28.09.2015 Views

Research Journal of Science & IT Management - RJSITM - The ...

Research Journal of Science & IT Management - RJSITM - The ...

Research Journal of Science & IT Management - RJSITM - The ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Table <strong>of</strong> Contents<br />

Articles<br />

FUTURE TRENDS IN MOBILE COMMERCE: SERVICE OFFERINGS, TECHNOLOGICAL ADVANCES AND SECUR<strong>IT</strong>Y<br />

CHALLENGES<br />

Ashok Kumar<br />

THEORETICAL FRAMEWORK OF I-THOUN (INFORMATION THOUGHT NETWORK)<br />

Abhay Saxena, Dr. Pranav Pandya<br />

INTERNET BANKING: A CASE STUDY OF THE FACTORS INFLUENCING <strong>IT</strong>S ADOPTION IN MAUR<strong>IT</strong>IUS<br />

Dinesh Ramdhony, Deerajen Ramasawmy<br />

GRID COMPUTING: RELATED ISSUES AND BUSINESS APPLICATIONS<br />

Ahasanul Haque<br />

VENDOR RELATIONSHIP MANAGEMENT STRATEGY DEVELOPMENT PROCESS FOR AUTOMOBILE INDUSTRY TO<br />

REDUCE THE COST OF QUAL<strong>IT</strong>Y<br />

Shivagond Nagappa Teli<br />

Book Review<br />

SOLAR POWER GENERATION USING ZVT INTERLEAVED BOOST CONVERTER<br />

Shiny Jasmine


Future Trends In Mobile Commerce: Service<br />

Offerings, Technological Advances And Security<br />

Challenges<br />

Dr. P. S. NAGARAJAN<br />

Assistant Pr<strong>of</strong>essor, Alagappa Institute <strong>of</strong> <strong>Management</strong>, Alagappa University, Karaikudi – 4.<br />

J. ASHOKKUMAR<br />

Junior <strong>Research</strong> Fellow, Alagappa Institute <strong>of</strong> <strong>Management</strong>, Alagappa University, Karaikudi – 4.<br />

INTRODUCTION<br />

Mobile commerce is the conduct <strong>of</strong> business<br />

transactions over the Internet-enabled wireless devices is<br />

slowly becoming a dominant force in business and society.<br />

<strong>The</strong> push for advancing technology and the pull <strong>of</strong> public<br />

demand for low-cost, high-speed communications and<br />

ubiquitous access to information anytime anywhere have<br />

revolutionized the Telecommunications industry over the<br />

past two decades. This revolution has led Canada to have<br />

one <strong>of</strong> the lowest Internet access charges among G7 nations<br />

and to also have the lowest mobile communications <strong>of</strong> them<br />

all. More recently, Internet access and high computing<br />

power in wireless devices began to pave the way for the<br />

introduction <strong>of</strong> broadband interactive multimedia<br />

applications. Nevertheless, the wireless Web market is still<br />

in its infancy, and mobile commerce (m-commerce) is<br />

expected to evolve significantly in the future, especially in<br />

view <strong>of</strong> the current implementation <strong>of</strong> 3G systems and the<br />

future deployment <strong>of</strong> 4G systems, inter-connecting a<br />

multitude <strong>of</strong> diverse wireless networks, such as WBAN,<br />

WPAN, WLAN, and WMAN .m-commerce is the product<br />

<strong>of</strong> interaction among business transactions, Internet<br />

applications, and mobile communications. It is a highly<br />

evolved version <strong>of</strong> the 1980’s t-commerce (commerce via<br />

telephony) and the 1990’s e-commerce (commerce via the<br />

Internet). <strong>The</strong>re has been a revolutionary change in cellular<br />

mobile communications in every decade. <strong>The</strong> first<br />

generation (1G) systems, introduced in the early 1980s,<br />

provided analog voice-only communications and the second<br />

generation (2G) systems, introduced in the early 1990s,<br />

provided digital voice applications and circuit-switched lowspeed<br />

data services. <strong>The</strong> introduction <strong>of</strong> third-generation<br />

(3G) systems resumed in the 21st century, with the focus<br />

shifting to packet data instead <strong>of</strong> just voice. <strong>The</strong> fourthgeneration<br />

(4G) systems will likely provide broadband IPbased<br />

multimedia services around the 2010.<br />

As wireless evolves from a secondary means <strong>of</strong><br />

communication to a principal means <strong>of</strong> communication, it<br />

leads to the graying <strong>of</strong> lines between personal interactions<br />

and business transactions. Although the growth and<br />

pervasiveness <strong>of</strong> this continuing wireless revolution appears<br />

to be inevitable, the path and speed <strong>of</strong> growth <strong>of</strong> this<br />

technology are not so predictable. It is clear that different<br />

generations <strong>of</strong> mobile communication systems have evolved<br />

to satisfy the demands <strong>of</strong> high data rate, high mobility, wide<br />

area coverage, diverse applications, high spectral efficiency,<br />

high flexibility <strong>of</strong> mobile devices and networks, and low<br />

costs. In view <strong>of</strong> this backdrop, it is anticipated that m-<br />

commerce will become widely popular and ubiquitously<br />

available. In this paper, future trends in m-commerce<br />

services and technologies, as well as privacy concerns and<br />

security challenges will be highlighted<br />

WIRELESS USER EQUIPMENT AND SYSTEMS<br />

Today’s communication-centric and computingcentric<br />

devices are becoming a single intelligent wireless<br />

device. <strong>The</strong> future user wireless devices, dubbed as<br />

universal wireless handheld devices, will have numerous<br />

functionalities, all aiming to establish communications,<br />

enhance education, furnish entertainment, provide<br />

information, and conduct transactions for mobile users. Few<br />

<strong>of</strong> the device features are already available in handheld<br />

devices, but many <strong>of</strong> them, yet to be incorporated, will need<br />

to increase the device size, weight, complexity, power,<br />

memory, and processing requirements. To this end,<br />

engineering design trade-<strong>of</strong>fs will be required to form the<br />

right balance between devices’ capabilities and their<br />

constraints.<br />

With low-power requirements and long-lasting<br />

batteries, the universal wireless handheld devices will be<br />

small, low-cost, light-weight, easy-to-use, and IC-cardreader<br />

equipped. <strong>The</strong>y can be attached to desk-top/lap-top<br />

computers and their peripherals, including keyboards,<br />

printers, scanners, loud speakers, and fax machines. <strong>The</strong>y<br />

will have high-resolution colour screens to present pin-point<br />

information, thus minimizing the burden on users’ attention.<br />

<strong>The</strong>y will also possess features such as simple icon-menu,<br />

touch-pad, and artificial-intelligence-based natural<br />

languages. <strong>The</strong> wireless devices and networks will employ<br />

intrusion detection systems to detect cracking attempts in<br />

real time and to take effective protective measures based on<br />

the information it has. <strong>The</strong>se devices include anti-virus<br />

s<strong>of</strong>tware to handle malicious code and to support for<br />

authenticating users, servers, and applications.<br />

On a standalone basis, the devices will function as<br />

alarms, clocks, calculators, timers, flash lights, calendars,<br />

organizers, dictionaries, tape recorders, compasses, cameras,<br />

pocket PCs (with <strong>of</strong>fice applications), radios, TVs,<br />

biometric control devices, audio and video players. <strong>The</strong>y<br />

will also be able to measure the temperature, pressure,<br />

www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 1


humidity, and heartbeat. <strong>The</strong>y will all have high-speed,<br />

always-on, packet-switched bandwidth-on-demand access<br />

capabilities to the Internet and other networks, as well as to<br />

other wireless devices and equipment, anytime anywhere.<br />

While connected, they will function as virtual keys, secure<br />

ID cards, digital cash, tag-readers, remote control devices,<br />

pagers, locating devices, and phones, and will also get e-<br />

books, e-newspapers, e-mails, voice-mails, and video-mails.<br />

Although use <strong>of</strong> data, and, in general, multimedia<br />

continue to accelerate exponentially, voice will remain a<br />

dominant mode <strong>of</strong> communications while the user is on the<br />

move, for talking or listening provides hands- and eye-free<br />

operations and is also several times faster than typing or<br />

reading text messages. However, to convey the same<br />

information, typed texts require less bandwidth than spoken<br />

words; hence, the immense popularity <strong>of</strong> SMS. In view <strong>of</strong><br />

the fact that voice, video, keypad, and pen can be all used as<br />

a means to input, and text, audio, and video can represent<br />

output formats, a number <strong>of</strong> I/O enabling technologies will<br />

have to be incorporated in the wireless devices. <strong>The</strong>se<br />

technologies may include<br />

speech recognition (converting spoken words to<br />

text to avoid the use <strong>of</strong> alpha-numeric key pads),<br />

speech synthesis (converting e-mails to intelligible<br />

speech so as to hear the received e-mails),<br />

voice activation (bringing voice-control to navigate<br />

the Web sites and to replace a long series <strong>of</strong><br />

sequential inputs in an automated voice-menudriven<br />

phone system), and<br />

<br />

Optical character recognition (converting handwritten<br />

text to typed-written format with a high<br />

degree <strong>of</strong> accuracy and an inherent learning<br />

mechanism).<br />

In the future, 4G systems will focus on seamlessly<br />

integrating all wireless networks, and they will be the<br />

platform for mobile systems. This focus contrasts with 3G<br />

systems, which merely focus on developing new standards<br />

and hardware. 4G systems will be all IP-based multimedia<br />

services in heterogeneous networks that allow users to use<br />

any system at anytime anywhere. <strong>The</strong> new challenge facing<br />

the mobile industry is to minimize the fragmentation <strong>of</strong> the<br />

market and to enable seamless interoperability so as to<br />

simulate the growth <strong>of</strong> mobile services. 4G devices should<br />

be multi-band, multi-functional, and multi-mode capable<br />

and be able to handle various contents. Also, 4G systems<br />

will provide the best connection to users. It is believed that<br />

the interfaces for 4G systems will exploit the new frequency<br />

spectrum that is to be identified by WRC-2007; therefore, a<br />

speculative time scale for a mature 4G system is beyond<br />

2010. 4G systems will be an evolved version <strong>of</strong> 3G systems<br />

and will also be based on a cellular system but will require<br />

very small cells. 4G systems will warrant the realization <strong>of</strong><br />

automatic switching functions for such flexible networks,<br />

mobility control, coordination functions between layers 2<br />

and 3 to realize fast handover, rapid routing <strong>of</strong> packets, and<br />

so on. 4G systems will improve coverage in highly<br />

populated areas (i.e., hot spots) to carry more traffic by<br />

utilizing diverse access technologies to deliver the best<br />

possible services, while taking into account both cost and<br />

bandwidth efficiency.<br />

<strong>The</strong> primary 4G systems objectives over 3G<br />

systems objectives—higher transmission rate (by two orders<br />

<strong>of</strong> magnitude), larger capacity (by one order <strong>of</strong> magnitude),<br />

higher frequency band (beyond 3 GHz), single-device<br />

(ubiquitous, multi-functional, multi-service, multi-band),<br />

increased coverage (global roaming), simple billing (one bill<br />

with reduced total access cost), high quality <strong>of</strong> service<br />

(accommodating varying transmission rates, channel<br />

characteristics, bandwidth allocation, fault-tolerance levels,<br />

and different hand-<strong>of</strong>f support), and lower system costs (one<br />

order <strong>of</strong> magnitude)—will directly play pivotal roles in all<br />

aspects <strong>of</strong> the next generation <strong>of</strong> m-commerce.<br />

M-COMMERCE SERVICES, PAYMENT, AND<br />

VALUE CHAIN<br />

<strong>The</strong>re appears to be no m-commerce application<br />

that can be qualified as a “killer” application, per se.<br />

However, the key advantage <strong>of</strong> m-commerce is its ability to<br />

support a wide variety <strong>of</strong> attractive and innovative<br />

applications, and that will be the “killer” characteristic <strong>of</strong> m-<br />

commerce. It is worth highlighting that the highlypersonalized,<br />

context-aware, location-sensitive, time-critical<br />

applications, conducted in a very secure environment are the<br />

most promising m-commerce applications. <strong>The</strong>re are<br />

indications that the next-generation <strong>of</strong> wireless<br />

communications services based on 4G systems will not be<br />

limited to human (as it has been before) but rather to<br />

anything that very small wireless chips can be attached to<br />

(i.e., machine-to-machine communications). M-<br />

commerce service categories encompassing sets <strong>of</strong> attractive<br />

applications.<br />

Mobile communications services originated from<br />

voice telephony. However, the cellular phone market, when<br />

measured in terms <strong>of</strong> the number <strong>of</strong> wireless devices, is<br />

becoming saturated at a rather rapid pace. In short, there can<br />

be no significant increase in traffic merely through voice<br />

telephony. In view <strong>of</strong> this limitation, there appear to be two<br />

viable strategies to achieve growth in mobile<br />

communications: (i) implementation <strong>of</strong> new mobile services<br />

with an array <strong>of</strong> diverse multimedia applications, and (ii) the<br />

introduction <strong>of</strong> new wireless devices with enhanced<br />

features, including direct device-to-device communications<br />

capabilities. <strong>The</strong> mobile multimedia applications warrant<br />

high transmission rates and allow various modalities—such<br />

as voice, data, image, music, text, and video—to be<br />

transmitted simultaneously and in an integrated fashion. <strong>The</strong><br />

ubiquitous wireless devices with various radio interfaces<br />

possess capabilities to connect to a multitude <strong>of</strong><br />

heterogeneous networks, including the Internet, PSTN,<br />

ISDN, and WLAN. <strong>The</strong>y can also allow communications<br />

directly with other wireless devices, such as tether less<br />

machine-to-machine communications. Both <strong>of</strong> these<br />

developments can lead to a great increase in the volume <strong>of</strong><br />

user traffic, thus increasing the average revenue per user, a<br />

key metric for measuring the pr<strong>of</strong>itability <strong>of</strong> mobile-based<br />

businesses.<br />

Future mobile systems will introduce various<br />

quality-<strong>of</strong>-service (QoS) levels in order to provide various<br />

types <strong>of</strong> best-effort multimedia services corresponding to<br />

users’ demand. QoS may include priority, reliability, bit<br />

error rate, security, and delay, jitter, and throughput<br />

measures. <strong>The</strong> conversational services, with their real-time<br />

voice/video, connection-oriented applications, are<br />

characterized by a low fixed delay <strong>of</strong> about 20 – 30<br />

www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 2


milliseconds, a modest bit error rate <strong>of</strong> about 1E-03 to 1E-<br />

05, and a low-blocking probability for network access. On<br />

the other hand, transactional, retrieval, messaging, and<br />

distribution (e.g., multicasting) services, with their non-realtime<br />

connectionless applications, are characterized by a<br />

varying delay <strong>of</strong> 150 milliseconds or more, a low bit error<br />

rate <strong>of</strong> 1E-05 to 1E-07 to aim high data integrity, and a lowdelay<br />

probability for network access . It is worth noting that<br />

the effective user transmission rate (i.e., throughput) which<br />

can characterize, to a large extent, the set <strong>of</strong> m-commerce<br />

applications available to the user is a function <strong>of</strong> the cell size<br />

and the speed <strong>of</strong> the mobile user. For instance, a user in a<br />

stationary position in an urban area characterized by small<br />

cells can have a throughput 10 to 20 times higher than a user<br />

driving fast on a highway in a rural area consisting <strong>of</strong> large<br />

cells.<br />

Every generation <strong>of</strong> mobile services (e.g., 2G, 3G,<br />

and 4G) brings about more efficient spectrum utilization;<br />

that is, more users per unit spectrum per unit area (bits per<br />

second per Hz per square kilometres). Spectral efficiency<br />

measures the ability <strong>of</strong> a wireless system to deliver<br />

information or billable services. <strong>The</strong>re are many factors<br />

which can contribute to the spectral efficiency <strong>of</strong> a system,<br />

including modulation format, channel coding technique, air<br />

interface overhead, multiple access method, and acceptable<br />

interference level, to name a few. <strong>The</strong> spectral efficiency for<br />

2G systems is about 0.15 to 0.20, that for 3G systems is<br />

about 0.25 to 0.30, and that for 4G systems will likely be as<br />

high as 3 to 4 bits per second per Hz .This efficiency will, in<br />

turn, reduce the overall service cost quite significantly.<br />

<strong>The</strong>re are many factors shaping mobile billing, in<br />

general, and m-commerce payment, in particular. A major<br />

determining factor for the success <strong>of</strong> m-commerce is service<br />

affordability—such as low access, subscription, and usage<br />

fees. What basically the customer will have to pay depends<br />

on the fact that North America’s called-party-pays strategy,<br />

or Europe’s calling-party-pays strategy, or a reasonable mix<br />

<strong>of</strong> both will be employed. <strong>The</strong> service charge will also have<br />

to be a function <strong>of</strong> the user’s location, the time <strong>of</strong> call, the<br />

service type, the call priority, the service duration (measured<br />

in call seconds and/or Mega bytes), the call frequencies (to<br />

accommodate frequent micro-payments), and the payment<br />

plans (pre-pay or on-credit). Also, mobile payments, which<br />

are virtual payments, can be divided into macro-payments—<br />

typically a payment <strong>of</strong> $10 or more—and micro-payments—<br />

typically a payment <strong>of</strong> $10 or less. For a macro-payment,<br />

authentication through a trusted financial institution is<br />

required, which must be carried out over the public wireless<br />

access and wired-line backbone networks, while invoking<br />

all possible security measures. On the other hand, a micropayment<br />

may use the operator’s infrastructure or involve a<br />

cash card (in addition to the ID card which stores the<br />

confidential information, such as the user’s secret<br />

authentication key) and proximity payments through short<br />

distances by using Bluetooth, Infra-Red, RFID, and UWB<br />

technologies.<br />

<strong>The</strong> generic payment model for mobile commerce<br />

provides an abstract view <strong>of</strong> what information is passed<br />

between various parties to conclude a transaction and does<br />

not depict any particular ordering <strong>of</strong> the information flow. In<br />

the selection phase, the customer indicates what goods and<br />

services are desired, and he/she negotiates the price <strong>of</strong> the<br />

goods and services and the terms <strong>of</strong> conditions. <strong>The</strong><br />

transaction details highlight the description <strong>of</strong> goods or<br />

services, the customer’s name, and other required details.<br />

<strong>The</strong> customer then responds with transaction credentials<br />

(which may contain the payment credentials), the<br />

transaction details, and some authentication <strong>of</strong> the customer.<br />

Upon authentication, the payment is approved, the funds are<br />

transferred, and the goods will be delivered, or services will<br />

be provided.<br />

In mobile payment, although confidentiality<br />

(making sure information is not visible to eavesdroppers),<br />

integrity (finding out the content has not been tampered<br />

with), and non-repudiation (proving the transaction has<br />

taken place) are primary concerns, authentication (ensuring<br />

communicating parties are certain <strong>of</strong> each other’s identity) is<br />

<strong>of</strong> paramount importance. As a result, public key<br />

cryptography, which is slower but more powerful than<br />

symmetric key cryptography, will be used for authentication<br />

and the exchange <strong>of</strong> symmetric session keys. In order to<br />

prevent a false (cracker’s) public key as a legitimate public<br />

key, a certificate authority issues a public key certificate that<br />

would contain the name, the public key, and the expiration<br />

date. In view <strong>of</strong> the fact that the emerging wireless devices<br />

will have more throughputs, processing power, and memory,<br />

more complex encryption techniques—such as longer keys<br />

and/or more sophisticated multi-level algorithms—will be<br />

employed to enhance mobile payment security. Although<br />

encryption can be the most effective tool for both privacy<br />

and security, it is generally used only as a security measure<br />

when m-commerce transactions are conducted and not when<br />

essential data are generally stored in databases.<br />

<strong>The</strong> development environment for m-commerce is<br />

significantly more complex than e-commerce, thus requiring<br />

a broader base <strong>of</strong> expertise. In m-commerce, it is virtually<br />

impossible to achieve all technical and business<br />

requirements simultaneously, for some are clearly in conflict<br />

with others. For instance, in the current state <strong>of</strong> technology,<br />

not all technical requirements (such as high-speed access<br />

and low-power devices) and business requirements (such as<br />

low-access fee and high-quality <strong>of</strong> service) can be<br />

completely fulfilled at the same time. Moreover, there are<br />

constraints associated with business and regulatory<br />

environments that can influence some <strong>of</strong> these requirements,<br />

such as service coverage, location determination, backward<br />

compatibility, and privacy concerns, to name a few.<br />

<strong>The</strong> m-commerce applications can be successfully<br />

provided to mobile users only when a number <strong>of</strong> enterprises,<br />

called the m-commerce value chain, are complementarily<br />

involved in the creation and delivery <strong>of</strong> these services, with<br />

the goal <strong>of</strong> sharing revenue. In order to drive interoperability<br />

