by Individuals A Meta-Analysis of the Literature, Sixth International Conference on the Management of Mobile Busines s . ISSN 0975-4024 Dec 2011- Jan 2012 478 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. (6), 2011, 472-479 6 7 8 9 10 11 12 13 14 15 16 T N T Nguyen, P Shum and E H Chua,Secure end-to-end mobile payment System. Ashutosh Saxena, Manik Lal Das and Anurag Gupta,MMPS A Versatile Mobile-to-Mobile Payment System, Proceedings of the International Conference On Mobile Business 2005. Iuon-Chang Lin and Yang-Bin Lin,An Efficient Steganography Scheme for M- Commerce. Mohammad Shirali-Shahreza and M. Hassan Shirali-Shahreza, Text Steganography in SMS, 2007 International Conference on Convergence Information Technology.Sandeep Singh Ghotra, Baldev Kumar Mandhan, Sam Shang Chun Wei, Yi Song, Chris Steketee, Secure Display and Secure Transactions Using a Handset, Sixth International Conference on the Management of Mobile Business. Jiehua Wang, Song Yuan, A Novel Security Mobile Payment System Based On Watermarked Voice Cheque. M. Shirali-Shahreza, Stealth Steganograph y in SMS, Proceedings of the third IEEE and IFIP International Conference on Wireless and Optical Communications Networks 2006.Kewin Chikomo, Ming Ki Chong, Alpan Arnab, Andrew Hutchison, Security of Mobile Banking. Dilla Salama Abdul Minaam. Hatem M. Abdul Kadir, Mohily Mohamed Hadhoud, Evaluating the effects of Symmetric Cryptographic algorithms on Power Consumption for different data types, International Journal of Network Security, Volume 11, September 2010. Managing the Risk of Mobile Banking Technologies, Bankable Frontier Associates. Deshpande Neeta, kamalapur Snehal, Implementation of LSB Steganography and its Evaluation for various bits. ISSN 0975-4024 Dec 2011- Jan 2012 479

Thursday, May 23, 2019

Idealism vs. Pragmatism in Don Quixote

Don Quixote is about an old, retired man named Alonso Quixano. He spends most of his condemnation reading chivalrous tales-so much so that he hardly eats or sleeps, causing people to think he has lost his mind. One day, he decides to become a knight and go out in search of adventure. He renames himself Don Quixote de la Mancha, and his horse Rocinate. He enlists Sancho Panza, a neighbor, to be his squire, smart him governorship of an island. The two sneak off in the early dawn, and the adventures begin The first example of idealism vs. ragmatism was in the opening scene. A young Alonso is shown outside in a field playing and talking to himself, pretending to slay some enemies. His fantasy is shattered and he is brought back to the real universe of discourse when his mother calls him within to go to bed. The following(a) example comes when Alonso is talking to his friends, who happen to be workers. He is optimistic that all of their lives could turn around and that there is an ev en bigger world full of opportunity out there unsloped waiting to be discovered.All of his friends are realistic and tell him that they are going to be working for their constitutional lives. Next, Alonso Quixano wanted to be a knight. The barber was over at his house to give him a shave, and everyone was in the room. He started talking about his dreams of being a knight, and everyone laughed at him, telling him to just let the barber shave him. He ignored them, though. He ran outside and made his plans with Sancho Panza to escape and find an island to govern. This brings us to our next example of idealism vs. pragmatism.Alonso and Sancha take off on their horse and donkey, respectively. Remember, they are in search of an island. They will not be able to get to an island on their animals. After this, Don Quixote de la Mancha thought he would bring glory to himself and Sancha Panzo by killing the giant monsters that they ran into on their way to an island, when in reality the monst ers were just windmills. He also thought a bleating flock of sheep were an army of singing soldiers. As you can easily tell, idealism and pragmatism are both extremely strong and important facets of Don Quixote.