<strong>of</strong> mobile data services, the world’s mobile operators,<br />

device and network suppliers, information and<br />

communication technology companies, application<br />

developers and content providers have joined forces to<br />

ensure seamless mobile services for end-users anywhere.<br />

This outcome will be achieved by defining industry-wide<br />

requirements, architectural frameworks, and industry<br />

specifications for enabling technologies and end-to-end<br />

interoperability, all based on open specifications <strong>of</strong><br />

standards, protocols, and interfaces.<br />

<strong>The</strong> federal government also plays a pivotal role,<br />

not only in terms <strong>of</strong> setting policies and ensuring that<br />

www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 3


egulatory issues are fully respected, but in terms <strong>of</strong><br />

auctioning spectrum (instead <strong>of</strong> comparative bidding and<br />

lottery as licensing methods) .This role, in turn, can lead to<br />

huge investment requirements, which need to be met by<br />

some major players.<br />

M-commerce services with compelling contents are<br />

provided by tight business and strategic partnership<br />

arrangements and by involving a large number <strong>of</strong><br />

companies, with each influencing other parties in the value<br />

chain. While no two value chains are the same, a company<br />

can assume multiple roles in the value chain for m-<br />

commerce, or a single role for a multiplicity <strong>of</strong> services,<br />

such as m-commerce, e-commerce. It would identify the<br />

main categories <strong>of</strong> players in the m-commerce value chain.<br />

M-COMMERCE ENABLING TECHNOLOGIES<br />

Providing mobile users with wireless<br />

communications functions for their communications,<br />

information, education, entertainment, and business needs,<br />

as well as giving wireless communications functions to<br />

stationary places for access and security and to moving<br />

objects for asset and logistic purposes form the cornerstones<br />

<strong>of</strong> mobile commerce. To achieve these goals, significant<br />

technological advances in a number <strong>of</strong> enabling<br />

technologies are anticipated.<br />

Radio frequency identification (RFID) is a<br />

generic term for technologies that use radio waves to<br />

automatically identify individual items or some <strong>of</strong> their<br />

attributes. RFID possesses several benefits over bar codes.<br />

First, it does not need to meet line-<strong>of</strong>-sight requirements as<br />

long as the RFID tags are within the range <strong>of</strong> a reader.<br />

Second, quite many number <strong>of</strong> RFID tags can be read<br />

simultaneously. Third, every unique item can have its own<br />

RFID tags. <strong>The</strong> mobile consumer will use RFID readers in<br />

their mobile phones to scan RFID tags, say in the packaging<br />

<strong>of</strong> products on store shelves, to pay for tolls and access fees,<br />

to purchase at vending machines and points <strong>of</strong> sales, to<br />

access secure rooms, buildings, and other partitioned areas,<br />

and to control home and <strong>of</strong>fice appliances. With RFID, a<br />

scanner can read the encoded information even when the tag<br />

is concealed. For example, it may be embedded in a<br />

product’s casing, or sewn into an item <strong>of</strong> clothing, or<br />

sandwiched between a banknote’s layered papers. <strong>The</strong><br />

stealthy nature <strong>of</strong> RFID technology has raised concerns<br />

among privacy advocates that RFID tags could be tracked<br />

beyond their intended use. For example, security agencies<br />

might use them to covertly monitor individuals or their<br />

belongings. Lower frequencies (LF and MF) usually are<br />

cheaper, use less power, are better able to penetrate nonmetallic<br />

substances, and are ideal for scanning objects with<br />

high-water content. On the other hand, higher frequencies<br />

(HF and UHF) typically <strong>of</strong>fer a better range and can transfer<br />

data faster; they tend to be more directed and, thus, require a<br />

clearer path. Active tags can have a farther read range than<br />

passive tags, but passive tags are less expensive and require<br />

no maintenance. RFID will play a critical role in emerging<br />

wireless access and monitoring applications, especially in<br />

today’s security-aware era.<br />

Location determination is seen to be an<br />

indispensable feature for mobile commerce. Network-based<br />

positioning is carried out by terrestrial systems through<br />

various techniques, such as cell <strong>of</strong> origin, time <strong>of</strong> arrival,<br />

angle <strong>of</strong> arrival, and enhanced observed time difference. <strong>The</strong><br />

device-based positioning is carried out by satellite systems<br />

typically using three or four MEO satellites, also known as<br />

GPS. However, a hybrid approach delivering the accuracy<br />

<strong>of</strong> device-centric option, while avoiding a line-<strong>of</strong>-sight<br />

requirement as well as increased cost, size, and power<br />

consumption, is also used. Though FCC does not require the<br />

mobile network operators to use a specific technology, it has<br />

indicated specific performance metrics for location-enabled<br />

technology. For network-based technology, location<br />

information accuracy is required to be within 100 meters<br />

67% <strong>of</strong> the time and within 300 meters 95% <strong>of</strong> the time. But<br />

for the device-centric technology, these distances must be<br />

halved. In view <strong>of</strong> possible launches <strong>of</strong> LEO satellites and<br />

the significant increase in the processing capabilities <strong>of</strong> the<br />

wireless devices, as well as the fact that the cell sizes are<br />

shrinking from macro to micro to pico, the location-based<br />

technologies are expected to become more accurate and less<br />

costly in the future.<br />

S<strong>of</strong>tware defined radio (SDR) enables<br />

reconfigurable system architectures for wireless networks<br />

and user devices. To provide users with m-commerce<br />

services under an array <strong>of</strong> heterogeneous networks, certain<br />

design problems (such as limitations in device size, cost,<br />

power consumption, and backward compatibilities to<br />

systems) must all be overcome. <strong>The</strong> most viable way <strong>of</strong><br />

implementing these types <strong>of</strong> wireless devices is to adopt a<br />

s<strong>of</strong>tware radio approach. <strong>The</strong> received analog signal is<br />

processed by a reprogrammable baseband digital signal<br />

processor in accordance with the wireless environment.<br />

However, certain problems then need to be addressed—such<br />

as an analog radio interface with multiple antennas and<br />

amplifiers and very fast high-speed analog-to-digital<br />

conversions and DSP functions—which can all, in turn, add<br />

to the circuit complexity and high-power consumption and<br />

dissipation. SDR can provide the user with a single piece <strong>of</strong><br />

scalable hardware that is at once compatible at a global<br />

scale.<br />

S<strong>of</strong>tware defined radio (SDR) enables<br />

reconfigurable system architectures for wireless networks<br />

and user devices. To provide users with m-commerce<br />

services under an array <strong>of</strong> heterogeneous networks, certain<br />

design problems (such as limitations in device size, cost,<br />

power consumption, and backward compatibilities to<br />

systems) must all be overcome. <strong>The</strong> most viable way <strong>of</strong><br />

implementing these types <strong>of</strong> wireless devices is to adopt a<br />

s<strong>of</strong>tware radio approach. <strong>The</strong> received analog signal is<br />

processed by a reprogrammable baseband digital signal<br />

processor in accordance with the wireless environment.<br />

However, certain problems then need to be addressed—such<br />

as an analog radio interface with multiple antennas and<br />

amplifiers and very fast high-speed analog-to-digital<br />

conversions and DSP functions—which can all, in turn, add<br />

to the circuit complexity and high-power consumption and<br />

dissipation. SDR can provide the user with a single piece <strong>of</strong><br />

scalable hardware that is at once compatible at a global<br />

scale.<br />

Adaptive modulation and coding (AMC) is one<br />

<strong>of</strong> the most viable and effective means to dynamically<br />

combat wireless channel degradation and meet performance<br />

requirements. In AMC, for the same symbol rate (i.e.,<br />

occupied bandwidth), the signal power, the modulation<br />

www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 4


technique, the information rate, and the channel-coding rate,<br />

can all be adjusted in accordance with instantaneous<br />

variations in channel conditions (such as multi-path and<br />

proximity to the base station) and quality <strong>of</strong> service<br />

requirements. Forward-error- correcting (FEC) codes<br />

(whose rates may range from 1/2 to 5/6) and digital<br />

modulation techniques (ranging from QPSK to 64 QAM)<br />

will be dynamically adapted for every single individual,<br />

giving rise to up to a six-fold spectral efficiency (bits per<br />

second per Hz) .<br />

Mobile ad hoc networks vis-à-vis fixed topology<br />

wireless networks may be characterized by wireless nodes,<br />

the lack <strong>of</strong> fixed infrastructure support, dynamic topologies,<br />

bandwidth-constrained variable-capacity links, energyconstrained<br />

operations, and limited physical security. In<br />

such peer-to-peer networks, end-user wireless handsets also<br />

act as secure wireless routers that are part <strong>of</strong> the overall<br />

network infrastructure. Upstream and downstream<br />

transmissions hop through subscriber handsets and fixed<br />

wireless routers to reach the destination. Routing for the best<br />

path is defined for the least power. Mobile ad hoc networks<br />

will help a community <strong>of</strong> subscribers to increase<br />

dramatically spectrum reuse and reduce overall power<br />

consumption. Mobile ad hoc networks bring about a host <strong>of</strong><br />

challenges and opportunities, but due to emerging wireless<br />

device-to-device connectivity requirements, mobile ad hoc<br />

networks will prove to be an ever-essential component.<br />

PRIVACY, SECUR<strong>IT</strong>Y, AND TRUST IN M-<br />

COMMERCE<br />

<strong>The</strong> growth <strong>of</strong> the Internet and e-commerce has<br />

dramatically increased the amount <strong>of</strong> personal information<br />

that can be potentially collected about individuals by<br />

corporations and governments. Such data collections, along<br />

with usage tracking (click stream data) and the sharing <strong>of</strong><br />

information with third parties are always invoking issues <strong>of</strong><br />

privacy, especially in view <strong>of</strong> the fact that they can be easily<br />

done through high-speed links and high-capacity storage<br />

devices in a very accurate fashion, and most <strong>of</strong>ten without<br />

the consumer’s or citizen’s expressed knowledge or consent<br />

. This valuable information, <strong>of</strong>ten collected by hidden tools<br />

such as cookies and Web bugs can be shared with third<br />

parties for marketing purposes and surveillance operations,<br />

and its perceived value has been occasionally behind the<br />

stock-market valuations <strong>of</strong> some companies. In fact, this<br />

detailed information can be combined with other <strong>of</strong>f-line<br />

data such as demographic and psychographic data to predict<br />

a user’s interests, needs, and possible future purchases. To<br />

deal with the problem <strong>of</strong> pr<strong>of</strong>iling, trust seals and<br />

government regulations appear to be two forces pushing for<br />

more and better privacy disclosures on the Web. <strong>The</strong> former<br />

tend to promote privacy in the form <strong>of</strong> self-regulation,<br />

where they may eventually become more <strong>of</strong> a privacy<br />

advocate for corporations rather than for consumers. <strong>The</strong><br />

latter can advance privacy through legislation but can also<br />

potentially create privacy worries for citizens by monitoring<br />

their telecommunications traffic. For instance, the FBI’s<br />

powerful DCS1000 Carnivore program is a computerautomated<br />

snooping tool that is capable <strong>of</strong> intercepting and<br />

sorting out millions <strong>of</strong> text messages, such as telephone<br />

conversations and e-mails passing through ISPs by<br />

monitoring incoming and outgoing messages to specific IP<br />

addresses. It is clear that governments’ regulations and<br />

legislation can be as likely to thwart privacy as to enforce it.<br />

Even though wireless communications possess<br />

numerous merits, privacy is not one <strong>of</strong> them. M-commerce<br />

possesses, in addition to all privacy issues related to e-<br />

commerce, another major privacy threat: the sharing <strong>of</strong><br />

knowledge about a user’s location with others. <strong>The</strong>re are<br />

basically three solutions to this positioning problem: i) the<br />

network-based solution, where the calculations are carried<br />

out by the cellular network and the positioning information<br />

may then be passed to the user; ii) the device-based solution,<br />

where the wireless device computes its own position; and<br />

iii) a hybrid solution. <strong>The</strong> pitfall associated with the<br />

network-based positioning is that the information about the<br />

user’s whereabouts can be collected but not necessarily<br />

passed to the user. Instead, the information may be exploited<br />

by other entities, all without the user’s knowledge, let alone<br />

his/her consent. Also, there are some privacy implications<br />

about the requirement that wireless devices need to be<br />

embedded with a location-tracking technology to provide<br />

location-based services, such as targeted advertising and<br />

finding the nearest “X.” For instance, if location records<br />

were kept over time, an in-depth pr<strong>of</strong>ile could be compiled<br />

for other, perhaps unwarranted, purposes.<br />

<strong>The</strong> essence <strong>of</strong> a business transaction is based on<br />

trust, and trust must be mutual. Trust in a business context<br />

may be expressed in laws, contracts, regulations, and<br />

policies, as well as in personal reputations and long-term<br />

relationships, but these measures are not easily transferable<br />

to an online environment. <strong>The</strong> people online are generally<br />

rather too trusting when involved in personal interactions,<br />

such as downloading s<strong>of</strong>tware or engaging in chat rooms<br />

with strangers, but they are rather distrustful when involved<br />

in business transactions. A major barrier to the success <strong>of</strong><br />

online businesses has been the fundamental lack <strong>of</strong> faith<br />

between most businesses and consumers. This lack <strong>of</strong> trust<br />

is mainly due to the fact that consumers must provide<br />

detailed personal and confidential information upon request.<br />

For instance, the seller is not sure if the credit card number<br />

is genuine and belongs to the buyer, nor is the buyer sure<br />

that the seller would not misuse the credit card number for<br />

purposes other than the one allowed. It takes a very long<br />

time for the parties in click-and-mortar businesses (i.e., e-<br />

commerce) to establish the same level <strong>of</strong> trust which has<br />

existed for so long between the parties in brick-and-mortar<br />

businesses, and it will take an even longer time for pushand-mortar<br />

businesses (i.e.,m-commerce) to achieve the<br />

same level <strong>of</strong> trust.<br />

<strong>The</strong> issue <strong>of</strong> health and safety in wireless devices<br />

either as legally imposed by the governments’ regulations or<br />

as apparently complied by the manufacturer’s raises the<br />

issue <strong>of</strong> trust. In principle, the strong majority <strong>of</strong> people<br />

accept the safety guidelines, health recommendations, and<br />

regulatory standards issued by governments and what the<br />

manufacturers claim to respect. But, on the other hand, some<br />

<strong>of</strong> the health and safety guidelines in the past did not protect<br />

citizens’ safety and consumers’ heath. <strong>The</strong> guidelines and<br />

advisories for nuclear tests and smoking during the fifties<br />

are two cases in point.<br />

www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 5


CONCLUSION<br />

<strong>The</strong> major limitations <strong>of</strong> m-commerce, as viewed<br />

today, are small screens on wireless devices, limited<br />

processing power, modest memory, restricted power<br />

consumption, poor voice quality, low-speed data<br />

transmission, non-ubiquitous coverage, unproven security,<br />

scarce bandwidth, and possible health hazards. In view <strong>of</strong><br />

the fact that mobile computing is accelerating at a rate<br />

faster than Moore’s law, and according to Edholm’s law <strong>of</strong><br />

bandwidth , wireless transmission rates also follow Moore’s<br />

law, many <strong>of</strong> these limitations are expected to diminish, if<br />

not being eliminated, over time.<br />

In light <strong>of</strong> the fact that m-commerce is just at its<br />

inception, the real potential has yet to be visualized, let<br />

alone tapped. Noting that the highly-personalized, contextaware,<br />

location-sensitive, time-critical applications are the<br />

most promising applications in m-commerce, there are many<br />

m-commerce applications envisaged to become very widely<br />

popular. <strong>The</strong>y include: i) digital cash (to enable mobile users<br />

to settle transactions requiring micro-payments), ii) humanto-machine<br />

communications (to facilitate mobile users to<br />

communicate to stationary locations for access and security<br />

and to moving objects for asset and logistic purposes using<br />

RFID technologies), iii) telemetry (to activate remote<br />

recording devices for sensing and measurement<br />

information), and iv) broadband-interactive multimedia<br />

communications and messaging anytime, anywhere.<br />

4G systems with more security, higher speeds,<br />

higher capacity, lower costs, and more intelligent<br />

infrastructures and devices will help realize m-<br />

commerce applications. With improved wireless security<br />

and privacy through data encryption and user education, on<br />

the one hand, and with the wide deployment <strong>of</strong> 4G systems<br />

,it is anticipated that m-commerce will inescapably, become<br />

the most dominant method <strong>of</strong> conducting business<br />

transactions.<br />

REFERENCES<br />

[1] <strong>IT</strong>U, World Telecommunications Development Report,<br />

2008<br />

[2] Merrill Lynch, Wireless Matrix, 3Q03.<br />

[3] A. Mehrotra, Cellular Radio: Analog and Digital<br />

Systems, Artech House, 1999.<br />

[4] www.umts-forum.org<br />

[5] www.docomo.com<br />

[6] K. Tachikawa, “A perspective on the evolution <strong>of</strong><br />

mobile communications,” IEEE Communications<br />

Magazine, pp. 66-73, October 2003.<br />

[7] Y. Kim et al., “Beyond 3G: vision, requirements, and<br />

enabling technologies,” IEEE Communications Magazine,<br />

pp. 120-124, March 2003.<br />

[8] A. Dornan, <strong>The</strong> Essential Guide to Wireless<br />

Communications Applications, Prentice-Hall, 2001.<br />

[9] N. J. Muller, Wireless A to Z, McGraw-Hill, 2003.<br />

[10] U. Varshney and R. Jain, “Issues in emerging 4G<br />

wireless networks,” IEEE Computer Magazine, pp. 94-96,<br />

June 2001.<br />

[11] L. Garber, “Will 3G really be the next big wireless<br />

technology?” IEEE Computer Magazine, pp. 26-32,<br />

January 2002.<br />

[12] Y. Yuan and J. J. Zhang, “Toward an appropriate<br />

business model for m-commerce,” International <strong>Journal</strong> <strong>of</strong><br />

Mobile Communications, pp. 35-56, January 2003.<br />

[13] B. G. Evans and K. Baughan, “Visions <strong>of</strong> 4G,”<br />

Electronics and Communication Engineering <strong>Journal</strong>, pp.<br />

293-303, December 2000.<br />

[14] J. Z. Sun, J. Sauvola, and D. Howie “Features in<br />

future: 4G visions from a technical perspective,”<br />

Proceedings <strong>of</strong> IEEE GlobeCom Conference, pp. 3533-<br />

3537, November 2001.<br />

[15] T. Zahariadis, “Trends in the path to 4G,”<br />

Communications Engineer, pp. 12-15, February 2003.<br />

[16] S. K. Hui and K. H. Yeung, “Challenges in the<br />

migration to 4G mobile systems,” IEEE Communications<br />

Magazine, pp. 54-59, December 2008.<br />

[17] J. A. Senn, “<strong>The</strong> emergence <strong>of</strong> m-commerce,” IEEE<br />

Computer Magazine, pp. 148-150, December 2009.<br />

[18] E. Turban, D. King, J. Lee, and D. Viehland,<br />

Electronic Commerce 2009: a Managerial Perspective,<br />

Pearson, 2010.<br />

***<br />

www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 6


<strong>The</strong>oretical framework <strong>of</strong> I-Thoun<br />

(Information Thought Network)<br />

(A futuristic generation computational device)<br />

Dr. Pranav Pandya,<br />

Chancellor <strong>of</strong> Dev Sanskriti University,Haridwar, India<br />

Pr<strong>of</strong>. Abhay Saxena<br />

Associate Pr<strong>of</strong>essor and Head, Dept. Of Computer <strong>Science</strong>, Dev sanskriti University, Hardwar, India<br />

Abstract: <strong>The</strong> world <strong>of</strong> computing is changing<br />

enormously. <strong>The</strong> new generation computing like green,<br />

cloud, grid has taken the place <strong>of</strong> conventional computing.<br />

<strong>The</strong> latest generation gadgets i-pad, i-pod, i-phone are<br />

making the life smooth and affordable. Most <strong>of</strong> these<br />

devices are controlled by the human being with some<br />

physical movement. Think <strong>of</strong> the situation when the<br />

futuristic devices will move with the power <strong>of</strong> thoughts and<br />

speed <strong>of</strong> emotions. <strong>The</strong> present paper is a core idea <strong>of</strong> i-<br />

Thoun (an electronic gadget Intelligent based Thought<br />

network), a new generation computing device which will<br />

run with the speed <strong>of</strong> thoughts. <strong>The</strong> network, system<br />

connectivity and data transfer all will be available with a<br />

high definition speed and with enormous security. <strong>The</strong><br />

present paper will give the technocrats a new vision and<br />

direction <strong>of</strong> the futuristic computing devices.<br />

KeyWords: I-Thoun, futuristic computing, Internet<br />

devices, thought power<br />

INTRODUCTION<br />

We do believe that God has created this world but the<br />

technology avatar is a new incarnation <strong>of</strong> human being<br />

endeavours. <strong>The</strong> paradigm shifted from the world which<br />

revolves around the God to technology governed life. <strong>The</strong><br />

wonderful world <strong>of</strong> I-revolution has shaken the world. <strong>The</strong><br />

enormous demand for I-Pad, I-Pod and I-Phone is across the<br />

globe. “Information technology and business are becoming<br />

inextricably interwoven. I don't think anybody can talk<br />

meaningfully about one without the talking about the other”<br />

(Bill Gates, 2004).<br />

We are just an advanced breed <strong>of</strong> monkeys on a minor<br />

planet <strong>of</strong> a very average star. But we can understand the<br />

Universe. That makes us something very special (Stephen<br />

Hawkins, 2010). <strong>The</strong> banking, medical science,<br />

transportation, communication and education mostly track<br />

on one common platform i.e. technology and believe it most<br />

<strong>of</strong> us enjoys it.<br />

THOUGHTS & DREAMS – THE ENOURMOUS<br />

POWERHOUSES<br />

<strong>The</strong> world which evolved around the thoughts, emotions and<br />

sentiments is enormous. <strong>The</strong> length and breadth <strong>of</strong> the world<br />

looks small when the thought flies along with the<br />

imagination. <strong>The</strong> question bobbles up in mind, why only<br />

Newton had a wonderful idea <strong>of</strong> innovation that leads<br />

toward the ‘Principle <strong>of</strong> Gravity’. <strong>The</strong> falling <strong>of</strong> apple<br />

happens several times in our life but we never come up with<br />

new idea.<br />

<strong>The</strong> (Steve, 2005) rightly quoted, “Your time is limited, so<br />

don’t waste it living someone else’s life. Don’t be trapped<br />

by dogma – which is living with the results <strong>of</strong> other people’s<br />

thinking. Don’t let the noise <strong>of</strong> other’s opinions drown out<br />

your own inner voice and most important, have the courage<br />

to follow your heart and intuition. <strong>The</strong>y somehow already<br />

know what you truly want to become. Everything else is<br />

secondary.”<br />

Dr. A.P.J. Abdul Kalam had quoted, “Great dreams <strong>of</strong> great<br />

dreamers are always transcended.” We usually hesitate to<br />

dream. It is important to be innovative and it comes through<br />

dreams, the thought power to materialize those dreams into<br />

reality makes man a real innovator, an inventor or<br />

sometimes lucky to get even a noble. Every great dream<br />

begins with a dreamer. Always remember, you have within<br />

yourself the strength, the patience, and the passion to change<br />

the world (Harriet Tubman, 1865). We know that the<br />

technology is good but it should be used to make the best <strong>of</strong><br />

mankind. <strong>The</strong> most exciting breakthroughs <strong>of</strong> the 21st<br />

century will not occur because <strong>of</strong> technology but because <strong>of</strong><br />

an expanding concept <strong>of</strong> what it means to be human” (Johns<br />

Naisbitt, 2000). <strong>The</strong> scientist community is making some<br />

sincere efforts in this direction.<br />

• A wheel chair that reads your mind: (emmet cole,<br />

2007)<br />

Spanish scientists have begun work on a new braincomputer<br />

interface, or BCI, capable <strong>of</strong> converting thought<br />

into commands that a wheelchair can execute. <strong>Research</strong>ers<br />

are developing a thought-controlled robotic wheelchair. <strong>The</strong><br />

Spanish researchers hope to develop a small, mobile<br />

interface that works with electroencephalogram electrodes,<br />

or EEG, placed on the scalp. Two 800-MHz Intel<br />

computers mounted on the wheelchair will process these<br />

readings and send instructions to the wheels. After about a<br />

week's training the s<strong>of</strong>tware will adapt to patients' thought<br />

patterns for simple commands such as "left" and "right."<br />

• Ecole Polytechnique Fédérale de Lausanne (EPFL)<br />

A more user-friendly brain-machine interface, (Bex<br />

coxworth, 2011)<br />

www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 7


Practical thought-controlled devices, such as wheelchairs,<br />

artificial arms, or even cars, are perhaps a step closer to<br />

reality thanks to research being carried out at Switzerland's<br />

Ecole Polytechnique Fédérale de Lausanne (EPFL). <strong>The</strong><br />

(EPFL) system utilizes EEG readings obtained from a<br />

network <strong>of</strong> sensors on the user’s scalp to control assistive<br />

devices such as an electric wheelchair; in addition it uses<br />

statistical analysis, or probability theory, when processing<br />

these readings, allowing it to learn what the user expects <strong>of</strong><br />

it. When combined with a Shared Control system, which<br />

uses cameras and sensors to augment the thought control<br />

system, it can accomplish tasks such as avoiding obstacles<br />

without constant mental updates from the user.<br />

• <strong>The</strong> Mental Typewriter (Mike Hanlon, 2006)<br />

Scientists demonstrated a brain-computer interface that<br />

translates brain signals into computer control signals at<br />

CeB<strong>IT</strong> in Berlin. <strong>The</strong> initial project demonstrates how a<br />

paralysed patient could communicate by using a mental<br />

typewriter alone – without touching the keyboard.<br />

• Playing computer games with the blink <strong>of</strong> an eye<br />

(Paul Ridden, 2010)<br />

Under the supervision <strong>of</strong> Dr Aldo Faisal, a group <strong>of</strong><br />

undergraduates from Imperial College London have adapted<br />

an open source version <strong>of</strong> the Atari video game Pong so that<br />

the player's paddle can be controlled using only eye<br />

movement. an infra-red sensor and a webcam to a pair <strong>of</strong><br />

glasses to track the movement <strong>of</strong> a player's eye and feeding<br />

the information to synchronization s<strong>of</strong>tware on a laptop that<br />

translates it into onscreen paddle movement.<br />

• Physics <strong>of</strong> the Future: How <strong>Science</strong> Will Shape<br />

Human Destiny and Our Daily Lives by the Year<br />

2100 (Michio Kaku, 2011)<br />

In all likelihood, by 2100 we will control computers via tiny<br />

brain sensors and, like magicians, move objects around with<br />

the power <strong>of</strong> our minds. Artificial intelligence will be<br />

dispersed throughout the environment, and Internet-enabled<br />

contact lenses will allow us to access the world's<br />

information base or conjure up any image we desire in the<br />

blink <strong>of</strong> an eye. Meanwhile, cars will drive themselves using<br />

GPS, and if room-temperature superconductors are<br />

discovered, vehicles will effortlessly fly on a cushion <strong>of</strong> air,<br />

coasting on powerful magnetic fields and ushering in the age<br />

<strong>of</strong> magnetism.<br />

• Xbox Kinect foretells computers <strong>of</strong> the future ( Matt<br />

Warman , 2011)<br />

Micros<strong>of</strong>t's head <strong>of</strong> research says that computers <strong>of</strong> the<br />

future will recognise you and be more intuitive than ever. In<br />

a radical new approach to gaming, Kinect uses a camera<br />

simply to “read” a user’s movements and insert them into a<br />

video game. “You are the controller” is the slogan, and, in<br />

short, the device allows people to take up bowling, tennis<br />

and much more, simply by standing in front <strong>of</strong> their TV<br />

screens. <strong>The</strong> change in computing scenario is pushing the<br />

world towards smarter technologies rather than quicker.<br />

Smarter, not faster, is the future <strong>of</strong> computing research<br />

(Steeve Lohr, 2011). In an interesting article in Thinkquest,<br />

May 2011, the future <strong>of</strong> computers were predicted as the<br />

computers are going to all be in cars and may even drive the<br />

cars someday. It also talks about cat liter box to cupboards<br />

that open up on request. <strong>The</strong> possibilities are boundless and<br />

endless.<br />

I POWER OF THOUGHT<br />

What can’t be conquered by sword can be easily achievable<br />

by thought. <strong>The</strong> power <strong>of</strong> thought is enormous and it can<br />

change the destiny (Sharma Sriram, 1985). Thought is<br />

everywhere. You are surrounded by an ocean <strong>of</strong> thought.<br />

You are floating in the ocean <strong>of</strong> thought. You are absorbing<br />

certain thoughts and repelling some in the thought-world,<br />

(Shivanand Swami, 1997). <strong>The</strong> power <strong>of</strong> thought is like a<br />

spiritual power, (Emerson, 1935).<br />

CONCEPT OF I-THOUN<br />

<strong>The</strong> I-Thoun”, (intelligent Thought network device) will be<br />

a new version <strong>of</strong> trio i.e. I-Pad, I-pod, I-phone with advance<br />

features. It may have a small tablet shape device. <strong>The</strong> menu<br />

button will shows the features <strong>of</strong> education, TV,<br />

entertainment, sport, travel tour, telephone, guide,<br />

knowledge and a virtual teacher. This will provide the entire<br />

syllabus <strong>of</strong> quality continental education at the figure tip.<br />

<strong>The</strong> various streams, subjects and the course contents will<br />

be easily available. It will also have the long series <strong>of</strong> TV’s<br />

program especially cartoons covering the entire globe. <strong>The</strong><br />

Pandora Box – (I-thoun) will have much more to cheer<br />

about.<br />

FUNCTIONAL<strong>IT</strong>Y OF I-THOUN<br />

<strong>The</strong> daily digital newspaper will display automatically all<br />

because <strong>of</strong> the idea to have a newspaper. An idea to have<br />

food will bring the ‘I-Thoun’ to display the contents and the<br />

availability <strong>of</strong> food in the house. It was also be ready with<br />

the nearby grocery stores and food marts. It will also be<br />

connected with the helping servant ‘Robomania’ (a new<br />

version <strong>of</strong> Robots) who will be ready to press the menu<br />

button to have the food. It will also help the Microwave to<br />

get started automatically to pre-heating process so as to<br />

serve the food on time.<br />

I-thoun will also perform “Daily health check up”. <strong>The</strong><br />

vitamins, minerals, carbohydrate, proteins are available in<br />

various potencies (in aroma format) just like time waver<br />

machine (Germany). <strong>The</strong> moment one press the button <strong>of</strong><br />

Medicine and the entire stuff <strong>of</strong> pathology, biochemistry and<br />

routine check up parameters will be there on the screen. One<br />

can inhale the prescribed medicines with the help <strong>of</strong> ‘I-<br />

Thoun’ and will definitely get away with the smell and taste<br />

<strong>of</strong> medicines while consuming the same orally.<br />

<strong>The</strong> idea to play Basket ball will allow the I-thoun to display<br />

the virtual basket ball court on screen. It will also prompt to<br />

choose any <strong>of</strong> the continental teams and as the concept <strong>of</strong><br />

countries will be over by 2025, it will be purely on the<br />

continent based. Surprisingly one has to buy this in<br />

“Eudolee”, which is nothing but a combination <strong>of</strong> Euro,<br />

Dollar and Rupee.<br />

I-thoun will also take care <strong>of</strong> security issue seriously. <strong>The</strong><br />

‘thought enabled lock’ will be good exercise in taking care<br />

<strong>of</strong> valuable materials and property. <strong>The</strong> various digital<br />

mantras (thought generated data packets) to open and close<br />

www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 8


the digital doors will also make the police station a part <strong>of</strong><br />

history.<br />

improve the living condition and a pathway for global<br />

harmony, peace and brotherhood.<br />

II WORK PROCESS<br />

Basically it will work on the Thought Technology. <strong>The</strong> I-<br />

thoun microprocessors will receive signals from the brain<br />

and perform the process which is either pre-programmed or<br />

can be develop through ANN trained chips. <strong>The</strong> voluminous<br />

database will be highly sophisticated and will be connected<br />

through Google earth, sky and water along with various<br />

upcoming functionality and utility based databases and<br />

search engines.<br />

III DATA CONNECTIV<strong>IT</strong>Y & NETWORK<br />

<strong>The</strong> question may arise that how does this I-thoun will be<br />

managed effectively? Don’t we have the network problem<br />

as it will be handling millions <strong>of</strong> data on the same device<br />

and its connectivity with many other hi end computing<br />

peripherals? What about the network? Which topology will<br />

be best suited? <strong>The</strong> new wave <strong>of</strong> cloud computing had taken<br />

care <strong>of</strong> some <strong>of</strong> these questions. <strong>The</strong> question <strong>of</strong> thought<br />

governing device will definite be successful as it will take<br />

care most <strong>of</strong> the day to day activities with the available<br />

transcripted databases and the meta crawler based search<br />

engines. <strong>The</strong> upgraded and new emerging processors will<br />

work with the speed much more than Petaflops (10 15 ) and<br />

exaflops (10 18 ). <strong>The</strong> Network will be Wi-Fi as the system<br />

will be interacting at the speed <strong>of</strong> thoughts. Data<br />

transmission will definitely be in data packets labelled as<br />

“Thoughtrons”.<br />

OS OF I-THOUN<br />

<strong>The</strong> FPGA and advanced VLSI chips we are using for<br />

modern supercomputers. <strong>The</strong> I-thoun will work on<br />

“Thoughtrons” based chip. <strong>The</strong> Genome Technology, grid<br />

computing, expert system, ANN all are going to play a vital<br />

role in developing this chip. <strong>The</strong> neurologist, the<br />

psychiatrist, the microbiologist and the technocrats will have<br />

to come together to develop this sophisticated chip <strong>of</strong><br />

“Thoughtrons”. <strong>The</strong> idea was originally conceived from the<br />

Vichar Kranti, the thought transformation process carried<br />

out at various eras. <strong>The</strong> words <strong>of</strong> Lord Buddha, Lord<br />

Mahaveer, Socrates, and Gandhi will have to be transcript.<br />

<strong>The</strong> wave <strong>of</strong> thoughts <strong>of</strong> Pt. shriram Sharma, Sri Aurobindo<br />

and Swami Vivekananda has to be programmed and to be<br />

converted into thought chips, - Thoughtrons.<br />

CONCLUSION<br />

<strong>The</strong> I-thoun is going to hit the market with recent<br />

development and researches in the field <strong>of</strong> computer science.<br />

<strong>The</strong> modern computing grid, cloud, green or parallel all are<br />

going to be changed with the time frame and the futuristic<br />

computing will be thought governed computing i.e. Thought<br />

computing. <strong>The</strong> I-thoun is going to shake the world as there<br />

will be hardly any space for lie, hatred and hiding the<br />

emotions as everything and anything will be on display and<br />

public. Our greatest hopes could become reality in the future.<br />

With the technology at our disposal the possibilities are<br />

unbounded (Steve Hawkins, 1993). This will definitely<br />

REFERENCES:<br />

1. Cole, E., 2007: “ A wheel chair that reads your mind”,<br />

January 29, 2007 available at :<br />

http://www.transhumanism.org/pipermail/ieetnews/2007-January/000517.html<br />

2. Emerson, 1935; “the three fundamental concept <strong>of</strong><br />

Emerson philosophy”, theosophy, volume 24, pp 49-54.<br />

3. Guevin, J., 2006: “Say what? A look back at Gates’,<br />

pearls <strong>of</strong> wisdom”, Cnet, June 15, 2006, available at<br />

http://news.cnet.com/Say-what-A-look-back-at-Gatespearls-<strong>of</strong>-wisdom/2100-1014_3-6084505.html<br />

4. Hanlon, M., 2006: “<strong>The</strong> mental typewriter”, March 13,<br />

2006, gizmag, available at<br />

http://www.gizmag.com/go/5356/<br />

5. Hawkins, S., 2010: “A brief history <strong>of</strong> time: <strong>The</strong><br />

updated and expanded Tenth anniversary edition,<br />

Bantam books, New York.<br />

6. Jobs, S.; 2005; “Standford commencement address”,<br />

June 12, 2005, available at<br />

http://news.stanford.edu/news/2005/june15/jobs-<br />

061505.html<br />

7. Kalam, A. P. J., 1999: “Wings <strong>of</strong> fire, An<br />

Autobiography <strong>of</strong> APJ Abdul kalam”, Universities<br />

press, pp 161.<br />

8. Kaku, M., 2011: “ Physics <strong>of</strong> the future: How <strong>Science</strong><br />

Will Shape Human Destiny and Our Daily Lives by the<br />

Year 2100, Double day, New York<br />

9. Lohr, S., 2011: “Big data, speed and the future <strong>of</strong><br />

computing”, October 31, 2011, New York times.<br />

Available<br />

at:<br />

http://bits.blogs.nytimes.com/2011/10/31/big-dataspeed-and-the-future-<strong>of</strong>-computing/<br />

10. Naisbitt, J. B., Aburdene, P., 2000; available at<br />

http://tomdohm.wordpress.com/2011/08/24/deus-extranshumanism-and-you/<br />

11. Ridden, P., 2010 : “playing computer game with the<br />

blink <strong>of</strong> an eye”, March 30, 2010, Gizmag, available at :<br />

http://www.gizmag.com/eye-movement-game-controldevelopment/14667/<br />

12. Tubman, H., 1865 available at :<br />

http://thinkexist.com/quotation/<br />

every_great_dream_begins_with_a_dreameralways/346539.html<br />

13. Sharma, S.A., 1985: “Vicharo ki prachand Samarth”,<br />

yugantar chetna press, mathura<br />

14. Shivanand, S., 1997: “ Thought Power”, <strong>The</strong> divine life<br />

society publication, Tehri Garhwal,<br />

15. Warman, M., 2011: “ Xbox kinect foretells computers<br />

<strong>of</strong> the future; February 24, 2011, <strong>The</strong> telegraph, UK,<br />

available at :<br />

http://www.telegraph.co.uk/technology/micros<strong>of</strong>t/8344<br />

028/Xbox-Kinect-foretells-computers-<strong>of</strong>-thefuture.html<br />

<br />

Websites:<br />

http://library.thinkquest.org/C0113882/futcomputer.sht<br />

ml<br />

***<br />

www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 9


Internet Banking: A Case Study <strong>of</strong> the Factors<br />

influencing its Adoption in Mauritius<br />

Dinesh RAMDHONY * and Deerajen RAMASAWMY<br />

Abstract<br />

Purpose – <strong>The</strong> purpose <strong>of</strong> this paper is to investigate the<br />

factors that influence bank customers in Mauritius to adopt<br />

Internet Banking (IB).<br />

Methodology – An online survey was conducted with a<br />

response rate <strong>of</strong> 73%.<br />

Findings – Around 54% <strong>of</strong> the respondents were IB users.<br />

<strong>The</strong> commonly used services were for information inquiry<br />

and transfer <strong>of</strong> funds. Factor Analysis reveals that from a<br />

user’s point <strong>of</strong> view ‘availability <strong>of</strong> infrastructure’ and<br />

‘perceived ease <strong>of</strong> use’ are the most important factors in<br />

determining adoption <strong>of</strong> IB. In contrast, for non-users <strong>of</strong> IB,<br />

it was ‘trust and security issues’. Based on Logistic<br />

Regression analysis, household income group and age group<br />

were found to be the most significant demographic variables<br />

that determine adoption <strong>of</strong> IB.<br />

Practical implications – <strong>The</strong> results can be used by banks<br />

to devise strategies in increasing their customer base by<br />

catering for the needs <strong>of</strong> actual users and taking on board<br />

non-users.<br />

<strong>Research</strong> limitation – <strong>The</strong> use <strong>of</strong> convenience sampling<br />

weakens the objectivity <strong>of</strong> this research.<br />

Originality – This study considers the factors leading to<br />

actual usage or non-usage <strong>of</strong> IB unlike other studies which<br />

investigate the intention to use IB.<br />

Keywords: Internet Banking, Internet Banking Adoption,<br />

Technological Acceptance Model, Mauritius<br />

Introduction<br />

Advances in information technology have significantly<br />

changed the way banks deliver services to their customers<br />

and the way the latter undertake their regular banking<br />

transactions. Pressured by rising costs, ever more<br />

demanding customers, and the need to preserve pr<strong>of</strong>itability<br />

while standing out from the competition, banks found<br />

themselves forced to invest in new customer service<br />

channels such as internet banking (IB) (Hernandez and<br />

Mazon, 2007:72). <strong>The</strong> trend is evident in several developing<br />

countries such as Malaysia (Hway-Boon and Yu, 2003) and<br />

Thailand (Rotchanakitumnuai and Speece, 2003). Mauritian<br />

banks have joined the bandwagon and <strong>of</strong>fer a multiplechannel<br />

strategy to meet the needs <strong>of</strong> their clients.<br />

Internet banking <strong>of</strong>fers a multitude <strong>of</strong> benefits to both the<br />

user and the provider. Studies in Spain and Italy have found<br />

a positive correlation between provision <strong>of</strong> online services<br />

and financial performance (Hernando and Nieto, 2007,<br />

Hasan et al., 2005). Other benefits include cost savings,<br />

increased customer base, delivery <strong>of</strong> services in an<br />

innovative manner, increased marketing and communication<br />

possibilities, mass customisation and development <strong>of</strong> noncore<br />

businesses (Jayawardhena and Foley, 2000). From a<br />

user’s perspective the decision to adopt internet banking is<br />

mainly motivated by convenience and efficiency (Bruno,<br />

2003). Customers can access their bank account and effect<br />

transactions anywhere at any time. Internet banking has<br />

been found to be the cheapest delivery channel for<br />

standardised banking transactions such as account services<br />

and transfer <strong>of</strong> funds (Polatoglu and Ekin, 2001).<br />

A study on the adoption <strong>of</strong> internet banking in Mauritius<br />

was carried out by Padachi, Seetanah and Rojid (2006).<br />

However, the study lacked theoretical underpinning. <strong>The</strong><br />

last five years witnessed several cuts in the rates <strong>of</strong> internet<br />

access coupled with various initiatives by the local and<br />

central government to provide internet access in public<br />

places which justifies a new study on the adoption <strong>of</strong><br />

internet banking. <strong>The</strong> paper sets out to investigate the<br />

factors influencing the use <strong>of</strong> internet banking in Mauritius<br />

and tries to draw the pr<strong>of</strong>ile <strong>of</strong> the Mauritian Internet<br />

banking user. <strong>The</strong> findings are expected to be <strong>of</strong> great use to<br />

policy makers, financial institutions willing to launch IB<br />

services and more particularly to commercial banks already<br />

<strong>of</strong>fering IB facilities in devising strategies towards greater<br />

customer satisfaction and increasing their customer base.<br />

<strong>The</strong> paper is organised as follows. <strong>The</strong> next part contains a<br />

discussion <strong>of</strong> the theoretical models used to explain<br />

technology acceptance and findings <strong>of</strong> other studies<br />

regarding the adoption <strong>of</strong> internet banking. <strong>The</strong>n, the paper<br />

outlines the research methodology and presents the findings<br />

from the data analysis. From the findings, conclusions are<br />

drawn and recommendations are provided for assisting<br />

banks in devising strategies to increase their customer base.<br />

<strong>The</strong>oretical framework<br />

Several theories have been used to explain the determinants<br />

<strong>of</strong> <strong>IT</strong> adoption for individuals; the <strong>The</strong>ory <strong>of</strong> Reasoned<br />

Action (Fishbein & Ajzen, 1975), the <strong>The</strong>ory <strong>of</strong> Planned<br />

Behaviour (Ajzen, 1991) and the Technological Acceptance<br />

Model (TAM). Yousafzai et al. (2010) compared the three<br />

previously named theories in predicting IB behaviour. <strong>The</strong>y<br />

concluded that TAM is superior to other models. Chang and<br />

Hamid (2010) and Eriksson (1995) have also used the TAM<br />

for explaining IB adoption. This paper uses to a large extent<br />

the constructs <strong>of</strong> the TAM to explain IB adoption / nonadoption<br />

in Mauritius. TAM involves two primary<br />

predictors for the potential adopter, namely Perceived<br />

Usefulness and Perceived Ease <strong>of</strong> Use.<br />

Perceived Usefulness is defined as “the degree to which a<br />

technology is able to provide a means-end relationship, that<br />

is, the given technology as a means to a desired end” (Doll<br />

et al., 1998). <strong>The</strong> work <strong>of</strong> Wai-Ching Poon (2008)<br />

emphasised on the degree <strong>of</strong> convenience that customers can<br />

www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 10


attribute to the service and accordingly, 82% <strong>of</strong> the<br />

respondents agreed that e-banking is time saving and 53%<br />

strongly agreed that no queuing at the banks’ branches is<br />

advantageous. Sayar and Wolfe (2007) stated that customers<br />

find IB attractive as it is possible to conduct transactions<br />

anytime and anywhere, faster and lower fees are incurred<br />

compared to using traditional bank branches.<br />

Perceived Ease <strong>of</strong> Use refers to “the extent to which a<br />

person believes that using a particular system would be free<br />

<strong>of</strong> effort” (Davis et al., 1989). Rogers (1962) theorised that<br />

perceived ease <strong>of</strong> use demonstrates the degree to which an<br />

invention is seen as being not too difficult to understand,<br />

learn or operate. One <strong>of</strong> the attributes <strong>of</strong> Perceived Ease <strong>of</strong><br />

Use as suggested by Taylor and Todd (1995) is the<br />

complexity associated with the innovation, and in their study<br />

the latter was found to have the most significant relationship<br />

with adoption across a broad range <strong>of</strong> innovation types.<br />

Several other factors apart from Perceived Usefulness and<br />

Perceived Ease <strong>of</strong> Use, have been identified as influencing<br />

the decision to adopt IB. Davies (1989) refers to them as<br />

external variables. Some examples are: security or safety,<br />

the level <strong>of</strong> consumer trust, the risks associated with online<br />

banking, the infrastructure available, and eventually<br />

technological knowledge or awareness.<br />

Security or Safety<br />

<strong>The</strong> banking industry has declared information privacy and<br />

security to be major obstacles in the development <strong>of</strong><br />

consumer related electronic commerce (Thomas et al.,<br />

2002). Fear and anguish among the consumers<br />

psychological state that may bar them from using the system<br />

may be intensified if there exists any lapse <strong>of</strong> security in<br />

internet usage. Customers will not be willing to use the<br />

service if it is perceived as being easily susceptible to fraud<br />

(Al-Somali et al., 2009). This point was corroborated in a<br />

research conducted by Al-Hajri and Tatnall (2007). Most<br />

respondents were concerned about the problem <strong>of</strong> internet<br />

security as bank customers cannot put their full trust in<br />

internet technology due to possible fraud and privacy<br />

violation problems. In addition, feeling secure in doing<br />

transactions on the Web is <strong>of</strong>ten cited by users as a major<br />

factor that removes their concerns about the effective use <strong>of</strong><br />

the Internet for making online transactions (Salisbury et al.,<br />

2001).<br />

Trust<br />

<strong>The</strong> existence <strong>of</strong> a great deal <strong>of</strong> scepticism about the<br />

security <strong>of</strong> online transactions makes the element <strong>of</strong> trust a<br />

crucial factor when it comes to deciding upon the use <strong>of</strong> e-<br />

banking. Wai-Ching Poon (2008) confirmed that 69%<br />

respondents agreed that trust is affecting their demand for e-<br />

banking services. <strong>The</strong>re could be a limitation <strong>of</strong> the<br />

opportunities from web technology if there is a dearth <strong>of</strong><br />

trust by the consumers in the system (Rotchanakitumnuai<br />

and Speece, 2003). Customers usually do not have faith in<br />

internet based technology for reasons like security <strong>of</strong> the<br />

system, distrust <strong>of</strong> service providers, and anxiety regarding<br />

the dependability and consistency <strong>of</strong> the internet services<br />

(Rotchanakitumnuai and Speece, 2003). Finally, in a<br />

research by Fassnacht and Kose (2007), the customers‟ level<br />

<strong>of</strong> trust in e-banking was confirmed to have a considerable<br />

effect on the consumer’s choice <strong>of</strong> adopting this technology<br />

and for its continued usage.<br />

Awareness <strong>of</strong> the Service<br />

In general, customers will seek out those financial products<br />

which <strong>of</strong>fer the best value for money and about which they<br />

are educated. Once customers become aware <strong>of</strong> the<br />

integrated and secure services available somewhere, they are<br />

likely to switch to the providers <strong>of</strong> such services (Kalakota<br />

and Frei, 1998). El-Nawawy and Ismail (1999) in their study<br />

<strong>of</strong> e-commerce adoption by SMEs in Egypt reported that the<br />

main factors revolve around awareness and education. An<br />

innovative product will not achieve great heights if<br />

consumers are not aware <strong>of</strong> its existence and the potential<br />

benefits it presents. An Australian study by Sathye (1999)<br />

highlighted awareness as one <strong>of</strong> the main factors hindering<br />

the migration <strong>of</strong> consumers to IB.<br />

Availability <strong>of</strong> Infrastructure<br />

O’Connell (1996) identified lack <strong>of</strong> access to computers or<br />

internet as one <strong>of</strong> the possible reasons for slow adoption <strong>of</strong><br />