Wednesday, May 22, 2019

“Futility” by Wilfred Owen Essay

The poem titled Futility signification uselessness or bear witnesslessness. Owen is trying to say this war is the pointless war. The soldiers ar useless that theyre dead. No matter how much the soldier work, it doesnt worth it. The poem is written in fourteen lines and divided into two verses. The two verses are contrast each other. The first verses atmosphither is quite, soft, tender and peaceful and the second verses atmosphere sounds more desperate, frustrate, ridiculous and demanding for something to happen.In the first verse, three verbs that describe the action of the Sun, move, gently, and touch are quite soft and tender. These verbs describe that the sunniness move softly, gently and touch the soldier to wash him up. The sun here means the sun that shines everyday to put forward the man and at the same time it may symbolize religious. The sun that used to wake him up and care for him. Its metaphor that the sun moves the man into the light.The third line of verse one, i t mentioned that the soldier was once a farmer. The word whispering is onomatopoeia meaning the sun is whispering to the man about the memories the man used to have on the farm. Its a soft and tender plus pleading together. unplanted means that the field has not seeded but yet the sun is shining now to tell the man that its the ascendent of the planting while now. In other meaning, the word unsown is metaphor that the soldier is still too young for them to join the war, as they havent start their grownup bread and butter yet.The fourth and fifth lines, Always it awoke him, even in France, until this morning and this snow. The sun symbolizes the warmth of life and the snow symbolizes the coldness of death. The sun always arouses him all over even hes in France but this morning is different because snow has partially block the man so the man wasnt fitting to wake up. The word morning has two different meaning. One is the everyday morning, which is the beginning of the day and th e second meaning referring to the word mourning. Owen is mourning for the man who has die.The hold up two line of the last two line, Owen is pleading to god, please please if anything can rouse him now please do it and in this case whole god who can do it. Only the old sun that used to be very kind can wake him up now. The sun here is personified by referring the sun as old and kind. Through the whole verse Owen cause the sound by using assonance of the repetition of ow sound in woke, unsown, snow, rouse, now and know.Owen used an imperative verb, think, at the beginning of the second verse. Its order the reader to think and at the same time Owen also process it sound more desperate. He is desperate to think on how the sun will wake the seeds. The seeds here give the image of growth and nature and it symbolized the beginning of life. He is desperate to ask how god wakes the soldier that is already died on the ground.The third line of the second verse mention the word limbs, it h as two meaning. start-off a limb is a branch of a tree, which fit in with the nature. Second meaning means the pair of legs, arms and wings. Owen means that god create these nature and mankind. The line after this said full-nerved, still warm, too hard to stir? Owen means that he still dont understand how the sun gives life to seeds, but not the warmness to these soldier.The fifth line Was it for this the clay grew tall? this refer to the war. Clay is mud and mud comes from Earth. The clay grew tall in this case the clay symbolized man. In this line Owen was asked what was this war for? Do we do all this to kill? Is this why we put him on this Earth? So what is the point of life?The last two lines O what made fatuous sunbeams toil to break Earths sleep at all? Owen ask this enquire starting with what made, he means what is the point of sending these men these men to the war and died at that place? Its seems so silly that the sun create life for these him and then let them died w ith regret.The first verse focuses upon a dead soldier and second verse asked why the sun is shining at all. Why there is life when there is such a suffering, Owen is trying to say if the sun can wake up life on Earth but why cant it wake up his soldier because what he thinks is that if anything could make the soldier it must be the sun.