IB. <strong>The</strong> study by Wai-Ching Poon (2008) divulged that a<br />

majority <strong>of</strong> the respondents (81%) agreed that internet<br />

accessibility is an advantage for users’ satisfaction in<br />

adopting e-banking services. Likewise, through observations<br />

and narrative analysis <strong>of</strong> IB customers, Broderick and<br />

Vachirapornpuk (2002) identified issues like slowness, poor<br />

navigational possibilities, poor interactivity and critical<br />

incidents such as lack <strong>of</strong> help by the providers <strong>of</strong> IB service<br />

to be capable <strong>of</strong> deterring customers from adopting the<br />

service.<br />

Other Factors<br />

Many studies have investigated the effects <strong>of</strong> the customers’<br />

demographic characteristics; age (Czaja et al., 2001), gender<br />

(Venkatesh and Morris, 2000, Burke, 2002), financial<br />

income (Venkatesh and Morris, 2000), and education level<br />

(Burke, 2002). For example, it was found that older<br />

customers generally have negative attitudes towards<br />

technology and innovations; younger adults on the other<br />

hand were seen to be more interested in using new<br />

technologies (Czaja et al., 2001). Income was found by<br />

Venkatesh and Morris, (2000) to potentially exert a strong<br />

effect on the adoption and diffusion <strong>of</strong> technology.<br />

Similarly, gender and education level also played a<br />

significant role with regards to attitude towards technology<br />

use (Burke, 2002).<br />

Internet Banking in Mauritius<br />

<strong>The</strong> banking sector is a major component <strong>of</strong> the financial<br />

system in Mauritius. <strong>The</strong> sector is constantly growing and<br />

has attracted new players in the last five years. Presently the<br />

banking industry comprises <strong>of</strong> 20 banks holding a banking<br />

licence from the Bank <strong>of</strong> Mauritius, <strong>of</strong> which 7 are local<br />

banks, 8 are foreign owned subsidiaries, 1 is a joint venture<br />

and 4 are branches <strong>of</strong> foreign banks. <strong>The</strong> sector has been at<br />

the forefront <strong>of</strong> technological innovations <strong>of</strong>fering several<br />

banking channels via telephone / PC / terminal / Internet.<br />

<strong>The</strong> Mauritius Commercial Bank was the first bank to<br />

launch internet banking services in 1998 followed by the<br />

State Bank <strong>of</strong> Mauritius in 1999. As evidenced by Table I,<br />

www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 11


the number <strong>of</strong> IB customers have increased almost three fold<br />

between 2007 and 2010 while the value <strong>of</strong> IB transactions<br />

have tripled over the same period. <strong>The</strong> trend is expected to<br />

continue with gradual decrease in the costs <strong>of</strong> internet access<br />

and an increase in the number <strong>of</strong> banks <strong>of</strong>fering this service<br />

Methodology<br />

According to Internet World Stats 1 , Mauritius is considered<br />

an Intermediately Internet Penetrated Country. For a<br />

population size <strong>of</strong> 1,303,717 (2011) and 340,000 Internet<br />

Users, Mauritius has an Internet Penetration 26.7% and has<br />

a constantly growing part <strong>of</strong> its population using IB. As a<br />

result, it is very important for this study to investigate the<br />

different factors that influence the usage <strong>of</strong> IB in Mauritius.<br />

For the purpose <strong>of</strong> this study only individual users have<br />

been considered.<br />

A quantitative study was selected to obtain data regarding<br />

the usage <strong>of</strong> and attitudes towards IB. An online survey<br />

methodology approach was adopted. Based on Statistical<br />

Tables, a sample size <strong>of</strong> 398 was required for 95%<br />

Confidence Level, +/-5% and 0.5 degree <strong>of</strong> variability.<br />

Since a detailed list <strong>of</strong> all bank account holders is not<br />

available (for obvious confidential reasons), a convenience<br />

sampling method was used instead <strong>of</strong> a probabilistic method<br />

(such as simple random sampling). Emails were sent to<br />

individuals on the assumption that every working person<br />

holds a bank account. A total <strong>of</strong> 321 responses were<br />

obtained out <strong>of</strong> which 30 were incomplete. Thus, a total <strong>of</strong><br />

291 valid responses were obtained with a response rate <strong>of</strong><br />

73.1%.<br />

Organisation <strong>of</strong> the Questionnaire<br />

<strong>The</strong> questionnaire was prepared based on various sources <strong>of</strong><br />

IB and technology acceptance literature (Polatoglu and<br />

Ekin, 2001; Wai-Ching Poon, 2008; Yousafzai et al., 2010).<br />

<strong>The</strong> first section <strong>of</strong> the questionnaire contained biographical<br />

information about respondents which was meant for all<br />

users. <strong>The</strong> second part contained information destined for<br />

users <strong>of</strong> IB while the third part was aimed at non-users <strong>of</strong><br />

IB. A five-point Likert scale was used for questions in parts<br />

two and three <strong>of</strong> the questionnaire.<br />

<strong>The</strong> questionnaire was pretested several times with<br />

colleagues and experts in the field <strong>of</strong> IB to ensure face<br />

validity <strong>of</strong> items included in the data collection instrument.<br />

<strong>The</strong> pilot test also included a random sample <strong>of</strong> 20 bank<br />

account holders to ensure that the questions were clear and<br />

easily understandable so as to avoid any confusion and thus<br />

not deterring the participation <strong>of</strong> the bank account holders<br />

which is <strong>of</strong> paramount importance (Wai-Ching Poon, 2008).<br />

Following comments from respondents <strong>of</strong> the pilot test,<br />

minor amendments were made to the wordings and<br />

sequence <strong>of</strong> sentences contained in the questionnaire. <strong>The</strong><br />

questionnaire was then sent online with a cover letter<br />

explaining the academic purpose <strong>of</strong> the study and<br />

highlighting the fact that participation was purely voluntary.<br />

An online questionnaire was deemed better than a paper<br />

based one for the following reasons: there is no need to print<br />

questionnaires which saves on cost and contributes to the<br />

1 www.internetworldstats.com : Usage and Population Statistics<br />

promotion <strong>of</strong> a sustainable world; responses remain<br />

anonymous; respondents can fill the questionnaire at their<br />

own convenience; a large number <strong>of</strong> people can be reached<br />

at the click <strong>of</strong> the mouse. In addition, it saves us time on<br />

data input.<br />

Data Analysis<br />

Data collected was analysed using version 19 <strong>of</strong> IBM SPSS<br />

Statistics. A total <strong>of</strong> 321 responses were obtained out <strong>of</strong><br />

which 30 were incomplete. A total <strong>of</strong> 291 valid responses<br />

were obtained. Two sets <strong>of</strong> factor analyses were performed<br />

for both users and non-users. A logistic regression (LR) was<br />

also performed to identify the pr<strong>of</strong>ile <strong>of</strong> the Mauritian IB<br />

user/non-user.<br />

Findings<br />

<strong>The</strong> demographic pr<strong>of</strong>ile <strong>of</strong> the respondents that participated<br />

in the survey are summarised in Table II. We observe that<br />

there were more females (60%) than males (40%). In<br />

addition, the majority <strong>of</strong> the respondents (above 80%) were<br />

below 35 years <strong>of</strong> age and (around 75%) possesses at least a<br />

Diploma. In terms <strong>of</strong> household income, about 40% were in<br />

the group Rs 10,000 to Rs 25,000. Above 90% have Internet<br />

at home and above 80% have it at the work place. However,<br />

only around 54% use IB. Among IB users, the frequency <strong>of</strong><br />

usage <strong>of</strong> the majority <strong>of</strong> users is once a week or less. Table<br />

III summarises the different activities or tasks performed by<br />

IB users. <strong>The</strong> list was prepared based on decreasing<br />

frequency <strong>of</strong> usage. We observe that the majority use IB for<br />

viewing their account details (including account balance),<br />

for making transfers (internally, i.e., within accounts <strong>of</strong> the<br />

users or externally, to other users within same banks and<br />

other banks) and recharging mobile phones. <strong>The</strong> findings are<br />

in line with Polatoglu and Ekin (2001) who found that the<br />

mostly used IB services in Turkey are for information<br />

inquiry and transfer <strong>of</strong> funds. <strong>The</strong> least used services were<br />

found to be ‘Stop lost / stolen cheque’ and ‘Remove 'stop<br />

cheque' request’ which could be anticipated as bank<br />

customers will prefer to go personally to the bank given the<br />

urgency <strong>of</strong> the matter.<br />

Factor Analysis<br />

Users <strong>of</strong> IB<br />

<strong>The</strong> aim <strong>of</strong> this analysis is to group the 19 variables<br />

indicating usage <strong>of</strong> IB into underlying dimensions. <strong>The</strong><br />

Kaiser-Meyer-Olkin (KMO) value reached 0.823 which is<br />

considered excellent for factor analysis (Kaiser, 1974). <strong>The</strong><br />

Barlett test <strong>of</strong> sphericity reached statistical significance<br />

(0.000) indicating that factor analysis is appropriate.<br />

According to the Kaiser principle, only those factors with<br />

eigenvalues greater than 1 were maintained for further<br />

analysis. Principal Component Analysis revealed the<br />

presence <strong>of</strong> four factors which together explain a variance <strong>of</strong><br />

64%. A clear structure emerged after reducing the variables<br />

to four factors. A varimax rotation was performed to<br />

reorganise the four components. As a general rule factor,<br />

loadings less than 0.4 have been suppressed. <strong>The</strong> variables<br />

are listed in the Table IV, in the order <strong>of</strong> size <strong>of</strong> their factor<br />

loadings. Statements around component one give evidence<br />

<strong>of</strong> perceived ease <strong>of</strong> use and availability <strong>of</strong> infrastructure<br />

which are in accord with the findings <strong>of</strong> Davis et al., (1989)<br />

and Broderick and Vachirapornpuk (2002).<br />

www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 12


Non-users <strong>of</strong> IB<br />

For non-users <strong>of</strong> IB, 16 variables were used in the Factor<br />

Analysis so as to reduce the factors into underlying<br />

dimensions. <strong>The</strong> KMO value reached 0.827 while the<br />

Barlett test <strong>of</strong> sphericity reached statistical significance<br />

(0.000) indicating that factor analysis is appropriate. <strong>The</strong><br />

same criteria as mentioned for users <strong>of</strong> IBS were used. As in<br />

the case <strong>of</strong> users <strong>of</strong> IB, the PCA revealed the presence <strong>of</strong><br />

four factors which together explain a variance <strong>of</strong> 69%. A<br />

clear structure emerged after reducing the variables to four<br />

factors. <strong>The</strong> variables are listed in the Table V, in the order<br />

<strong>of</strong> size <strong>of</strong> their factor loadings.<br />

Both univariate and multivariate Logistic Regression were<br />

used. <strong>The</strong> results are summarised in Table VI. For univariate<br />

Logistic Regression, out <strong>of</strong> the four demographic pr<strong>of</strong>iles,<br />

namely gender, age group, household income and highest<br />

education level, only household income (above Rs 10,000)<br />

was found to be significant. Moreover with the multivariate<br />

LR, it was found that in addition to household income, age<br />

group was another significant demographic variable, in<br />

particular those in the age group below 45.<br />

Discussion<br />

Based on the findings, it is observed that users <strong>of</strong> IB attach<br />

high importance to the availability <strong>of</strong> infrastructure and<br />

perceived ease <strong>of</strong> use. <strong>The</strong> results show that users value<br />

‘friendly design’ and ‘availability <strong>of</strong> help when using IB’.<br />

<strong>The</strong>se findings are in accord with Gerrard and Cunningham<br />

(2003) who found that availability <strong>of</strong> an innovation to meet<br />

user’s needs using different feature availability on the<br />

website is <strong>of</strong> paramount importance for success in e-<br />

banking. <strong>The</strong> second best factor in determining usage <strong>of</strong> IB<br />

was found to be perceived usefulness. However, these<br />

findings are in contradiction with Wu and Kuo (2008) who<br />

noted that the respective predicting power <strong>of</strong> Perceived Use<br />

and Perceived Ease <strong>of</strong> Use on intention is considerably<br />

diluted by the addition <strong>of</strong> habitual usage or past usage. A<br />

possible factor explaining the Perceived Use and Perceived<br />

Ease <strong>of</strong> Use as being primary predictors <strong>of</strong> IB usage is that<br />

the IB phenomenon is quite new in Mauritius. Based on<br />

figures in Table I, we note that strong growth in the number<br />

<strong>of</strong> IB customers has been recorded from 2009 onwards thus<br />

confirming that mass usage <strong>of</strong> IB is quite new. Surprisingly,<br />

security issues rank last among the determinants <strong>of</strong> IB usage<br />

in Mauritius. This could be explained by the fact that with<br />

continued and regular usage, people start to trust the system<br />

and security becomes a salient issue.<br />

In contrast, for non-users <strong>of</strong> IB, ‘Trust and Security Issues’<br />

was the most important component extracted among the 5<br />

components as shown in Table V. Even with the advent <strong>of</strong><br />

secured website and secured login, some people were found<br />

not to trust IB. This can be attributed to the fact that there<br />

are many users have been fooled by scams and are reluctant<br />

to use IB. Availability <strong>of</strong> infrastructure and awareness <strong>of</strong><br />

service were the second and third components extracted<br />

respectively. <strong>The</strong>re are still people with no access to Internet<br />

either because they come from a low-income group or they<br />

have Personal Computers but without access to the Internet.<br />

<strong>The</strong> last component extracted is the Perceived Usefulness<br />

and Ease <strong>of</strong> Use. Non-IB users would usually use traditional<br />

banking services available at branches <strong>of</strong> banks or ATMs<br />

which becomes part <strong>of</strong> their routine and thereby ignoring the<br />

perceived ease <strong>of</strong> use and perceived usefulness <strong>of</strong> IB.<br />

In terms <strong>of</strong> pr<strong>of</strong>ile <strong>of</strong> users, we have found that household<br />

income and age groups are the demographic variables that<br />

determine whether or not a person uses IB. People in the<br />

age groups 25 – 35 and 36 – 45 are keener to use IB. <strong>The</strong><br />

results confirm the findings <strong>of</strong> Czaja et al. (2001) who claim<br />

that younger adults were more interested in using new<br />

technologies and older customers generally have a negative<br />

attitude toward technology and innovation. <strong>The</strong> level <strong>of</strong><br />

income significantly influences the use <strong>of</strong> IB. Our results are<br />

in line with the findings <strong>of</strong> Wai-Ching Poon (2008) who<br />

found that upper and middle income groups are affluent<br />

users <strong>of</strong> IB. No significant relationship was found between<br />

gender and IB use. This finding is contrary to that <strong>of</strong> Singh<br />

(2004) who found that males are more prone to use IB than<br />

females. Similarly, education level is not significantly<br />

related to the use <strong>of</strong> IB. <strong>The</strong> use <strong>of</strong> IB requires basic<br />

computer skills which could be a possible explanation for<br />

this result.<br />

Conclusions and Managerial implications<br />

<strong>The</strong> study identifies the motivators to use IB as being<br />

‘Availability <strong>of</strong> infrastructure and perceived ease <strong>of</strong> use’,<br />

‘perceived usefulness’, ‘Awareness <strong>of</strong> the service’ and<br />

‘security issues’, according to the degree <strong>of</strong> importance. <strong>The</strong><br />

pattern is reversed from the point <strong>of</strong> view <strong>of</strong> non –users who<br />

claim that obstacles to IB adoption according to the degree<br />

<strong>of</strong> importance are: ‘Trust and security issues’; ‘Availability<br />

<strong>of</strong> infrastructure’; ‘Awareness’ and ‘Perceived ease <strong>of</strong> use<br />

and perceived usefulness’.<br />

<strong>The</strong> findings <strong>of</strong> this study have several implications for<br />

commercial banks <strong>of</strong>fering IB services and potential IB<br />

providers. Banks should keep an eye on the design <strong>of</strong> their<br />

IB portal to ensure that they are user friendly and that timely<br />

assistance is provided to customers. <strong>The</strong> present conditions<br />

<strong>of</strong> distrust and insecurity among non-IB users needs to be<br />

addressed by educating customers, showing them the<br />

different safety measures taken by the bank to ensure<br />

privacy and confidentiality <strong>of</strong> information. Awareness<br />

campaigns could be run to that effect and at the same time<br />

reminding bank customers <strong>of</strong> the benefits <strong>of</strong> using IB and<br />

services <strong>of</strong>fered. Banks should upgrade their security<br />

system to win the trust <strong>of</strong> non-IB users. More assistance has<br />

to be provided online, to help customers effect their banking<br />

transactions. <strong>The</strong> findings on the demographic variables<br />

linked to the adoption <strong>of</strong> IB are also relevant for banks in<br />

devising strategies to increase their customer base.<br />

References<br />

AJZEN, I. (1991). <strong>The</strong> theory <strong>of</strong> planned behavior.<br />

Organizational Behavior and Human Decision<br />

Processes, 50, 179–211.<br />

AL-HAJRI, S. & TATNALL, A. (2007). Inhibitors and<br />

enablers to internet banking in Oman: A comparison<br />

with banks in Australia. International Review <strong>of</strong><br />

Business <strong>Research</strong> Papers, 3(5), 36-43.<br />

AL-SOMALI, S.A., GHOLAMI, R. & CLEGG, B.<br />

(2007). Internet banking acceptance in the context <strong>of</strong><br />

www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 13


developing countries: An extension <strong>of</strong> the TAM Model.<br />

Operations & Information <strong>Management</strong> Group, Aston<br />

Business School.<br />

BANK OF MAUR<strong>IT</strong>IUS, Monthly bulletin, May 2011.<br />

BRODERICK, A. & VACHIRAPORNPUK, Y. (2002).<br />

Service quality in Internet banking: <strong>The</strong> importance <strong>of</strong><br />

customer role. Marketing Intelligence and Planning, 20,<br />

55-77.<br />

BURKE, R.R. (2002). Technology and the customer<br />

interface: What consumers want in the physical and<br />

virtual store? <strong>Journal</strong> <strong>of</strong> the Academy <strong>of</strong> Marketing<br />

<strong>Science</strong> 30(4), 411-432.<br />

BRUNO, M.A. (2003), B<strong>of</strong>A’s climb to the top <strong>of</strong> the<br />

online world, US Banker 113 (6), 24-25.<br />

CHANG, H. & HAMID, M. (2010). An empirical<br />

investigation <strong>of</strong> Internet Banking in Taiwan. Global<br />

<strong>Journal</strong> <strong>of</strong> Business <strong>Research</strong> 4 (2), 39-48.<br />

CZAJA, S.J., SHAR<strong>IT</strong>, J., OWNBY, R., ROTH, D.L.<br />

& NAIR, S. (2001). Examining age differences in<br />

performance <strong>of</strong> a complex information search and<br />

<br />

retrieval task. Psychology and Aging 16(4), 564-580.<br />

DAVIS, F. (1989). Perceived usefulness, perceived ease<br />

<strong>of</strong> use, and user acceptance <strong>of</strong> information technology.<br />

MIS Quarterly 13, 319–340.<br />

DOLL, W.J., HENDRICKSON, A. & DENG, X.<br />

(1998). Using Davis’s perceived usefulness and ease<strong>of</strong>-use<br />

instruments for decision making: a confirmatory<br />

and multigroup invariance analysis, Decision <strong>Science</strong>s<br />

<strong>Journal</strong> 29(4), 839-69.<br />

<br />

DAVIS, F.D., BAGOZZI, R.P. & WARSHAW, P.R.<br />

(1989). User Acceptance <strong>of</strong> Computer Technology: A<br />

Comparison <strong>of</strong> Two <strong>The</strong>oretical Models. <strong>Management</strong><br />

<strong>Science</strong> 35(8), 982-1003.<br />

EL-NAWAWY, M.A. & ISMAIL, M.M. (1999).<br />

Overcoming deterrents and impediments to electronic<br />

commerce in light <strong>of</strong> Globalization. Proceedings <strong>of</strong> the<br />

9th annual conference <strong>of</strong> the internet society, 22-25<br />

June INET 99, San Jose, USA.<br />

<br />

<br />

<br />

FASSNACHT, M. & KOSE, I. (2007). Consequences <strong>of</strong><br />

web-based service quality: Uncovering a multi-faceted<br />

chain <strong>of</strong> effects. <strong>Journal</strong> <strong>of</strong> Interactive Marketing, 21(3),<br />

35-54.<br />

FISHBEIN, M. & AJZEN, I. (1975). Belief, Attitude,<br />

Intention and Behavior. An Introduction to <strong>The</strong>ory and<br />

<strong>Research</strong>, Addison Wesley, Reading, MA.<br />

GERRARD, P. & CUNNINGHAM, J.B. (2003). <strong>The</strong><br />

diffusion <strong>of</strong> internet banking among Singapore<br />

consumers, International <strong>Journal</strong> <strong>of</strong> Bank Marketing 21<br />

(1), 16-28.<br />

HASAN, I., ZAZZARA, C. & CICIRETTI, R. (2005).<br />

Do internet activities add value? Evidence from the<br />

banking industry, Rensselaer Polytechnic Institute,<br />

unpublished manuscript.<br />

HERNANDEZ, J.M.C. & MAZZON, J.A. (2007).<br />

Adoption <strong>of</strong> internet banking: proposition and<br />

implementation <strong>of</strong> an integrated methodology approach,<br />

International <strong>Journal</strong> <strong>of</strong> Bank Marketing 25(2), 72-88.<br />

<br />

HERNANDO, I. & NIETO, M.J. (2007). Is the internet<br />

delivery channel changing banks’ performance? <strong>The</strong><br />

case <strong>of</strong> Spanish banks, <strong>Journal</strong> <strong>of</strong> Banking and Finance,<br />

31 (4), 1083-99.<br />

HWAY-BOON, O. & YU, C.M. (2003). Success<br />

factors in e-channels: the Malaysian banking scenario,<br />

International <strong>Journal</strong> <strong>of</strong> Bank Marketing 21 (6/7), 369-<br />

77.<br />

JAYAWARDHENA, C. & FOLEY, P. (2000), Changes<br />

in the banking sector – the case <strong>of</strong> internet banking in<br />

the UK, Internet <strong>Research</strong>: Electronic Networking<br />

Applications and Policy, Vol. 10 No. 1, pp. 19-30.<br />

KAISER, H. (1974). An index <strong>of</strong> factorial simplicity.<br />

Psychometrika, 39, 31-36.<br />

KALAKOTA, R. & FREI, F. (1998). Frontiers <strong>of</strong><br />

online financial services, In: M. J. Cronin, ed. Banking<br />

and Finance on the Internet. New York, USA: John<br />

Wiley & Sons, 19-74.<br />

O'CONNELL, B. (1996). Australian banking on the<br />

internet- fact or fiction? <strong>The</strong> Australian Banker,<br />

December, 212-214.<br />

PADACHI, K., ROJID, S. & SEETANAH, B. (2008).<br />

Analysing the factors that influence the adoption <strong>of</strong><br />

internet banking in Mauritius. <strong>Journal</strong> <strong>of</strong> Internet<br />

Business, 5, 116-126.<br />

POLATOGLU, V.N. & EKIN, S. (2001). An empirical<br />

investigation <strong>of</strong> the Turkish consumers’ acceptance <strong>of</strong><br />

internet banking services, International <strong>Journal</strong> <strong>of</strong> Bank<br />

Marketing 19 (4), 156-65.<br />

<br />

ROGERS, E.M. (1962). Diffusion <strong>of</strong> Innovations, <strong>The</strong><br />

Free Press, New York, NY.<br />

ROTCHANAK<strong>IT</strong>UMNUAI, S. & SPENCE, M. (2003).<br />

Barriers to internet banking adoption: a quantitative<br />

study among corporate customers in Thailand,<br />

International <strong>Journal</strong> <strong>of</strong> Bank Marketing 21 (6/7), 312-<br />

23.<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

SALISBURY, W.D., PEARSON, R.A, PEARSON,<br />

A.W. & MILLER, D.W., (2001). Perceived security and<br />

World Wide Web purchase intention. Industrial<br />

<strong>Management</strong> & Data Systems 101, 165-176.<br />

SATHYE, M. (1999). Adoption <strong>of</strong> internet banking by<br />

Australian consumers: An empirical investigation.<br />

International <strong>Journal</strong> <strong>of</strong> Bank Marketing 17(7), 324-<br />

334.<br />

SAYAR, C. & WOLFE, S. (2007). Internet banking<br />

market performance: Turkey versus the UK,<br />

International <strong>Journal</strong> <strong>of</strong> Bank Marketing 25 (3), 122-41.<br />

SINGH, A.M. (2004). Trends in South African internet<br />

banking, Aslib Proceedings, 56 (3), 187-96.<br />

TAYLOR, S. & TODD, P.A. (1995). Assessing <strong>IT</strong><br />

usage: the role <strong>of</strong> prior experiences, MIS Quarterly<br />

19(3), 561-70.<br />

THOMAS, G., KELLERMANN, T., MCNEVIN &<br />

VALERIE. (2002). Electronic Security: Risk Mitigation<br />

in Financial Transactions. Public Policy Issues, <strong>The</strong><br />

World Bank.<br />

VENKATESH, V. & MORRIS, M.G. (2000). Why do<br />

not men ever stop to ask for directions? Gender, social<br />

influence, and their role in technology acceptance and<br />

usage behavior. MIS Quarterly 24(1) 115–139.<br />

YOUSAFZAI, S.Y., FOXALL, G.R. & PALLISTER,<br />

J.G. (2010), Explaining internet banking behavior:<br />

TRA, TPB, or TAM? <strong>Journal</strong> <strong>of</strong> Applied Social<br />

Psychology 40(5), 1172-1202.<br />

www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 14


WAI-CHING POON. (2008). Users' adoption <strong>of</strong> e-<br />

banking services: the Malaysian perspective. <strong>Journal</strong> <strong>of</strong><br />

Business and Industrial Marketing 23(1), 59-69.<br />

<br />

WU, M. & KUO, F. (2008). An Empirical Investigation<br />

<strong>of</strong> Habitual Usage and Past Usage on Technology<br />

Acceptance Evaluations and Continuance Intention,<br />

Database for Advances in Information Systems 39(4),<br />

48-73.<br />

ANNEXURE<br />

Table I: Internet Banking Trend<br />

Year Number <strong>of</strong> customers Number <strong>of</strong> transactions<br />

(monthly)<br />

Value <strong>of</strong> transactions (monthly)<br />

(Rs mn)<br />

Dec 2007 47, 616 164, 038 14, 442<br />

Dec 2008 63, 285 198, 205 28, 806<br />

Dec 2009 108, 414 252, 554 37, 607<br />

Dec 2010 133,508 171,088 4 4,038<br />

(Source: Bank <strong>of</strong> Mauritius (BoM) Monthly Bulletin – June 2011)<br />

Table II: Demographic Pr<strong>of</strong>ile <strong>of</strong> Respondents<br />

Demographic Pr<strong>of</strong>ile Details %<br />

Gender Male 40.3<br />

Female 59.7<br />

Age Group Less than 25 37.6<br />

25 – 35 47.2<br />

36 – 45 10.0<br />

More than 45 5.2<br />

Highest Education Level School Certificate (O Level) 1.7<br />

Higher School Certificate (A Level) 20.3<br />

Diploma / Degree 54.5<br />

Post Graduate 23.4<br />

Monthly Household Income Group < Rs 5,000 16.2<br />

Rs 5,000 – Rs 10,000 8.6<br />

Rs 10,000 – < Rs 25,000 40.0<br />

Rs 25,000 – < Rs 50,000 24.5<br />

Rs 50,000 and above 10.7<br />

Internet Access Home 92.4<br />

Workplace 86.4<br />

Use <strong>of</strong> IB 53.8<br />

Frequency <strong>of</strong> Usage <strong>of</strong> IB Daily 6.4<br />

2 – 3 times a week 14.0<br />

Once a week 24.8<br />

2 – 3 times a month 14.0<br />

Once a month 21.0<br />

Rarely 19.7<br />

www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 15


Table III: Uses <strong>of</strong> IB<br />

1 2 3 4<br />

USES OF IB Never Rarely Sometimes Regularly Mean SD<br />

Viewing Account Details 3.2 5.1 19.2 72.4 3.61 .732<br />

Inter Account Funds Transfer 28.8 14.7 28.2 28.2 2.56 1.182<br />

Making Online Payments 33.0 20.8 27.4 18.9 2.32 1.126<br />

Payment to other personal account 34.9 20.8 25.5 18.9 2.28 1.136<br />

Transfer <strong>of</strong> funds to credit card account 45.3 16.0 21.7 17.0 2.10 1.162<br />

Recharging Mobile Phones 53.8 8.5 12.3 25.5 2.09 1.299<br />

Payment to other local bank account 48.1 25.5 19.8 6.6 1.85 .964<br />

Loans, Credit Cards Application 62.8 12.2 11.5 13.5 1.76 1.109<br />

Standing Order Transactions 60.3 18.6 11.5 9.6 1.71 1.011<br />

Downloading Application Forms 59.4 20.8 13.2 6.6 1.67 .943<br />

Request Issue <strong>of</strong> C/A statement 66.0 19.8 10.4 3.8 1.52 .831<br />

Foreign transfer: Draft or Swift 70.8 15.1 13.2 0.9 1.44 .757<br />

Payment by <strong>of</strong>fice cheque 73.6 17.0 6.6 2.8 1.39 .738<br />

Cheque Book Request 76.4 15.1 6.6 1.9 1.34 .689<br />

Apply credit card limit charge 75.5 17.9 3.8 2.8 1.34 .689<br />

Stop lost / stolen cheque 89.6 7.5 1.9 0.9 1.14 .467<br />

Remove 'stop cheque' request 88.7 10.4 0.9 0.0 1.12 .357<br />

www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 16


Table IV : Users <strong>of</strong> IB<br />

IB Users<br />

Availability <strong>of</strong><br />

Infrastructure<br />

and Perceived<br />

Ease <strong>of</strong> Use<br />

Perceived<br />

Usefulness<br />

Awareness <strong>of</strong><br />

the Service<br />

Security Issues<br />

Rotated Component Matrix<br />

Component<br />

1 2 3 4<br />

My bank’s website has a clear, user-friendly design and the bank focuses on .787<br />

interactivity, navigation & security<br />

<strong>The</strong> availability <strong>of</strong> help simplifies navigation on the bank’s website .741<br />

<strong>The</strong> bank provides sufficient training, guides & manuals to support the use .716<br />

on IB<br />

IB usage requires no further knowledge apart from simply being<br />

.699<br />

acquaintained to use the computer<br />

It is easy to learn to use Internet Banking .661<br />

<strong>The</strong> bank is able to help me quickly in technical and non-technical issues .634<br />

related to IB<br />

It is flexible to interact with Internet Banking while utilising online services .609 .424<br />

I prefer internet Banking because online services are available 24 hours a<br />

.796<br />

day<br />

With IB, accounts can be paid and funds transferred without queues and<br />

.760<br />

writing out cheques<br />

IB is useful in conducting transactions .683<br />

Banking services are available more handily with IB .672<br />

Various banking services can be accessed at the same time, via Internet<br />

.652<br />

Banking<br />

I have enough information about how to use Internet Banking .838<br />

I am aware <strong>of</strong> the benefits and risks involved in Internet Banking .787<br />

I have enough information about Internet Banking .776<br />

I am aware about the different services being provided online .765<br />

I trust in the ability <strong>of</strong> the bank to protect my confidentiality .812<br />

I use Internet Banking because the bank is able to provide me with the<br />

.735<br />

necessary security<br />

<strong>The</strong> use <strong>of</strong> digital signatures, encryption & authorisation mechanisms<br />

.725<br />

provide a more secured IB service<br />

www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 17


GRID Computing: Related Issues and Business<br />

Applications<br />

Sanoara Yasmin and Musharuf Hossain Mollah<br />

School <strong>of</strong> Business, University <strong>of</strong> Information Technology and <strong>Science</strong><br />

Chittagong Campus, Bangladesh<br />

Department <strong>of</strong> Marketing<br />

Southeast University, Dhaka, Bangladesh<br />

Abstract<br />

Grid computing is a virtual computing system<br />

developed through the coordination and sharing <strong>of</strong><br />

computing power, application, data, and storage facilities <strong>of</strong><br />

different computers <strong>of</strong> geographically dispersed<br />

organizations. This paper is an effort to highlight the<br />

conceptual aspects, key characteristics, benefits and<br />

business applications <strong>of</strong> Grid computing. It focuses on<br />

different applications <strong>of</strong> Grid computing in Bangladesh<br />

perspective. Relevant peripheral issues <strong>of</strong> Grid computing<br />

like storage, security, integration and transparency <strong>of</strong> data,<br />

etc. are also discussed in the paper. Finally, the paper<br />

focuses on different strategies to implement Grid computing<br />

along with the future scope <strong>of</strong> Grid and a brief account <strong>of</strong> its<br />

limitations.<br />

INTRODUCTION<br />

Grid computing has been positioned as a promising next<br />

generation computing platforms due to the accelerated<br />

development <strong>of</strong> sharing the computation resources from peer<br />

computers as well computers across geographically<br />

dispersed organizations. It is a geographically distributed<br />

environment with autonomous domains that share resources<br />

amongst themselves (Azzedin and Maheswaran 2002).<br />

Foster et al. (1998) defined grid computing as a hardware<br />

and s<strong>of</strong>tware infrastructure that provides dependable,<br />

consistent, pervasive and inexpensive access to high-end<br />

computational capabilities. It coordinates and shares<br />

computing, application, data, storage, or network resources<br />

across dynamic and geographically dispersed organizations.<br />

It is a “virtualized” computing system comprised <strong>of</strong><br />

distributed system components (e.g., processors and storage)<br />

interconnected by a high-speed network. Grid computing<br />

enables creation <strong>of</strong> virtual enterprise for sharing and<br />

aggregation <strong>of</strong> millions <strong>of</strong> resources <strong>of</strong> geographically<br />

dispersed organizations (Buyya et al. 2004). It also suggests<br />

a computing paradigm similar to an electric power grid,<br />

which is a shared pool <strong>of</strong> resources that can be accessed on<br />

an as-needed basis. Thus grid computing has become a<br />

mainstream technology for large scale resources sharing and<br />

distributing system integration (Foster et al. 2002).<br />

EVOLUTION OF GRID COMPUTING<br />

Traditionally, computing typically was performed<br />

within highly integrated host-centric enterprise computing<br />

centers. <strong>The</strong> rise <strong>of</strong> the internet and the emergence <strong>of</strong> e-<br />

business have led to a growing awareness that an<br />

enterprise’s <strong>IT</strong> infrastructure encompasses external<br />

networks, resources, and services (Foster et al. 2002). In the<br />

early 1970s when computers were first linked by networks,<br />

the idea <strong>of</strong> harnessing unused CPU cycles was born. In<br />

1973, the Xerox installed the first Ethernet network and the<br />

first full-fledged distributed computing effort was underway.<br />

Scientists John F. Shoch and Jon A. Hupp created a worm,<br />

as they called it, and envisioned it moving from machine to<br />

machine using idle resources for beneficial purposes.<br />

Distributed computing scaled to a global level with the<br />

maturation <strong>of</strong> the Internet in the 1990s. One <strong>of</strong> the most<br />

famous projects <strong>of</strong> Grid computing in those years was the<br />

‘dnet’. It used thousands <strong>of</strong> independently owned computers<br />

across the Internet to crack encryption codes.<br />

<strong>The</strong> origin <strong>of</strong> the grid concept was established in<br />

the early 90’s when great efforts were made to deploy<br />

several gigabyte testbeds such as CASA that linked super<br />

computer link across the USA (Lyster et al., 1992). <strong>The</strong><br />

successes <strong>of</strong> these tesbeds inspired the I-WAY experiment<br />

in North America in 1995 where a large scale testbed where<br />

multiple supercomputers and advanced visualization devices<br />

at 17 different places were connected through ATM<br />

networks in order to allow high performance applications to<br />

be studied in a controlled environment (Bote-Lorenzo et al.<br />

2004). Grid computing entered the mainstream <strong>of</strong> research<br />

with the establishment <strong>of</strong> Global Grid Forum<br />

(www.gridforum.org) by early grid developers and<br />

practitioners. <strong>The</strong> publication <strong>of</strong> the book tiled “<strong>The</strong> Grid:<br />

Blueprint for a Future Computing Infrastructure” by Foster<br />

et al. (1998) laid the groundwork <strong>of</strong> the field.<br />

TYPES OF GRID<br />

From an application perspective, there are two<br />

types <strong>of</strong> grids: ‘compute grids’ and ‘data grids’ and from<br />

a topology view there are intra-grids (enterprise), extra<br />

grids(utility), clusters and inter-grids(partner).<br />

As the name suggests the ‘compute grid’ is<br />

essentially a collection <strong>of</strong> distributed computing resources,<br />

within or across locations, that are combined together to act<br />

as a unified processing resource or a virtual supercomputer.<br />

<strong>The</strong> main aspect <strong>of</strong> a compute grid is that it eliminates the<br />

binding <strong>of</strong> specific machines to certain computing processes<br />

by allowing the aggregated pool to service sequential and<br />

other attributes that need the power.<br />

Similarly a ‘data grid’ provides wide area, secure<br />

access to current data. <strong>The</strong>se grid enables users and<br />

applications to manage ad efficiently use database<br />

information from distributed locations. Importance <strong>of</strong> data<br />

www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 18


grid is that it eliminates the need to move, replicate or<br />

centralize data and thereby saves costs. <strong>The</strong> above grids rely<br />

on s<strong>of</strong>tware for secure access and usage policies and utilize<br />

the existing resources.<br />

‘Intra grids’ or ‘enterprise grids’ work within<br />

organizations that want to share information for better use <strong>of</strong><br />

resources and tangible business benefits. Examples <strong>of</strong><br />

companies are that have deployed Enterprise Grids include<br />

JP Morgan Chase, General Motors, Monsanto, Toshiba, etc.<br />

‘Extra’ or ‘utility grids’ basically are computing resources<br />

accessible on the internet and delivered by ASPs<br />

(Application Service Providers). This is an expansive grid<br />

spanning different business models, applications, operating<br />

platforms, etc. Example: IBM has successfully implemented<br />

an extra grid with its subsidiaries all across the world using<br />

the Internet. Many companies around the world are in the<br />

implementation process as yet.<br />

CHARACTERISTICS OF GRID COMPUTING<br />

Extant literature (e.g. Foster, 2002; Foster et al., 2001;<br />

Grimshaw, 2002) pointed out different characteristics <strong>of</strong><br />

Grid Computing. Bote-Lorenzo et al. (2004) compiled the<br />

key characteristics and outlined the following characteristics<br />

<strong>of</strong> Grid –<br />

a) A grid must be seen as a single virtual computer.<br />

b) Grid computing must be able to manage large scale<br />

resources from just a few to millions.<br />

c) Grid resources may be located at geographically<br />

distant places.<br />

d) A grid should be able to host heterogeneous<br />

resources such as both hardware and s<strong>of</strong>tware<br />

resources varying from data, files, programs, to<br />

sensors, scientific instruments, display devices,<br />

super-computers, networks, etc.<br />

e) A grid should involve resources <strong>of</strong> many<br />

organizations that allow other user organizations to<br />

access the resources.<br />

f) Each organizations involved with a particular grid<br />

may have different administration in order to<br />

establish and administer different customized<br />

security and administrative policies to access and to<br />

use the resources <strong>of</strong> the grid.<br />

g) Resources in a grid should be coordinated in order<br />

to provide aggregated computing capabilities.<br />

h) A grid should assure the delivery <strong>of</strong> services under<br />

established Quality <strong>of</strong> Service requirements.<br />

i) A grid must be built with standard services,<br />

protocols, and inter-faces and should hide the<br />

heterogeneity <strong>of</strong> the resources while allowing its<br />

scalability.<br />

j) A grid should be accessible to available resources<br />

by adapting to a dynamic environment. <strong>The</strong> grid<br />

must tailor its behavior to extract the maximum<br />

performance from the available resources.<br />

USES AND BENEF<strong>IT</strong>S OF GRID COMPUTING<br />

Many companies want to take advantage <strong>of</strong> the cost<br />

and efficiency benefits that come from a grid infrastructure.<br />

<strong>The</strong> benefits <strong>of</strong> Grid computing can be more extensive.<br />

<strong>The</strong>y include increased speed <strong>of</strong> computing, improved<br />

productivity and collaboration, more flexible and resilient<br />

infrastructure, etc. <strong>The</strong> benefits <strong>of</strong> Grid computing are<br />

discussed below -<br />

Utilization <strong>of</strong> Computing Power<br />

<strong>The</strong> main benefit from the full utilization <strong>of</strong><br />

computing power <strong>of</strong> the PCs. <strong>The</strong> desktop PCs <strong>of</strong> an<br />

organization are <strong>of</strong>ten underutilized. “PCs and Windows<br />

servers are about 5 percent utilized; Unix servers are 15<br />

percent utilized,” said Dan Powers, vice president <strong>of</strong> grid<br />

strategy at IBM. Even IBM mainframes are only utilized<br />

about 65 percent <strong>of</strong> the time. 1 By harnessing these plentiful<br />

underused computing assets and leveraging them for<br />

revenue-driving projects, the Grid MP platform provides<br />

immediate value for companies. Moreover, PCs are not in<br />

use on evenings, weekends, and daytime hours can provide<br />

significant computational resources.<br />

Faster Project Results<br />

Increased processing speed is an enormous benefit<br />

<strong>of</strong> Grid computing. It squeezes more computing speed from<br />

an organization's machines. <strong>The</strong> increased processing power<br />

<strong>of</strong> a grid enables applications run faster and delivers results<br />

more quickly. It has a direct impact on an organization's<br />

ability to win in the marketplace by shortening product<br />

development cycles and accelerating research and<br />

development processes.<br />

Reduced Operational Costs<br />

Grid computing enables to reduce the operational<br />

cost. On a price-to-performance basis, the Grid platform<br />

gets more work done with less administration and budget<br />

than dedicated hardware solutions. Depending on the size <strong>of</strong><br />

the network, the price-for-performance ratio for computing<br />

power can literally improve by an order <strong>of</strong> magnitude 2<br />

Optimized Capital Investment<br />

Reduced hardware capital investment is another<br />

significant and attractive cost saving means yielded by grid<br />

computing. As applications increase in breadth, volume and<br />

complexity, they increasingly require more compute<br />

horsepower. This necessitates that more and more funds be<br />

spent on hardware. However, with resource utilization<br />

across most enterprises, funding the purchase <strong>of</strong> new<br />

hardware is not required. Thus the company may have a<br />

lower TCO (total cost <strong>of</strong> ownership) for its <strong>IT</strong> projects<br />

through effective sharing <strong>of</strong> investments in storage with<br />

other enterprises.<br />

Increased Productivity<br />

Under a Grid infrastructure, productivity jumps due<br />

to increased computational activity. Besides, conservation <strong>of</strong><br />

resources from the underutilized CPUs also contributes to<br />

the productivity the whole system. It is aggregating<br />

computing power and converting it into value to the<br />

1<br />

http://www.networkmagazine.com/shared/article/show<br />

Article.jhtml?articleId=17602029 ).<br />

2 (www.grid.org)<br />

www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 19


usiness, which directs resources to more value-added tasks,<br />

entering new markets, <strong>of</strong>fering new services (both internally<br />

and externally) and directly impacting revenue and pr<strong>of</strong>it<br />

contribution.<br />

Sharing Data and Resources<br />

Grid computing allows widely dispersed<br />

departments and business to create virtual organizations to<br />

share data and resources. As a result, it is <strong>of</strong> immense help<br />

for the successful implementation <strong>of</strong> international projects.<br />

In addition to above mentioned benefits, grid<br />

computing facilitates an infrastructure that bonds and unifies<br />

globally remote and diverse resources to provide<br />

computational support (Bote-Lorenzo et al. 2004). Hence<br />

different types <strong>of</strong> computational support <strong>of</strong>fered by grids<br />

can be used in different purposes in business. Following<br />

discussions outline different computation supports <strong>of</strong>fered<br />

by Grid and their respective uses -<br />

Distributed Supercomputing Support: Grid<br />

computing provides distributed supercomputing support that<br />

combines computational resources in order to reduce the<br />

completion time <strong>of</strong> a job (Krauter et al. 2002). It also helps<br />

to tackle problems that cannot be solved by a single<br />

computer system (Foster 1998).<br />

On-Demand Computing Support: Grid<br />

computing <strong>of</strong>fers on-demand computing support that helps<br />

to retrieve resources that cannot be cost-effectively or<br />

conveniently located locally (Foster 1998). For example<br />

users who intend to perform accurate stock market analysis<br />

and price prediction in their home desktop can be benefitted<br />

from on-deman computing by employing grid connectivity<br />

(Bote-Lorenzo et al. 2004).<br />

Data Intensive Computing Support: It allows<br />

applications to use grids to synthesize new information from<br />

distributed data repositories, digital libraries, and databases<br />

(Foster 1998). <strong>The</strong> creation <strong>of</strong> a new database using data<br />

mining from a number <strong>of</strong> online databases would be an<br />

example <strong>of</strong> data-intensive computing applications (Bote-<br />

Lorenzo et al. 2004).<br />

Multimedia Computing Support: It allows<br />

applications to use grids to deliver contents assuring end-toend<br />

quality service (Krauter et al. 2002). For example, a<br />

video conferencing application is a typical example <strong>of</strong><br />

application requiring multimedia computing support (Bote-<br />

Lorenzo et al. 2004).<br />

APPLICATIONS OF GRID COMPUTING –<br />

BANGLADESH PERSPECTIVE<br />

Though Grid computing started in laboratories<br />

facilitating researchers to collaborate among themselves and<br />

utilize the unused computational power to perform complex<br />

mathematical operations, the concept has real business<br />

applications right now. Grid technologies can be applied in<br />

the following industries -<br />

Universities and Academic Institutions<br />

Universities can utilize the benefits <strong>of</strong> grid for the<br />

greater wellbeing <strong>of</strong> the all universities <strong>of</strong> Bangladesh.<br />