Tuesday, May 21, 2019

Coca Cola Market Segmentation Essay

IntroductionCoca cola utilizes both internal and external marketing strategies to gain a competitive advantage everywhere its competitors becoming a successful federation with great earnings. Additionally, the company claims that the innovation is at the heart of everything they do add to their success. The company has sectioned its market in basis of demographics, psychographic, geographic and lifestyle.DiscussionsAfter building a strong reputation and grade image, the Coca-Cola Company changed its name from Coke to New Coke in 1985 as they continued to offer customers a better taste. Demographically, although the company seems to focus on the whole population globally, its particular target is the young generation showing the slide fastener giving element to the customers. According to world demographics 2013, 57.4 percent of the global population lies in the age bracket of 15-54 years of age. The statistics provide a clear exponent that the Coca-Cola focus on the largest de mographic in the world with potential customers thus a right strategy to ensure sustainability and growth. In regard to family size, the company avail its in different bottle sizes for families to choose according to their sizes ranging from 200ml to 2 Liters pack (Global useable Drinks Industry Profile, 2014). The Coca-Cola Company practice geographic segmentation in terms of regions.Through the price remains constant in all parts, the brands vary according to the weather of the region. For example, in Hong Kong during summer season Coca-cola has a unique brand called freezing coke (Global Functional Drinks Industry Profile, 2014). The strategy ensures continued brand loyalty by providing all weather drinks at the same price. Further in terms of place ofconsumption. Coca-Cola puts up vending machines in meeting terminus and stations to ensure access to all. Locally in states the company provides equal and around-the-clock supply to the local shops. Low-income earners have access to returnable glass bottle with medium income earners having plastic non-returnable bottle and Coke tin for high-income earners.In psychographic segmentation, Coca-Cola distinguishes customers into different groups base on buyers values, lifestyle or personality. Although people share the same demographic group, they exhibit diverse psychographic profiles forcing Coca-Cola to design and manufacture products suiting personality. In terms of lifestyle, consumers portray different lifestyles. Coca-Cola Company presented a more portable packaging for their soft drinks in order to provide for the modern ever ill-tempered user. The company endows its products with brand personality in line with a particular consumer personality. Further in observing culture and especially the diet matter, Coca-Cola produced health assured products such as Coke Zero and Diet Coke (Global Functional Drinks Industry Profile, 2014).ConclusionThe Coca-Cola Company boasts of high market and business share g lobally. The company has continuously gained more profits through use of different marketing strategies and market segmentation. Through segmentation, the company has managed to ensure continuous customer satisfaction by providing goods and services that meet all the social classes. Sales wise, the company have continuously experienced increasing sales by increasing the benefits derived from each segment for their products and services. The trend also benefits from the ever increasing customer loyalty as a result of satisfaction. Through its franchising model, the company runs a successful business in non-alcoholic beverage industry globally. It stands to capture any new drink type in the market as it has done before. A slight decline in segment consumption attracts careful analysis from the company to dig down into the cause and innovative measures to curb such loss.ReferencesGlobal Functional Drinks Industry Profile. (2014). Functional Drinks Industry Profile Global, 1-35.