Universities possess plenty <strong>of</strong> computers used both for<br />

academic and administrative purpose, which can be brought<br />

under grid network to utilize their unused resources.<br />

Specially, the after hours idle administrative computer<br />

resources can be used for academic purposes by throughout<br />

the country. In addition, universities can also share their<br />

library resources, which will be beneficial to all the parties<br />

involved in the Grid network. University Grant Commission<br />

(UGC) may wish to conduct a through study and prepare a<br />

central plan in this regard. Similar university grid is<br />

proposed for Canadian universities to utilize their idle<br />

resources for the greater wellbeing (Schick, 2005).<br />

Financial Services<br />

It is a common situation in financial services<br />

industry that subsidiaries, divisions and line <strong>of</strong> business<br />

maintain their own set <strong>of</strong> system and data. Standardizing<br />

them by a common technology and harnessing its<br />

underutilized resources through Grid Computing can result<br />

in huge improvement in operational efficiency. Different<br />

financial service companies such as JP Morgan, Charles<br />

Schwab, etc. already implemented grid computing and<br />

reaped benefit out <strong>of</strong> it (Glasgow 2003).<br />

Pharmaceutical Industry<br />

Most Pharmaceutical companies derive<br />

competitive advantage from faster discovery <strong>of</strong> new drugs.<br />

However such discoveries almost always require molecular<br />

modeling and computational chemistry. <strong>The</strong>se tasks needs<br />

huge amount <strong>of</strong> computing power. Pharmaceutical<br />

companies can harness the power from unused resources in<br />

their organization by adopting grid technology. This can<br />

greatly reduce the cost <strong>of</strong> drug discovery and provide<br />

significant competitive advantage. For example, Novartis<br />

already implemented grid computing and using it for about a<br />

decade by linking together more than 2700 personal<br />

computers (PCs) available in its research and development<br />

and already came up with several interesting molecules as a<br />

result <strong>of</strong> incorporating the great amount <strong>of</strong> computing power<br />

tied into the grid (Glasgow 2003).<br />

Geosciences<br />

Upstream operations are absolutely vital for<br />

petroleum companies and hence analysis <strong>of</strong> large amount <strong>of</strong><br />

geophysical datasets for reservoir modeling is critical. It<br />

requires huge computing power and companies can<br />

significantly reduce seismic imaging turnaround time and<br />

maximize reservoir simulation productivity by<br />

implementing Grid Computing Technology.<br />

Industrial Engineering<br />

Many aerospace companies and automobile<br />

companies use computational fluid dynamics and finite<br />

element analysis to improve the design <strong>of</strong> an automobile<br />

part or build a more sustainable aircraft. Employing grid<br />

computing can result in running simulation and modeling<br />

faster and with more precision. This improvement will result<br />

in better quality products with shorter development time,<br />

significantly boosting the bottom line.<br />

PERIPHERAL ISSUES OF GRID COMPUTING<br />

Peripheral issues <strong>of</strong> Grid computing deals with the<br />

factors related with the implementation <strong>of</strong> Grid computing<br />

in an organization. To build a Grid, the development and<br />

deployment <strong>of</strong> a number <strong>of</strong> services is required. However,<br />

www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 20


the key issues where managers need to focus in this regard<br />

are - Service-Oriented Architecture, Security issues and<br />

Storage 3 .<br />

Service-Oriented Architecture<br />

A service-oriented architecture (SOA) is essentially<br />

a collection <strong>of</strong> services. <strong>The</strong>se services communicate with<br />

each other. <strong>The</strong> communication can involve either simple<br />

data passing or it could involve two or more services<br />

coordinating some activity. It uses web services to connect<br />

the service provider and service consumer. 4 It is designed in<br />

such a way that it can seamlessly connect with existing<br />

platforms and management solutions.<br />

For the successful implementation <strong>of</strong> Grid, the<br />

organizations should have service-oriented architecture as it<br />

enables the grid architecture to work flexibly on real world<br />

heterogeneous operating platforms and manage the entire<br />

infrastructure <strong>of</strong> a dynamic business. Besides, scalability is<br />

also important in an on-demand environment. <strong>The</strong><br />

architecture should be scalable enough to support the needs<br />

<strong>of</strong> the business as it grows, and maximize administrative<br />

productivity in a dynamic environment. A SOA can meet<br />

such need <strong>of</strong> the Grid architecture.<br />

Security<br />

Another most important factor to consider in the<br />

utility computing model is its security issue. Grid computing<br />

calls for servers to be dynamically configured and shared by<br />

different partners. As a result, there should be proper<br />

deployment and maintenance <strong>of</strong> security policies. <strong>The</strong>re<br />

should be an agreed understanding among the partners to<br />

what extent and how much time the resources <strong>of</strong> the grid<br />

will be shared by a specific party. <strong>The</strong>re should be a<br />

centralized security department committed to ensuring that<br />

these security issues are enforced across the organization<br />

and end-users conform to guidelines set forth by the<br />

Security department.<br />

Storage<br />

As grid computing enables the participants to share<br />

data, computational power and other resources,<br />

consequently, there should be a storage system <strong>of</strong> all these<br />

data or other resources. <strong>The</strong> term storage here essentially<br />

means a virtual storage, which acts as one <strong>of</strong> the main<br />

enablers <strong>of</strong> the utility computing model. As the amount <strong>of</strong><br />

data companies need to store has increased, companies have<br />

to buy huge storage devices to keep all those electronic<br />

records and information. <strong>The</strong> two key technologies that are<br />

enabling the virtualization <strong>of</strong> storage for on-demand<br />

computing are Storage Area Networks (SAN) and Network<br />

Attached Storage (NAS). 5 Storage Area Network (SAN) is<br />

3 Don LeClair, Managing On-Demand Computing, CA<br />

White Paper, July 14, 2003,<br />

http://whitepapers.informationweek.com/detail/RES/105904<br />

9277_795.html<br />

4 SOA definition at http://www.servicearchitecture.com/web-services/articles/serviceoriented_architecture_soa_definition.html)<br />

5 Don LeClair, Managing On-Demand Computing, CA<br />

White Paper, July 14, 2003,<br />

a high-speed sub network <strong>of</strong> shared storage devices. A<br />

storage device is a machine that contains nothing but a disk<br />

or disks for storing data. A SAN’s architecture works in a<br />

way that makes all storage devices available to all servers on<br />

a LAN or WAN. As more storage devices are added to a<br />

SAN, they too will be accessible from any server in the<br />

larger network. In this case, the server merely acts as a<br />

pathway between the end user and the stored data. Because<br />

stored data does not reside directly on any <strong>of</strong> a network's<br />

servers, server power is utilized for business applications,<br />

and network capacity is released to the end user. 6 On the<br />

other hand, a Network-Attached Storage (NAS) device is a<br />

server that is dedicated to nothing more than file sharing.<br />

NAS does not provide any <strong>of</strong> the activities that a server in a<br />

server-centric system typically provides, such as e-mail,<br />

authentication or file management. NAS allows more hard<br />

disk storage space to be added to a network that already<br />

utilizes servers without shutting them down for maintenance<br />

and upgrades. With a NAS device, storage is not an integral<br />

part <strong>of</strong> the server. Instead, in this storage-centric design, the<br />

server still handles all <strong>of</strong> the processing <strong>of</strong> data but a NAS<br />

device delivers the data to the user. A NAS device does not<br />

need to be located within the server but can exist anywhere<br />

in a LAN and can be made up <strong>of</strong> multiple networked NAS<br />

devices. 7<br />

Integration and Transparency <strong>of</strong> Data<br />

Another key issue to consider here is the<br />

integration and transparency <strong>of</strong> the data. A strict<br />

enforcement <strong>of</strong> rules for data management needs to be<br />

established across the organization. Because <strong>of</strong> open<br />

standards and a distributed environment, any updates made<br />

by end-users are available in real time across the<br />

organization and business units. But there is no control<br />

mechanism to check for errors or duplications in the<br />

database. As a result the integration <strong>of</strong> the data and its<br />

transparency is a vital issue here. <strong>The</strong> end users need to be<br />

more responsible in this regard.<br />

STRATEGIES FOR IMPLEMENTING GRID<br />

COMPUTING<br />

Grid computing is still in infancy and very few<br />

companies have embraced these technology full heartedly.<br />

However these early adopters have learnt from their<br />

mistakes. This continuous learning will someday evolve into<br />

best practices once the technology is mature. <strong>The</strong>refore, by<br />

analyzing how the early adopters like IBM, GM, JP Morgan<br />

Chase, and others have implemented Grid Computing and<br />

what were their mistakes, some strategies for the successful<br />

implementation <strong>of</strong> Grid Computing are outlined below -<br />

Evaluate Business Needs<br />

Though it might sound cliché, this is the classic<br />

mistakes corporations have been doing over time while<br />

adopting new technology. Grid computing is certainly a<br />

“buzzword” in technology arena today; however companies<br />

http://whitepapers.informationweek.com/detail/RES/105904<br />

9277_795.html<br />

6 http://www.webopedia.com/TERM/S/SAN.html<br />

7 http://www.webopedia.com/TERM/N/networkattached_storage.html<br />

www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 21


have to contemplate whether they are going to get some<br />

business value out <strong>of</strong> it or not. Our reading <strong>of</strong> various<br />

articles gives us an impression that technology is mature<br />

enough to move out <strong>of</strong> research phase and ready to roll into<br />

industry, but suitable only for industries that need enormous<br />

computational power and perform complex mathematical<br />

operations. Grid computing may be a natural fit for<br />

aerospace, financial services and petroleum industries.<br />

Go Slow<br />

Grid computing is still in experimental stage and<br />

people are exploring the technology in various directions. It<br />

will not be prudent to make huge commitment based on<br />

early trends. It has seen observed that <strong>of</strong>ten technologies<br />

change the course and move in different direction, which<br />

was not thought <strong>of</strong> in early stages. Moreover as the concept<br />

and standard <strong>of</strong> Grid Computing is still evolving and such<br />

evolving standard means companies have to constantly<br />

upgrade the technology, the company might not have<br />

enough resources to cope with it. <strong>The</strong>refore, the companies<br />

should follow a go-slow policy to implement Grid<br />

Computing.<br />

Pick a partner not a product<br />

As grid computing is gaining attention from<br />

corporate world, many small firms are coming up with new<br />

products. However quality <strong>of</strong> the products and after sales<br />

services must be evaluated carefully before choosing a<br />

product. We rather suggest that it would be very important<br />

to choose a right partner rather than a product. This<br />

approach can be handy as the technology is still evolving.<br />

Companies must be able to upgrade their existing<br />

technologies in line with evolving standards. A vendor who<br />

is committed to the technology can be <strong>of</strong> real value in this<br />

case.<br />

Check Compatibility<br />

<strong>The</strong> biggest challenge for grid computing is that<br />

many existing applications are not compatible with grid<br />

technology. In other words it means that if application is not<br />

written for multi processing, it requires significant effort to<br />

get those applications on the grid. It is very important that<br />

while doing cost benefit analysis; companies factor in the<br />

cost <strong>of</strong> modifying the applications to make them compatible<br />

with grid technology.<br />

Manage Change<br />

Grid computing is a paradigm shift in the way<br />

people used resources and thus it is certain to bring<br />

enormous changes in people’s work life. This enormous<br />

change has to be managed in order to realize the full<br />

potential <strong>of</strong> the technology. Though resources belong to the<br />

company, departmental view <strong>of</strong> personal ownership is hard<br />

to shake. Thus it requires significant effort from<br />

management to adjust the mindset <strong>of</strong> the company. This is<br />

critical for the enterprise wide success <strong>of</strong> the grid<br />

computing.<br />

FUTURE SCOPE OF GRID<br />

According to an estimate by Grid Technology<br />

Partners, a firm that specializes in grid computing, total<br />

worldwide market for grid computing is expected to touch<br />

$8 billion by end <strong>of</strong> 2008. Gartner research report says grid<br />

computing is one <strong>of</strong> the few emerging technologies that will<br />

transform enterprise computing over the next 10 years. Thus<br />

the question is not whether we will be using grid in future;<br />

the question is how we will be using grid in future.<br />

On Demand Computing<br />

Information Technology (<strong>IT</strong>) as an integral part <strong>of</strong><br />

a business cannot be an exception. On<br />

demand computing is a model in which computing resources<br />

are made available to the users as needed. Because an<br />

enterprise's demand on computing resources can vary<br />

drastically from one time to another, maintaining sufficient<br />

resources to meet peak requirements can be costly. Thus if<br />

company needs exceptionally high computing power for<br />

short period <strong>of</strong> time, it can get it from vendors like IBM and<br />

pay based on the computing power used. <strong>The</strong> same concept<br />

can be applied for applications and network storage. Thus<br />

combination <strong>of</strong> web services, grid computing and open<br />

architecture will help <strong>IT</strong> gain advantage from economies <strong>of</strong><br />

scale. This also means that over a period <strong>of</strong> time companies<br />

may substantially reduce their fixed cost in <strong>IT</strong> and reduce<br />

the total cost <strong>of</strong> ownership. This also means that <strong>IT</strong> staff<br />

becomes more <strong>of</strong> a broker between company and vendors<br />

thus significantly changing their role.<br />

Global Grid<br />

Grid computing holds excellent promise as the next<br />

generation <strong>of</strong> the shift from proprietary to open based<br />

computing architecture. It is the next level <strong>of</strong> eliminating the<br />

complexities <strong>of</strong> dependencies. This is how we envision a<br />

more promising application <strong>of</strong> on-demand technology. <strong>The</strong><br />

computing power on PCs is mostly unutilized and hence<br />

concept <strong>of</strong> applying grid is a possibility. Grid computing can<br />

be <strong>of</strong> great value to students, individual researchers,<br />

entrepreneurs and pr<strong>of</strong>essionals. As a student we come<br />

across situations where we need access to very expensive<br />

s<strong>of</strong>tware but the state is not willing to pay the huge licensing<br />

fees, especially in case <strong>of</strong> public universities. What if you<br />

are an entrepreneur and you need access to a data warehouse<br />

that contains critical information about your target<br />

customers. Imagine a researcher who needs access to a large<br />

amount <strong>of</strong> processing power for a highly specialized<br />

research project. In the current computing environment, it is<br />

not possible for these individuals to reach their goals<br />

without a huge corporate or government sponsorship. Now<br />

imagine if the university can go to a website and purchase<br />

the pricey s<strong>of</strong>tware for 12 students every Wednesday from<br />

5:00 to 6:30 pm. What if the entrepreneur could access the<br />

data warehouse for fifteen minutes and download the<br />

information he/she needs. What is the researcher could tap<br />

into the grid for a couple <strong>of</strong> hour’s everyday to perform his<br />

calculations at 600 GHz. Though this may sound day<br />

dreaming, the apt combination <strong>of</strong> web services, grid<br />

computing and open source architecture can make it happen.<br />

A global grid connecting computing resources all over the<br />

world accessible through internet is the ultimate destination<br />

proponents <strong>of</strong> grid computing should strive for!<br />

www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 22


LIM<strong>IT</strong>ATIONS AND CONCLUSION<br />

Grid computing is a technology with huge<br />

potentials. It could bring a paradigm shift in the way people<br />

share computing resources. However, grid computing is still<br />

is in its infancy and hence standards are not well developed.<br />

As grid resources are not entirely dedicated to the<br />

environment, computational and networking capabilities can<br />

vary significantly over time (Cao et al. 2003). Hence,<br />

predicting application performance may become difficult<br />

and real-time resource information update within a largescale<br />

global grid may become impossible. In addition, as the<br />

process <strong>of</strong> grid work flow encompass multiple<br />

administrative domains or organizations, lack <strong>of</strong> central<br />

ownership and control over the grid may result in<br />

incomplete information processing as well as many other<br />

uncertainties (Cao et al. 2003).<br />

Despite these limiting issues, it is sure that<br />

adopting grid computing will help improving operational<br />

efficiency <strong>of</strong> existing infrastructure and achieve more<br />

collaboration among various organizations. Specially,<br />

computational grid enables creation <strong>of</strong> virtual computing<br />

environment for sharing and aggregation <strong>of</strong> distributed<br />

resources for solving large-scale problems in science,<br />

engineering, and commerce (Buyya et al. 2002). Hence,<br />

application <strong>of</strong> grid computing is limited to businesses where<br />

high computational power is required. If web services and<br />

grid computing could be merged seamlessly, it can be<br />

utilized the productivity <strong>of</strong> masses and world can reap<br />

enormous advantages from it. Consequently, relevant<br />

legislations should be enacted in order to ensure proper<br />

direction and management <strong>of</strong> the resources <strong>of</strong> the virtual<br />

organization developed by the GRID itself. Hence further<br />

research is warranted in this regard.<br />

REFERENCES<br />

1. Azzedin, F. and Maheswaran, M. (2002), “Evolving and<br />

Managing Trust in Grid Computing Systems”, In<br />

Proceedings <strong>of</strong> the 2002 IEEE Canadian Conference on<br />

Electrical Computer Engineering, 0-7802-xxxx-x.<br />

2. Bote-Lorenzo, M. L., Yannis A. Dimitriadis, and<br />

Eduardo G´omez-S´anchez (2004), “Grid<br />

Characteristics and Uses: A Grid Definition”, in Miguel<br />

L., F. Fern´andez Rivera et al. (Eds.): Across Grids<br />

2003, LNCS 2970, pp. 291–298.<br />

3. Buyya, R. et al. (2002), “Economic models for resource<br />

management and scheduling in Grid computing”,<br />

Concurrency and Computation: Practice and<br />

Experiences, 14, 1507-1542.<br />

4. Cao, J., et al. (2003), “GridFlow: Workflow<br />

<strong>Management</strong> for Grid Computing”, In Proceedings <strong>of</strong><br />

the 3 rd IEEE/ACM International Symposium on Cluster<br />

Computing and the Grid (CCGRID’03), 0—7695-1919-<br />

9/03.<br />

5. Foster, I. and Kesselman, C. (1998), “<strong>The</strong> Globus<br />

Project: a Status Report”, In Proceedings <strong>of</strong><br />

IPPS/SPDP’98 Workshop on Heterogeneous<br />

Computing, pp. 4–18.<br />

6. Foster, I., Kesselman, C., Nick, J., and Tuecke, S.<br />

(2002), “Grid Services for Distributed<br />

System Integration”, Computer, 35(6):37–46.<br />

7. Foster, I. (1998), Computational Grids, pp. 15–52, in<br />

[10].<br />

8. Foster, I. (2002), “What Is the Grid? A Three Point<br />

Checklist”, Grid Today, 1(6).<br />

9. Grimshaw, A. (2002), “What is a Grid?”, Grid Today,<br />

1(26).<br />

Krauter, K., Buyya, R., and Maheswaran, M. (2002),<br />

“A taxonomy and survey <strong>of</strong> grid<br />

resource management systems for distributed<br />

computing. Int. J. <strong>of</strong> S<strong>of</strong>tware Practice<br />

and Experience, 32(2):135–164.<br />

10. Glasgow, B. 2003, “Information Technology Insights:<br />

Grid Computing Moves Into the Next Wave,” Chemical<br />

Market Reporter; Dec 22-Dec 29, 2003; 264, 22;<br />

ABI/INFORM Global pg. 17.<br />

11. Lyster, P., Bergman, L., Li, P., Stanfill, D., Crippe, B.,<br />

Blom, R., and Okaya, D. (1992),<br />

“CASA Gigabit Supercomputing Network:<br />

CALCRUST Three-Dimensional Real-<br />

Time Multi-Dataset Rendering”, In Proc.<br />

Supercomputing’92, Minneapolis.<br />

12. Schick, S. (2005), “Canadian grid computing project<br />

finds place in ATLAS”, Computing Canada; Sep 9, 31,<br />

12; ABI/INFORM Global pg. 10.<br />

Web sources:<br />

1. Liberated from Light Reading by Rick Thompson<br />

2. Characterizing Grids: Attributes, definitions and<br />

formalisms by N’emethl & Sunderam, EBSCO.<br />

http://www.networkmagazine.com/shared/article/showArticl<br />

e.jhtml?articleId=17602029 ).<br />

3. (www.grid.org)<br />

4. Don LeClair, Managing On-Demand Computing, CA<br />

White Paper, July 14, 2003,<br />

http://whitepapers.informationweek.com/detail/RES/105904<br />

9277_795.html<br />

5. SOA definition at http://www.servicearchitecture.com/web-services/articles/serviceoriented_architecture_soa_definition.html)<br />

6. Don LeClair, Managing On-Demand Computing, CA<br />

White Paper, July 14, 2003,<br />

7. http://whitepapers.informationweek.com/detail/RES/1059<br />

049277_795.html<br />

8. http://www.webopedia.com/TERM/S/SAN.html<br />

9. http://www.webopedia.com/TERM/N/networkattached_storage.html<br />

***<br />

www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 23


Solar Power Generation Using ZVT interleaved<br />

Boost Converter<br />

S.Shiny Jasmine<br />

Asst.Pr<strong>of</strong>, EEE, SNS College <strong>of</strong> Technology, Coimbatore.<br />

Abstract: <strong>The</strong> paper proposed is based on the<br />

implementation <strong>of</strong> a photo voltaic(PV) power system with<br />

high voltage gain. For a typical solar-tracking electricity<br />

generation system output voltage is relative low. High<br />

voltage gain is necessary to improve the grid connected<br />

function .<strong>The</strong> proposed PV system employs ZVT Boost<br />

converter with winding coupled inductor which can boost a<br />

low voltage <strong>of</strong> PV array to a high Dc bus voltage . A full<br />

bridge inverter with bidirectional power flow which can<br />

stabilize the dc bus voltage and shape the output current .A<br />

simple MPPT method based on power balance is applied to<br />

reduce the system complexity and cost. A prototype has<br />

been build and tested to verify the theoretical analysis <strong>of</strong> the<br />

paper.<br />

Keyword: PIC µc, ZVT Boost converter,<br />

photocell, Maximum power point<br />

tracking(MPPT)Photo voltaic(PV)system.<br />

I.INTRODUCTION<br />

<strong>The</strong> source <strong>of</strong> conventional energy are limited and<br />

every nation is planning to make an alternative arrangement<br />

to come out <strong>of</strong> the deficiencies <strong>of</strong> energy generating through<br />

depleting conventional sources <strong>of</strong> energy .So emphasis is<br />

given to the renewable energy programmes to keep the<br />

generating capacity upgraded.<br />

Solar energy is the energy that is present in<br />

sunlight. It has been used for thousands <strong>of</strong> years in many<br />

different ways by people all over the world. As well as its<br />

traditional human uses are heating, cooking, and drying, it is<br />

used today to generate electricity where other power<br />

supplies are absent, such as in remote places and in space. It<br />

is becoming cheaper to generate electricity from solar<br />

energy and in many ways it is competitive with other<br />

sources <strong>of</strong> energy like coal or oil.<br />

A solar tracker is a device for orienting a day lighting<br />

reflector, solar photovoltaic panel or concentrating solar<br />

reflector or lens toward the sun. <strong>The</strong> sun's position in the sky<br />

changes with the season and time <strong>of</strong> day as the sun moves<br />

across the sky. Solar powered equipment works best when<br />

pointed at or near the sun, so a solar tracker can increase the<br />

effectiveness <strong>of</strong> such equipment over any fixed position, at<br />

the cost <strong>of</strong> additional system complexity.<br />

In remote areas the sun is a cheap source <strong>of</strong> electricity<br />

because instead <strong>of</strong> hydraulic generators solar cells can be<br />

used to generate electricity. While the output <strong>of</strong> solar cells<br />

depends on the intensity <strong>of</strong> sunlight .<br />

PV cell is achieved rapidly by development <strong>of</strong><br />

semiconductor. Also, price <strong>of</strong> solar cell is descending<br />

continuously. <strong>The</strong>refore, photovoltaic system is a very<br />

important alternative energy and increasing constantly.<br />

<strong>The</strong>re are three methods for increasing the efficiency <strong>of</strong><br />

photovoltaic system.<br />

Increasing efficiency <strong>of</strong> PV cell, it becomes more cost.<br />

Efficiency <strong>of</strong> converter.<br />

Tracking the solar path to increase the use <strong>of</strong> solar<br />

energy.<br />

Increasing the efficiency <strong>of</strong> the converter is proposed in<br />

this paper. Efficiency <strong>of</strong> the converter is achieved by using<br />

a ZVT interleaved boost converter with winding coupled<br />

inductor.<br />

II.STEADY STATE MODEL OF<br />

ZVT-INTERLEAVED BOOST CONVERTER<br />

Fig1.Shows the ZVT interleaved boost converter with<br />

winding coupled inductor. <strong>The</strong> winding coupled inductor<br />

Offer the voltage gain extension [1]-[4]<strong>The</strong> active clamp<br />

circuits gives the ZVT commutation for the main switches<br />

and the auxiliary switches.S 1 and S 2 are the main switchers<br />

S c1 and S c2 are the active clamp switches. D 1 and D 2 are the<br />

output diodes. <strong>The</strong> coupling method <strong>of</strong> the winding inductor<br />

is marked by open circle and asterisks .<strong>The</strong> equivalent<br />

circuit model is shown in fig2 where L 1 and L 2 are the<br />

magnetizing inductor.L k1 and L k2 are the leakage inductance.<br />

C 1 and C 2 are the clamped capacitors. N is the turns ratio<br />

n 2/ n 1.<br />

Fig. 1 ZVT interleaved boost converter<br />

Fig. 2 Equivalent circuit <strong>of</strong> ZVT interleaved boost converter<br />

www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 24


Fig.3 Proposed PV power system<br />

ZVT converter has three following advantages.<br />

(i) Voltage gain is increased by using proper turn ratio .As<br />

the turn ratio increases, the voltage gain increases without<br />

the extreme duty ratio,which can reduce the input and output<br />

current ripples. <strong>The</strong> voltage gain is given by<br />

M=V out /V in =N+1/1-D (1)<br />

(ii)Voltage stress <strong>of</strong> the main switches is reduced,as the turn<br />

ratio increases. <strong>The</strong>refore low voltage and high performance<br />

device can be used to reduce the switching and conduction<br />

losses .And the voltage spikes are clamped effectively and<br />

the leakage energy is recovered .<strong>The</strong> voltage stress <strong>of</strong> the<br />

main switches are given by<br />

V ds =V out /N+1 (2)<br />

(iii)ZVT s<strong>of</strong>t switching is achieved for both main switches<br />

and auxiliary switches during the whole switching transition<br />

which means the switching losses are reduce greatly. <strong>The</strong><br />

diode reverse - recovery losses are reduced greatly because<br />

the di/dt <strong>of</strong> the diode current is controlled by the leakage<br />

inductor <strong>of</strong> a coupled boost inductor.<br />

To simplify the calculation, the following conditions are<br />

considered.<br />

(i)<strong>The</strong> clamp capacitance is large enough so the voltage<br />

ripple on the main switches can be ignored and the voltage<br />

V ds is taken as a constant when they turn <strong>of</strong>f.<br />

(ii)<strong>The</strong> magnetizing inductance is much larger than the<br />

leakage inductance so that the magnetizing current I m, the<br />

dead time <strong>of</strong> the main switches and the corresponding<br />

auxiliary switches are ignored.<br />

(iv)<strong>The</strong> two interleaved and inter coupled boost converter<br />

cells are provided with a strict symmetry. Based on the<br />

previous assumptions,the wave forms <strong>of</strong> the converter are<br />

shown in Fig.4<br />

Fig.4 Wave form <strong>of</strong> the converter<br />

From the graph the following approximation are given<br />

∆ If ≈ ∆ Ir ≈∆ I (3)<br />

V Lk1 ≈ V LK2 ≈V LK (4)<br />

<strong>The</strong> equation <strong>of</strong> the output voltage is always true by the<br />

Kirchh<strong>of</strong>f voltage law<br />

V OUT = V ds1 + V o n2 + V * n2 (5)<br />

Where V o n2 and V * n2 respectively, represents the voltage <strong>of</strong><br />

the second winding L 12 the voltage <strong>of</strong> the third winding L 23<br />

Stage(i) Main switch S 1 is <strong>of</strong>f and S 2 is on<br />

Based on the voltage second balance to the magnetizing<br />

inductor , the switching voltage <strong>of</strong> S 1 is given by<br />

V ds1 =V in /1-D (6)<br />

From the wave form we can found that<br />

V LK = V LK1 = L k1 x ∆ If /∆ t1<br />

= L k1 x ∆I/(1D)/F c (7)<br />

As shown in fig. 2 the voltage on the winding coupled<br />

inductors are decided by<br />

V o n1=V L1 =V ds1 -V LK1 (8) V o n2=N xV in<br />

(9) V * n2=Nx(V in -V LK2 ) (10)<br />

Where V n1 represents the voltage <strong>of</strong> the first winding L 11<br />

<strong>The</strong>refore , substituting (6),(9) and (10) in to (5) the<br />

equation <strong>of</strong> the output voltage in stage (i) is obtain as<br />

V out = (N-1) x V ds1 - 2 x N x V LK<br />

=(N+1/1-D)xV in -2xNxL k1 x∆I (11)<br />

www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 25


(1-D)/f s<br />

Stage(ii)Main switches S 1 is on and S 2 is on<br />

From the waveform in fig4, it can be found that<br />

64 bytes <strong>of</strong> data EEPROM memory<br />

<strong>The</strong> internal hardware architecture <strong>of</strong> PIC16F84A is<br />

represented by the block diagram shown in the below<br />

figure 5<br />

V ds1 = 0 (12)<br />

V LK = V LK1 = L K1 x ∆ Ir /∆ t2<br />

= L k1 x ∆I/∆ t2 (13)<br />

Considering the polarity <strong>of</strong> the voltage on the winding<br />

coupled inductor in stage (ii), the voltage expression for the<br />

winding coupled inductor can be obtained by<br />

V o n1=V L1<br />

=V LK1 -V in<br />

V o n2=nxV o n1<br />

(14)<br />

(15)<br />

V * n2=Nx(V LK2 +V in ) (16)<br />

<strong>The</strong>refore substituting (12), (15) and (16) in to (5) we can<br />

obtain the output voltage <strong>of</strong> stage b<br />

V OUT = 2x N x V LK<br />

=2 x L K1 x ∆I/∆ t2 (17)<br />

<strong>The</strong> charge through the two output diodes in one switching<br />

period can be decided by<br />

Q 1 =2 QD1 =(∆ t1 +∆ t2 )x∆I/N (18)<br />

Change through the load in one switching period is<br />

Q 2 =( V out /R )x (1/f s ) (19)<br />

<strong>The</strong>refore the charge conservation equation can be found<br />

that<br />

(∆ t1 + ∆ t2 ) x ∆I/N<br />

=( V ou t /R) x( 1/f s ) (20)<br />

<strong>The</strong>refore , the (11),(17) and (20) can be solved to obtain<br />

the expression for the steady state model <strong>of</strong> the converter.<br />

M =V out /V in<br />

All the blocks <strong>of</strong> figure. 5 are main bits <strong>of</strong><br />

hardware and the lines that connect them are called<br />

buses. <strong>The</strong>se buses are basically small parallel lines<br />

along which data can be passed simultaneously from<br />

one hardware block to the other. <strong>The</strong> number besides each<br />

bus indicates the number <strong>of</strong> lines present within that bus,<br />

denoting the bits that can be sent along these buses.<br />

IV. FULL- BRIDGE INVERTER.<br />

<strong>The</strong> full bridge inverter shown in fig.6 is a<br />

voltage source inverter. It has the capability to force the<br />

instantaneous load current to accurately follow the<br />

sinusoidal reference ,which synchronizes with the utility<br />

grid voltage. And the high power factor the low THD and<br />

the fast dynamic response are achieved. <strong>The</strong> bidirectional<br />

power flow facilitates the compensation <strong>of</strong> the Dc bus and<br />

the Ac side voltage variation.<br />

=(N+1)√ [(1-D)R] 2 +8N 2 f s L k1 R - (1-D)R<br />

4N 2 x f s x L k<br />

Where Lk is the equivalent leakage inductance <strong>of</strong> the<br />

winding coupled inductor ,and<br />

Lk = Lk1=Lk2, and R is the equivalent load <strong>of</strong> the<br />

converter.<br />

III. PIC16F84A ARCH<strong>IT</strong>ECTURE<br />

<strong>The</strong>re are three types <strong>of</strong> PIC16F84A packaging designs<br />

available in the market PDIP (18-Lead Plastic Dual Inline),<br />

SOIP (18-Lead Plastic Small Outline), SSOP (20-<br />

Lead Plastic Shrink Small Outline). PDIP type packaging<br />

will be used for the solar tracker embedded design.<br />

Figure 3 illustrates the PIC16F84A PDIP [11] and shows<br />

the name and pin positions [7,12]. <strong>The</strong> PDIP has three key<br />

features that satisfy the objective. <strong>The</strong>se are [13,14]<br />

8-bit multi channel analog to digital Converter<br />

13 input/output pin<br />

Full bridge inverter<br />

Fig.6<br />

<strong>The</strong> inverter can deliver and accept both real and reactive<br />

power .<strong>The</strong> inverter has two legs .Each leg consist <strong>of</strong> two<br />

power control devices .<strong>The</strong> load is connected between the<br />

mid point <strong>of</strong> the two phase legs. Each power control devices<br />

has a diode connected in anti parallel to it .This diodes<br />

provides an alternate path for load current if the power<br />

switches are turn <strong>of</strong>f. For example if the lower IGBT in the<br />

left leg is conducting and carrying current towards the<br />

www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 26


negative DC bus ,this current would commutate into the<br />

diode across the upper IGBT <strong>of</strong> the left leg ,if the lower<br />

IGBT is turned <strong>of</strong>f .Control <strong>of</strong> circuit is accomplished by<br />

varying the turn on time <strong>of</strong> the upper and lower IGBT <strong>of</strong><br />

each inverter leg ,with the provision <strong>of</strong> never turning on<br />

both at the same time ,to avoid a short circuit <strong>of</strong> the DC bus<br />

.In fact the modern drives does not allow this to happen<br />

even if the controller would erroneously command both<br />

controller devices to be turned on .<strong>The</strong> controller will<br />

therefore alternate the turn<br />

on command for the upper and lower switch .ie turn the<br />

upper switch on and the lower switch <strong>of</strong>f and vice versa<br />

.<strong>The</strong> drive circuit should add some additional blanking time<br />

(typically 500-1000ns) during the switch transitions to avoid<br />

any over lap in the condition intervals.<br />

<strong>The</strong> controller will control the duty cycle <strong>of</strong><br />

the conduction phase <strong>of</strong> the switches .<strong>The</strong> average potential<br />

<strong>of</strong> the centre point <strong>of</strong> each leg will be given by the DC bus<br />

voltage multiplied by the duty cycle <strong>of</strong> the upper switches ,if<br />

the negative side <strong>of</strong> the DC bus is used as a reference. If<br />

this duty cycle is modulated with a sinusoidal signal with a<br />

frequency much smaller than the switching frequency the<br />

short term average <strong>of</strong> the centre point potential will follow<br />

the modulation signal<br />

For a single phase inverter<br />

the modulation <strong>of</strong> the two legs are inverse <strong>of</strong> each other<br />

such that if the left leg has a large duty cycle for the upper<br />

switch , the right leg has a small one .<strong>The</strong> frequency ,wave<br />

shape and the amplitude <strong>of</strong> the inverter out put voltage can<br />

be controlled as long as the switching frequency is at least<br />

25 to 100 times higher than the fundamental output<br />

frequency <strong>of</strong> the inverter .<strong>The</strong> actual generation <strong>of</strong> PWM<br />

signals is done using microcontroller Fig 8 shows the<br />

control block diagram <strong>of</strong> photovoltaic power system .<br />

Solar panel<br />

Fig.8<br />

However, solar-thermal panels are still in<br />

production, and are common in portions <strong>of</strong> the world where<br />

energy costs, and solar energy availability, are high.<br />

Recently there has been a surge toward large scale<br />

production <strong>of</strong> PV modules. <strong>The</strong> largest solar panel in the<br />

world is under construction in the south <strong>of</strong> Portugal. A<br />

52,000 photovoltaic module, 11-megawatt facility covering<br />

a 60- hectare<br />

VI. MAXIMUM POWER POINT TRACKER (MPPT)<br />

MPPT solutions are developed to ensure the<br />

optimum utilization <strong>of</strong> PV module[8],[11].<strong>The</strong><br />

implementation generally involves sensing the output<br />

current and voltage <strong>of</strong> PV modules. Such realizations are are<br />

costly and complex.<br />

This paper presents a simple maximum power point<br />

tracker (or MPPT) that presents an optimal electrical load to<br />

a solar panel or array and produces a voltage suitable for the<br />

load.PV cells have a single operating point where the values<br />

<strong>of</strong> the current (I) and Voltage (V) <strong>of</strong> the cell result in a<br />

maximum power output. <strong>The</strong>se values correspond to a<br />

particular resistance, which is equal to V/I as specified by<br />

Ohm's Law. A PV cell has an exponential relationship<br />

between current and voltage, and the maximum power point<br />

(MPP) will occurs .where the resistance is equal to the<br />

negative <strong>of</strong> the differential resistance (V/I = -dV/dI).<br />

Maximum power point trackers utilize some type <strong>of</strong> control<br />

circuit or logic to search for this point and thus to allow the<br />

converter circuit to extract the maximum power available<br />

from a cell. MPPT increases the total power harvested by<br />

50%<br />

VII . EXPERIMENTAL RESULTS<br />

Simulation result.<br />

Fig.7 Control block diagram <strong>of</strong> PV power system<br />

V. SOLAR PANEL<br />

Fig.9 shows the experimental results <strong>of</strong> the ZVT interleaved<br />

boost converter when the input voltage is 38-50V and the<br />

out put voltage is 380v<br />

Solar panel is refer to a photovoltaic module which is<br />

an assembly <strong>of</strong> solar cells used to generate electricity. In all<br />

cases, the panels are typically flat, and are available in<br />

various heights and widths An array is an assembly <strong>of</strong> solarthermal<br />

panels or photovoltaic (PV) modules; the panels can<br />

be connected either in parallel or series depending upon the<br />

design objective. Solar panels typically find use in<br />

residential, commercial, institutional, and light industrial<br />

applications.<br />

www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 27


[4] K. C. Tseng and T. J. Liang, “Novel high-efficiency<br />

step-up converter,”<br />

IEE Electr. Power Appl., vol. 151, no. 2, pp. 182–190, Mar.<br />

2004.6<br />

[5] F. C. Lee, S. Wang, P. Kong, C. Wang, and D. Fu,<br />

“Power architecture<br />

Fig 9 Simulation result <strong>of</strong> the proposed system<br />

Hard ware designed<br />

design with improved system efficiency, EMI and power<br />

density,” in Proc.<br />

IEEE PESC Conf., 2008, pp. 4131–4137.<br />

[6] A. Bellini, S. Bifaretti, and V. Iacovone, “Resonant<br />

DC–DC converters<br />

for photovoltaic energy generation systems,” in Proc. IEEE<br />

SPEEDAM<br />

Conf., 2008, pp. 815–820.<br />

[7]. Microcomputer Control <strong>of</strong> a Residential Photovoltaic<br />

Power Condictioning System”<br />

B.K. Bose, P.M. Szczesny and R.L. Steigerwald, IEEE<br />

Trans. on Industry Applications, vol. IA-21, no. 5,Sep.<br />

1985, ppll82-1191.<br />

[8]. .D. P. Hohm, M. E. Ropp,“Comparative Study <strong>of</strong><br />

Maximum Power Point Tracking Algorithms Using an<br />

Experimental, Programmable, Maximum Power Point<br />

Tracking Test Bed”,IEEE,2000.pp.1699-1702.<br />

Fig12.Photograph <strong>of</strong> prototype<br />

VIII .CONCLUSION<br />

<strong>The</strong> paper proposed a photovoltaic power system<br />

with high voltage gain .<strong>The</strong> proposed PV system employs a<br />

high step up ZVT- interleaved boost converter with winding<br />

coupled inductors .A full bridge inverter with bidirectional<br />

power flow is used to stabilize the DC bus voltage and shape<br />

the output current .Further more a simple MPPT solution is<br />

applied in the PV system and a good performance is<br />

obtained.<br />

REFERENCES<br />

[1]W. Li and X. He, “ZVT interleaved boost converters for<br />

high-efficiency,<br />

high step-up DC/DC conversion,” IET Electr. Power Appl.,<br />

vol. 1, no. 2,<br />

pp. 284–290, Mar. 2007.<br />

[2]Q. Zhao and F. C. Lee, “High-efficiency, high stepupDC–DC<br />

converters,”<br />

IEEE Trans. Power Electron., vol. 18, no. 1, pp. 65–73, Jan.<br />

2003.<br />

[3] R. J.Wai and R. Y. Duan, “High step-up converter with<br />

coupled-inductor,”<br />

IEEE Trans. Power Electron., vol. 20, no. 5, pp. 1025–1035,<br />

Sep. 2005.<br />

[9]. SteveHeckeroth. Solar is the Solution,<br />

2008.http://www.motherearthnews.com/Renewable-<br />

Energy/2007-12-01/Solar-is-the-Solution.aspx (accessed<br />

Dec 20, 2008).<br />

[10]. J. Rizk, and Y. Chaiko. (2008). Solar Tracking System:<br />

More Efficient Use <strong>of</strong> Solar Panels. Proceedings <strong>of</strong><br />

World Academy <strong>of</strong> <strong>Science</strong>, Engineering and Technology,<br />

2-3<br />

[11]. Gay, CF and Wilson, JH and Yerkes, JW.<br />

"Performance advantages <strong>of</strong> two-axis tracking for large flatplate<br />

photovoltaic energy systems." 1982, Conf. Rec. IEEE<br />

Photovoltaic Spec.<br />

[12]. Iovine, John. (2000). PIC Microcontroller Project<br />

Book, 1st edition. Ch. 3, pg 35. McGraw-Hill.<br />

[13]. Ibrahim, Dogan. (2006).PIC Basic Projects: 30<br />

Projects Using PIC BASIC and PIC BASIC PRO, Ch. 2, pg<br />

14-16. Elsevier<br />

[14] Inoue, Seiichi. Hardware <strong>of</strong> the PIC16F84A,<br />

2008.http://www.interq.or.jp/japan/seinoue/e_pic2.htm<br />

accessed Jan 12, 2009.<br />

[15]. Microchip Technology Incorporated (2001).<br />

PIC16F84A, 18-pin Enhanced FLASH/EEPROM 8-Bit<br />

Microcontroller, PIC16F84A Data Sheet<br />

[16]. Inoue, Seiichi. Hardware <strong>of</strong> the PIC16F84A, 2008.<br />

http://www.interq.or.jp/japan/se-inoue/e_pic2.htm<br />

(accessed Feb 2, 2009<br />

[17]. Mohan, N (1995). Electronics Converters,<br />

Applications and Design, 2 nd Edition, John Wiley.<br />

www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 28


Vendor Relationship <strong>Management</strong> strategy<br />

development Process for Automobile Industry to<br />

reduce the cost <strong>of</strong> quality<br />

S.N.Teli<br />

Associate Pr<strong>of</strong>essor & HOD -Mech. Engg. Dept., SCOE, Kharghar, NaviMumbai<br />

Dr.V.S.Majali<br />

Pr<strong>of</strong>essor & HOD – Mech. Engg.Dept. , G<strong>IT</strong>, Belgaum<br />

Dr.U.M.Bhushi<br />

Principal - Sahyadri College <strong>of</strong> Mangalore Engineering & <strong>Management</strong>, Mangalore<br />