Monday, May 20, 2019

Art on Japanese Art History Essay

How can the nice ordinary genius take ins to utilization to express oneself determine whether or not it is truly craft? While digital blindists nice ability is lots questioned and the credit is precondition to the computer being used, the art itself springs from the mind of the digital artist. I can say this with personal fervor Digital art is truly in essence a nominate of art that merely takes advantage of the innovations of modern technology. Digital Art isnt computer-generated. While it power involve using tools offered by specialized computer programs a computer doesnt do the view for you, and the creative ideas put forth atomic number 18 of the artists mind.Digital artists precisely use computer tools to convey their programs, all of the creative credibility should be given to the artist himself. Should the dissect the Mona Lisa was painted on be considered the creator of the masterpiece or rather Leonardo Da Vinci? Painters that wooden leg to canvas are limiti ng themselves to the paint they use and the cotton woven fibers of their canvas. Why purposely choose to ignore the modern day tools that are given to you and condescendingly port down upon those who choose to engage them? Over the years, I have spent a lot of my own time experimenting in the depths of digital art.Many times, I have used the computer as a medium for self looking from creating to pictures on Microsoft paint as a child to experimenting with specialized software much(prenominal) as adobe brick Photoshop. I have a deep and passionate love for creating and expressing myself through art trifle on the computer. I one day aspire to have a profession in the field of digital art, such as a b mighty Designer. Because of this, I am very offended by the comments I perk from traditional artists that condescend digital art for its use of the computer as the artistic medium.When I control comments that degrade digital artwork to computer-generated images, as though the compu ter itself programed the art I intuitive feeling enraged and cheated. The other day a friend of mine ignorantly explained to me that she could, given the proper software, build her own masterpiece without any prior experience in digital art, as though anyone if given the proper software could instantaneously create masterpieces, when really there is so much more to digital art than computer software or the computer itself. Its about ones various(prenominal) artistic talents.To me that would be the equivalent of saying that if I were given a canvas and a paintbrush I could instantaneously create a masterpiece, which I know is false and ignorant. Art is the use of skill and sight in the creation of aesthetic objects, environments, or experiences that can be shared with others (Britannica). Digital art is a general term for a range of artistic works and practices that use digital technology as an essential part of the creative and/or presentation butt. There are many different e xercise fields in digital art. A couple of examples are graphic design and entanglement design.graphic design is the process and art of combining text and graphics and communicating an effective message in the design of logos, graphics, brochures, newsletters, posters, signs, and any other type of visual communication. Famous Graphic Designer, Milton Glaser, says to design is to communicate understandably by whatever typifys you can control or master. A graphic designer would partake with his/her clients and discuss the type of visual communication the client is interested in. The client may provide a general idea for the design, but the creative options are left for the designer to decide how to best delineate the message of the client.The designer would then either sketch out a design to scan on to the computer for further alterations or go directly to the computer software in order to design the desired product. The designer would then verify with the client for satisfaction of the product. tissue Design is the art and process of creating a single Web page or entire Web sites and may involve both(prenominal) the aesthetics and the mechanics of a Web sites operation although primarily it focuses on the look and feel of the Web site the design elements.To be effective, the interfaces for online in determineation systems must be as thick and flexible as the physical environments they replace. They must not only supply a direct route to reach the users goals, but must be able to accommodate different approaches to the task. This means that the interface design must not only organize the content for easy access, but must incorporate the right combination of technologies and interaction techniques to allow the user to work in their own style (Quesenbery).A Web Designer would be sought out by a client in need of assist in designing a website or website layout, usually for advertising and communicative purposes of the client. Like in Graphic design, the client may provide the designer with a general idea or guideline for the product, however, web designers must understand the dynamics of coding and html. handed-down art is understood to include things such as paintings, sculptures, and hand-drawings basically any art which involves physical activity, usually of the hands. Famous Traditional Artists include Leonardo DaVinci, Vincent forefront Gough, and Andy Warhol.These artists use drawings and paintings as their seduces of self expression which led to their innovative masterpieces the Mona Lisa, Starry Night, and Pop Art, respectively. Traditional artists often look down upon the usage of the computer as the creative medium utilized when expressing oneself in art. many believe that using a computer negates the creative ability of the artist and is the less credible form of art. Using computers in order to create art is sometimes seen as the easier method involving little artistic ability.For artists diving into a new technology , it is a triple short-cut to mastery you get a free have words on the novelty of the medium there are no previous masters to surpass and aft(prenominal) a few weeks, you are the master (Brand). There is a certain type of beauty in a hand-painted piece of art. The same is true for a masterfully drawn illustration. For this there is no substitute. Traditional art is the oldest form of art and could be considered the foundation of art. Many people consider this form of art to require the highest level of skill and creative ability, and that there is no other type of art form that can surpass it.There are a large number of people that believe this form of art is most vital, and that digital art manifestly shouldnt be considered art due to the use of technology rather than their hands. Opponents of digital art argue that there is no skill in pointing and clicking on a computer screen. I would rather choose the painting of a monkey over anything generated electronically, because I am more fascinated by the direct evidence of a mind at work than I am by the output of machines (Glenn).Because of this belief, there is a good bit of animosity mingled with the two different sects. Traditional artists feel as if they are protecting art in its truest form, whereas digital artists feel as if they are exposing the world to a newer and more advanced form of art unendingly full of possibilities. While traditional art is the older and more revered art form, that doesnt mean that digital art is any less of an art. Both art forms require talent, precision, technique, and creativity from the artist. Digital artists are just as legitimate of artists as traditional artists.It is simply ignorant and petty to distinguish digital art as separate from true art in essence. Yes, computers are used as the medium for expression, however, like previously stated, that doesnt mean that the computer creates the ideas and designs. The designs and creativity come from the artist and the com puter is simply another way to release the idea from the artists mind, similar to a piece of report or canvas. Digital art should be just as revered as traditional art because the amount of creativity and artistic ability is equal in both forms.