Kalyan Kumar Hatti<br />

AGM (PD) - Ashok Leyland, Chennai<br />

Abstract:<br />

Vendors play a key role in the success <strong>of</strong> your business<br />

irrespective <strong>of</strong> the sphere <strong>of</strong> business. <strong>The</strong> following vendor<br />

management practices build a mutually strong relationship<br />

with your vendor which in turn strengthens your company's<br />

overall performance in the marketplace. Ignoring these<br />

sound vendor management principles will result in a<br />

dysfunctional relationship that will have the potential to<br />

negatively impact your business. <strong>The</strong> time, money and<br />

energy used to nurture a positive vendor relationship cannot<br />

be measured directly against the company's bottom line.<br />

However, a well managed vendor relationship will result in<br />

increased customer satisfaction, reduced costs, better<br />

quality, and better service from the vendor. When and if<br />

problems arise, rest assured that a well managed vendor<br />

will be quick to remedy the situation. Successful vendorvendee<br />

relationship is viewed as an important ingredient for<br />

maintaining competitiveness in the current marketplace.<br />

This calls for a careful and comprehensive approach in<br />

selecting vendors.<br />

Keywords—Vendor Relationship <strong>Management</strong>, Customer<br />

Satisfaction, cost <strong>of</strong> quality<br />

I Introduction<br />

1. <strong>The</strong> Successful Vendor Selection Process<br />

<strong>The</strong> vendor selection process can be a very complicated and<br />

emotionally undertaking if you don't know how to approach<br />

it from the very start. Here are five steps to help you select<br />

the right vendor for your business. This guide will show you<br />

how to analyze your business requirements, search for<br />

prospective vendors, lead the team in selecting the winning<br />

vendor and provide you with insight on contract<br />

negotiations and avoiding negotiation mistakes.<br />

1.1Analyze the Business Requirements: Before you begin<br />

to gather data or perform interviews, assemble a team <strong>of</strong><br />

people who have a vested interest in this particular vendor<br />

selection process. <strong>The</strong> first task that the vendor selection<br />

team needs accomplish is to define, in writing, the product,<br />

material or service that you are searching for a vendor. Next<br />

define the technical and business requirements. Also, define<br />

the vendor requirements.<br />

Finally, publish your document to the areas relevant to this<br />

vendor selection process and seek their input. Have the team<br />

analyze the comments and create a final document. In<br />

summary:<br />

Assemble an Evaluation Team<br />

Define the Product, Material or Service<br />

Define the Technical and Business Requirements<br />

Define the Vendor Requirements<br />

Publish a Requirements Document for Approval<br />

1.2 Vendor Search :Now that you have agreement on the<br />

business and vendor requirements, the team now must start<br />

to search for possible vendors that will be able to deliver the<br />

material, product or service. <strong>The</strong> larger the scope <strong>of</strong> the<br />

vendor selection process the more vendors you should put<br />

on the table. Of course, not all vendors will meet your<br />

minimum requirements and the team will have to decide<br />

which vendors you will seek more information from. Next<br />

write a Request for Information (RFI) and send it to the<br />

selected vendors. Finally, evaluate their responses and select<br />

a small number <strong>of</strong> vendors that will make the "Short List"<br />

and move on to the next round. In summary:<br />

Compile a List <strong>of</strong> Possible Vendors<br />

Select Vendors to Request More Information From<br />

<br />

<br />

Write a Request for Information (RFI)<br />

Evaluate Responses and Create a "Short List" <strong>of</strong><br />

Vendors<br />

1.3 Request for Proposal (RFP) and Request for<br />

Quotation (RFQ): <strong>The</strong> business requirements are<br />

defined and you have a short list <strong>of</strong> vendors that you want to<br />

evaluate. It is now time to write a Request for Proposal or<br />

Request for Quotation. Whichever format you decide, your<br />

RFP or RFQ should contain the following sections:<br />

Submission Details<br />

Introduction and Executive Summary<br />

Business Overview & Background<br />

Detailed Specifications<br />

Assumptions & Constraints<br />

Terms and Conditions<br />

Selection Criteria<br />

1.4 Proposal Evaluation and Vendor Selection: <strong>The</strong> main<br />

objective <strong>of</strong> this phase is to minimize human emotion and<br />

political positioning in order to arrive at a decision that is in<br />

www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 29


the best interest <strong>of</strong> the company. Be thorough in your<br />

investigation, seek input from all stakeholders and use the<br />

following methodology to lead the team to a unified vendor<br />

selection decision:<br />

Preliminary Review <strong>of</strong> All Vendor Proposals<br />

Record Business Requirements and Vendor<br />

Requirements<br />

Assign Importance Value for Each Requirement<br />

Assign a Performance Value for Each Requirement<br />

Calculate a Total Performance Score<br />

Select a the Winning Vendor<br />

1.5 Contract Negotiation Strategies: <strong>The</strong> final stage in the<br />

vendor selection process is developing a contract negotiation<br />

strategy. Remember, you want to "partner" with your vendor<br />

and not "take them to the cleaners." Review your objectives<br />

for your contract negotiation and plan for the negotiations<br />

are covering the following items:<br />

List Rank Your Priorities Along With Alternatives<br />

Know the Difference Between What You Need and<br />

What You Want<br />

Know Your Bottom Line So You Know When to Walk<br />

Away<br />

Define Any Time Constraints and Benchmarks<br />

Assess Potential Liabilities and Risks<br />

Confidentiality, non-compete, dispute resolution,<br />

changes in requirements<br />

Do the Same for Your Vendor (i.e. Walk a Mile in<br />

<strong>The</strong>ir Shoes)<br />

1.6 Contract Negotiation Mistakes: <strong>The</strong> smallest mistake<br />

can kill an otherwise productive contract negotiation<br />

process. Avoid the following ten contract negotiation<br />

mistakes to protect jeopardizing an otherwise productive<br />

contract negotiation process.<br />

2. Ten Mistakes to Avoid In <strong>The</strong> Contract Negotiation<br />

Process<br />

<strong>The</strong>se contract negotiation mistakes should be avoided so<br />

that you and your vendor will come to an agreement that<br />

will benefit both parties.<br />

2.1 Thinking the Yard is fenced In: Don't assume that<br />

only a certain subset <strong>of</strong> resources or conditions can be<br />

negotiated. <strong>The</strong> sky is the limit and finding creative and<br />

original alternatives that can benefit both parties will result<br />

in a better negotiated contract. Do not propose ridiculous or<br />

insulting alternatives that will destroy your sincerity and<br />

integrity.<br />

2.2 Failure to Study Your Opponent: Too many people<br />

approach contract negotiation process with an egotistic<br />

mentality. <strong>The</strong>y fail to research the vendor that they will be<br />

negotiating with. <strong>The</strong>y don’t understand the vendor's market<br />

and what other influences control their environment. <strong>The</strong><br />

larger the contract, the more time you should spend on this.<br />

2.3 Too Aggressive: You need to be certain that your<br />

company's interests are at the forefront <strong>of</strong> your priorities but<br />

at the same time you need to be mindful and sensitive<br />

regarding the person representing the vendor. Aggressive<br />

discussions will only succeed in raising the vendor’s<br />

defensive mechanisms and negotiations will turn out to be<br />

fruitless.<br />

2.4 It's All About Price: Of course nobody wants to pay<br />

too much for their goods and services, but there is a lot more<br />

on the table than just money. Look for alternatives that are<br />

high on your priority list and low on the vendors. <strong>The</strong>n you<br />

both win.<br />

2.5 Jumping Too Quick: No matter how low the opening<br />

price is, <strong>of</strong>fer lower or ask for something more. If you jump<br />

too quickly at the first <strong>of</strong>fer, the vendor will feel like they<br />

made a stupid mistake.<br />

2.6 Don't Gloat: When you do end up striking a fantastic<br />

deal in your favor, don't embarrass the vendor by saying<br />

something that will give you an ego-trip at his/her expense.<br />

Not only is this unpr<strong>of</strong>essional, but the vendor may then<br />

look for loop-holes in the contract to regain some money<br />

and pride.<br />

2.7 Terminology Not Defined or Understood: Don't<br />

assume that everyone who will read the contract will<br />

understand every technical term or complicated provision.<br />

Insist that every area <strong>of</strong> the contract that has the possibility<br />

<strong>of</strong> being misunderstood is clearly defined.<br />

2.8 Inconsistencies within the Contract: Look for<br />

inconsistencies within the contract that can come back to<br />

haunt you in some form <strong>of</strong> arbitration. If necessary, have a<br />

third party review the contract in order to uncover any<br />

inconsistencies.<br />

2.9 Concern in One Area Will be Overridden by Another<br />

Area: Do not assume that a perceived weakness or<br />

apprehension in one area <strong>of</strong> the contract can be compensated<br />

by strength in another area. Be specific and direct in all<br />

areas. Once the contract is contested in a court <strong>of</strong> law, all<br />

control is removed from your hands.<br />

2.10 Avoid Redundancies: Stating the same thing twice in<br />

different section <strong>of</strong> the contract will not reinforce their<br />

value. In most instances lawyers and the courts will come up<br />

with a reason to differentiate and justify both areas; usually<br />

with an interpretation that neither party anticipated.<br />

II Methodology<br />

3. Vendor <strong>Management</strong> Success Tips:<br />

Strategies to Strengthen Vendor Relations<br />

Vendor management allows you to build a relationship with<br />

your suppliers and service providers that will strengthen<br />

both businesses. Vendor management is not negotiating the<br />

lowest price possible. Vendor management is constantly<br />

working with your vendors to come to agreements that will<br />

mutually benefit both companies.<br />

3.1 Share Information and Priorities: <strong>The</strong> most important<br />

success factor <strong>of</strong> vendor management is to share information<br />

and priorities with your vendors. That does not mean that<br />

you throw open the accounting books and give them user<br />

IDs and passwords to your systems. Appropriate vendor<br />

management practices provide only the necessary<br />

information at the right time that will allow a vendor to<br />

better service your needs. This may include limited forecast<br />

www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 30


information, new product launches, changes in design and<br />

expansion or relocation changes, just to name a few.<br />

3.2 Balance Commitment and Competition: One <strong>of</strong> the<br />

goals in vendor management is to gain the commitment <strong>of</strong><br />

your vendors to assist and support the operations <strong>of</strong> your<br />

business. On-the-other-hand, the vendor is expecting a<br />

certain level <strong>of</strong> commitment from you. This does not mean<br />

that you should blindly accept the prices they provide.<br />

3.3 Allow Key Vendors to Help You Strategize: If a<br />

vendor supplies a key part or service to your operation,<br />

invite that vendor to strategic meetings that involve the<br />

product they work with. Remember, you brought in the<br />

vendor because they could make the product or service<br />

better and/or cheaper than you could. <strong>The</strong>y are the experts in<br />

that area and you can tap into that expertise in order to give<br />

you a competitive advantage.<br />

3.4 Build Partnerships for the Long Term: Vendor<br />

management seeks long term relationships over short term<br />

gains and marginal cost savings. Constantly changing<br />

vendors in order to save a penny here or there will cost more<br />

money in the long run and will impact quality. Other<br />

benefits <strong>of</strong> a long term relationship include trust, preferential<br />

treatment and access to insider or expert knowledge.<br />

3.4 Seek to Understand Your Vendor's Business Too:<br />

Remember, your vendor is in business to make money too.<br />

If you are constantly leaning on them to cut costs, either<br />

quality will suffer or they will go out <strong>of</strong> business. Part <strong>of</strong><br />

vendor management is to contribute knowledge or resources<br />

that may help the vendor better serve you. Asking questions<br />

<strong>of</strong> your vendors will help you understand their side <strong>of</strong> the<br />

business and build a better relationship between the two <strong>of</strong><br />

you.<br />

3.5 Negotiate to a Win-Win Agreement: Good vendor<br />

management dictates that negotiations are completed in<br />

good faith. Look for negotiation points that can help both<br />

sides accomplish their goals. A strong-arm negotiation tactic<br />

will only work for so long before one party walks away<br />

from the deal.<br />

3.6 Come Together on Value: Vendor management is more<br />

than getting the lowest price. Most <strong>of</strong>ten the lowest price<br />

also brings the lowest quality. Vendor management will<br />

focus quality for the money that is paid. In other words:<br />

value! You should be willing to pay more in order to receive<br />

better quality. If the vendor is serious about the quality they<br />

deliver, they won't have a problem specifying the quality<br />

details in the contract.<br />

4. Vendor <strong>Management</strong> Best Practices<br />

Whether you're a multimillion dollar company or a small<br />

business with a few employees, here are some Vendor<br />

<strong>Management</strong> Best Practices that any size business can use.<br />

4.1 Vendor Selection: <strong>The</strong> vendor management process<br />

begins by selecting the right vendor for the right reasons.<br />

You will need to analyze your business requirements, search<br />

for prospective vendors, lead the team in selecting the<br />

winning vendor and successfully negotiate a contract while<br />

avoiding contract negotiation mistakes.<br />

4.2 Scrutinize the Prospects: Once you start to look at<br />

individual vendors, be careful that you don't get blinded by<br />

the deceptive <strong>of</strong>fers. Depending upon the size <strong>of</strong> the<br />

possible contract, they will pull out all the stops in order to<br />

get your business. This may include a barrage <strong>of</strong><br />

overzealous salespeople and consultants. Just because they<br />

send a lot <strong>of</strong> people in the beginning, doesn't mean they will<br />

be there after the contract is signed.<br />

As you begin your vendor search, ask some questions that<br />

will help you eliminate the more obvious misfits. For<br />

example, Is the proposed material, service or outsourcing<br />

project within the vendor's area <strong>of</strong> expertise?<br />

4.3 Remain Flexible: Be wary <strong>of</strong> restrictive or exclusive<br />

relationships. For example, limitations with other vendors or<br />

with future customers. In addition, contracts that have<br />

severe penalties for seemingly small incidents should be<br />

avoided. If the vendor asks for an extremely long term<br />

contract, you should ask for a shorter term with a renewal<br />

option. On the other hand, you should be open to the<br />

vendor's requests also. If an issue is small and insignificant<br />

to you but the vendor insists on adding it to the contract you<br />

may choose to bend in this situation. This shows good faith<br />

on your part and your willingness to work towards a<br />

contract that is mutually beneficial to both parties.<br />

4.4 Monitor Performance: Once the relationship with the<br />

vendor has begun, don't assume that everything will go<br />

according to plan and executed exactly as specified in the<br />

contract. <strong>The</strong> vendor's performance must be monitored<br />

constantly in the beginning. This should include the<br />

requirements that are most critical to your business. For<br />

example: shipping times, quality <strong>of</strong> service performed, order<br />

completion, call answer time, etc.<br />

4.5 Communicate Constantly: <strong>The</strong> bottom line in vendor<br />

management best practices is: communication. Don't assume<br />

that the vendor intimately knows your business or can read<br />

your mind. A well established and well maintained line <strong>of</strong><br />

communication will avoid misunderstandings and<br />

proactively address issues before they become problems.<br />

5. Choose Your Vendors Wisely:<br />

Your vendors have as much interest in your company's<br />

success as you do. When you make a lot <strong>of</strong> sales, they make<br />

a lot <strong>of</strong> sales; when you get paid, they get paid. Having<br />

reliable and trustworthy vendors can help your business<br />

succeed, just as dealing with unreliable or shady firms can<br />

cause major setbacks. Start by asking around; other business<br />

owners in your area can be a great source <strong>of</strong> information.<br />

Once you've got a list <strong>of</strong> names, call your local Better<br />

Business Bureau to find out whether any complaints have<br />

been filed against any <strong>of</strong> the vendors on your list. You can<br />

visit vendor Web sites and even tour their physical<br />

locations. You can ask for customer testimonials and for<br />

product samples as well. <strong>The</strong> key is to get as much<br />

information as possible before you make a large monetary<br />

commitment to a vendor you don't know.<br />

As you begin to choose vendors, particularly those who will<br />

stock your inventory, try to think <strong>of</strong> them as business<br />

partners. You want to choose the ones with whom your<br />

company can develop a long-term, mutually pr<strong>of</strong>itable<br />

relationship, and that relationship starts with your first<br />

www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 31


equest for a price quote. Don't be afraid to ask vendors for<br />

quotes; they're used to it and they probably expect it. After<br />

all, this is a major purchase, and it's never wise to make a<br />

major purchase without shopping around — especially when<br />

you're going to a vendor you've never dealt with before. If<br />

you're having a hard time finding vendors, and an even<br />

harder time finding information about them, you can run<br />

your own test by placing a very small order, under $100 in<br />

total value. If that process goes well, take it up a notch and<br />

place a slightly larger order the next time. Once you feel<br />

comfortable with the vendor, you can place your full-blown<br />

orders without worry.<br />

5.1 Getting Quotes: When you want to make a big purchase<br />

for your business, you need to know the total cost upfront.<br />

To get that information, you need to ask the people who sell<br />

whatever it is you want to buy. In order for that information<br />

to be fixed (as opposed to changeable), it's best to get it in<br />

writing. When your company is buying a product, that<br />

information will come in the form <strong>of</strong> a quote; when it's<br />

services you're after, the quote is usually referred to as an<br />

estimate.<br />

<strong>The</strong> best way to get a quote is to talk with a salesperson;<br />

quote requests that come by mail are <strong>of</strong>ten ignored. Phone<br />

contact is fine, especially after you've begun to build a<br />

relationship with that vendor or salesman. For your first<br />

time out, though, a face-to-face meeting could prove more<br />

fruitful, especially if you're spending a significant sum.<br />

Even though salesmen themselves are seldom involved in<br />

setting company pricing policy, they <strong>of</strong>ten have some<br />

leeway when it comes to closing a deal. When you establish<br />

a personal connection with a salesman, he'll work harder<br />

with you and for you; after all, making a sale to you is his<br />

bread and butter. Flexible areas <strong>of</strong>ten include lower unit<br />

pricing when you buy in bulk, and better credit terms.<br />

5.2 Avoid <strong>The</strong>se Vendors: <strong>The</strong>re are some vendors that you<br />

should avoid. If you run across a vendor with one (or more)<br />

<strong>of</strong> the following characteristics, run in another direction:<br />

Accepts cash only<br />

Asks for checks made out to cash<br />

Won't send a brochure or catalog<br />

Won't give you a price quote or estimate in writing<br />

Dirty, disorganized stockroom<br />

No warehouse or storage facility<br />

If one (or more) <strong>of</strong> these factors is the norm in your<br />

industry, and the vendor in question has gotten high marks<br />

from a reliable source, it's probably safe to keep him on your<br />

list. However, if it's the vendor telling you this is normal<br />

practice, and you can't verify that with anyone else, look for<br />

a different vendor.<br />

6. Establishing Good Vendor Relations:<br />

Developing your vendor relations will save you stress and<br />

time, both <strong>of</strong> which you can save for planning more events.<br />

6.1 <strong>The</strong> Vendor Cast <strong>of</strong> Characters: Your vendor list will<br />

vary depending on your field <strong>of</strong> event planning. When<br />

shopping for a vendor, ask other players in the same area for<br />

recommendations. You can also ask the company for<br />

referrals from other clients in the industry. Be sure to call<br />

the company for a full report before you decide to hire a<br />

vendor. As with industries, vendors rely heavily on their<br />

reputations to be successful. You might find yourself<br />

looking for the following vendors when you begin your<br />

career.<br />

Labor companies, which includes electricians,<br />

general contractors, carpenters, and painters<br />

Graphic designer or Web designer<br />

Specialty stationery designer or printing company<br />

6.2 Working with an Existing Vendor List: You may also<br />

find you are entering into a position with an existing vendor<br />

list. Ask your new associates how the relationship between<br />

the company and the vendor has been in the past. When<br />

appropriate, schedule a meeting with the vendor to introduce<br />

yourself. During the meeting you should get an idea <strong>of</strong> the<br />

existing process <strong>of</strong> ordering, delivering, and billing. You<br />

should reserve <strong>of</strong>fering suggestions until you have worked<br />

with the company for a few months<br />

6.3 Creating Goodwill among Your Vendors: If your<br />

goal is to develop a healthy relationship with a vendor, you<br />

must make a conscious effort to show your appreciation.<br />

Here are some suggestions to create goodwill and develop<br />

your vendor relationships.<br />

Offer a drink to your delivery people. Restaurants have<br />

the luxury <strong>of</strong> <strong>of</strong>fering this service to their vendors. If you<br />

are working in an <strong>of</strong>fice, keep c<strong>of</strong>fee, sodas, and bottled<br />

water on hand for company drivers.<br />

Provide vendor meals. Do so not only for your staff but<br />

also for vendors who may be working. This simple act<br />

encourages staff relationships and builds a sense <strong>of</strong><br />

community.<br />

Have a volunteer day. Choose a charity and get your<br />

company, vendors, and staff involved.<br />

Invite vendors to events. When appropriate, put your<br />

vendors on the guest list <strong>of</strong> an event your company is<br />

hosting.<br />

Extend an invitation to company parties. Holiday staff<br />

parties are a great way to integrate vendors into your<br />

company.<br />

7. Repairing a Relationship with a Vendor<br />

It is possible a relationship with a vendor may strain at some<br />

point in your career. You should make every effort to repair<br />

the relationship. Misunderstandings <strong>of</strong>ten occur in the heat<br />

<strong>of</strong> the moment. Tempers and emotions flare at this time<br />

between two otherwise calm people. In this case, an apology<br />

in your thank-you letter may solve this matter.<br />

7.1 Working toward a Solution: In the instance <strong>of</strong> larger<br />

disagreements, the first step to mending the working<br />

relationship is to have a meeting with your vendor. Revisit a<br />

disagreement after a few days have passed, to give both<br />

parties some clarity. Begin the meeting by addressing the<br />

problem, then listen to your vendor's side <strong>of</strong> the story.<br />

Accept your responsibility in the matter and apologize. If<br />

warranted, address any issues you may be having with your<br />

vendor, and hopefully he will return the apology and you<br />

both can continue working together.<br />

7.2 Monetary Issues: If the matter involves a monetary<br />

issue, try and invite a third party to resolve the dispute. <strong>The</strong><br />

third party should be someone you both have worked with<br />

and trust. Another vendor would be good choices for a third<br />

party. If the matter involves a client and a complaint, you<br />

might ask the client how he/she would like the matter<br />

resolved and recommend this to your vendor.<br />

7.3 Knowing When to Walk Away: Sometimes a sour<br />

vendor relationship has passed the point <strong>of</strong> repair. If you<br />

www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 32


have followed all the suggested tips for repairing a<br />

relationship, it may be time to walk away. It is best to make<br />

a clean break. Do not embellish or gossip to other vendors.<br />

A vendor can also gossip about his experience working for<br />

you. Make it a practice not to speak negatively about<br />

vendors. Simply stating you used to work with a vendor but<br />

no longer do will speak volumes to a client asking for a<br />

vendor referral.<br />

Conclusion: Although today’s reason for implementing<br />

VRM is mostly driven by cost-savings and efficiency<br />

increase propositions, Substantial improvements in efficacy<br />

and quality in different areas <strong>of</strong> Automobile Industries can<br />

be achieved.<br />

<strong>The</strong> implementation <strong>of</strong> the above mentioned vendor<br />

relationship management practices can boost the vendor<br />

response towards our own company which in turn will make<br />

him a staunch support at dire times <strong>of</strong> need. <strong>The</strong> cost <strong>of</strong><br />

quality (or better phrased as the cost <strong>of</strong> “unquality”) resulted<br />

from imperfections <strong>of</strong> a vendor's incoming input materials is<br />

one component <strong>of</strong> the total costs in the evaluation <strong>of</strong><br />

vendors.<br />

A well managed vendor will prove to be <strong>of</strong> great support<br />

when it comes to customer satisfaction and job shop<br />

productions in terms <strong>of</strong> cost and quality.<br />

In an automobile industry where the competition is<br />

enormous it becomes the need <strong>of</strong> the hour to have<br />

competitive and well managed vendors for developing new<br />

products at a faster pace to have a greater edge amongst the<br />

other major players.<br />

References:<br />

[1] Aberdeen Group. (2004, June). <strong>The</strong> Quiet Revolution in<br />

Vendor <strong>Management</strong> — A Benchmark Study on<br />

HowCompanies Are Communicating with and Monitoring<br />

<strong>The</strong>ir Suppliers. [Online].<br />

Available:http://www.aberdeen.com/summary/report/bench<br />

mark/suppliermgmt.asp.<br />

[2] W. Appelfeller, and W. Buchholz, Supplier Relationship<br />

<strong>Management</strong>: Strategie, Organisation und <strong>IT</strong><br />

desmodernenen Beschaffungsmanagements, Wiesbaden:<br />

Gabler, 2005.<br />

[3] I. Benbasat, D. K. Goldstein, and M. Mead, <strong>The</strong> Case<br />

<strong>Research</strong> Strategy in Studies <strong>of</strong> Information Systems,<br />

MISQuarterly, vol. 11, no. 3, pp. 369-386, 1987.<br />

[4] T. Boland, and A. Fowler, A Systems Perspective <strong>of</strong><br />

Performance <strong>Management</strong> in Public Sector<br />

Organisations,<strong>The</strong> International <strong>Journal</strong> <strong>of</strong> Public Sector<br />

<strong>Management</strong>, vol. 13, no. 5, pp. 417-446, 2000.<br />

[5] M. C. J. Caniëls, and C. J. Gelderman, Power and<br />

Interdependence in Buyer Supplier Relationships:<br />

A Purchasing Portfolio Approach, Industrial Marketing<br />

<strong>Management</strong>, vol. 36, no. 2, pp. 219-229, 2007.<br />

[6] M. G. Christopher, Logistics and Supply Chain<br />

<strong>Management</strong>, London: Pitman Publishing, 1992.<br />

1992.<br />

[7] T. H. Davenport, and J. E. Short, <strong>The</strong> New Industrial<br />

Engineering - Information Technology and Business Process<br />

Redesign, Sloan <strong>Management</strong> Review<br />

[8]F. R. Dwyer, P. H. Schurr, and S. Oh, Developing Buyer-<br />

Seller Relationships, <strong>Journal</strong> <strong>of</strong> Marketing.<br />

[9] European Commission, ICT and e-Business in Hospital<br />

Activities: ICT Adoption and e-Business Activity in<br />

2006,Sector Report No. 10/2006, e Business Watch, Bonn,<br />

Germany, 2006.<br />

***<br />

www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 33

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!