Collaborating USSD Platform in Web-Based Student Registration  
  Authors : Rajab Philip Muchiri

 

The number of students joining universities is increasing fast congesting existing registration systems. Online registration with student web portals common in many institutions of learning was adapted to solve this problem. Online registration has helped alleviate some of these problems, however it has not entirely eradicated the problem. Long queues and delays are still experienced during registration exercise. The reason is due to the huge number of students trying to access the web simultaneously. Accessing the web through the internet becomes slow and tedious process. The purpose of this research is to demonstrate the application of USSD protocol in students registration system. The USSD platform described below is not intended to substitute existing systems, but rather to enhance the reach of facilities to the target users using the most popular and commonly available technology with student populations.

 

Published In : IJCAT Journal Volume 3, Issue 9

Date of Publication : September 2016

Pages : 428-435

Figures :13

Tables : --

Publication Link :Collaborating USSD Platform in Web-Based Student Registration

 

 

 

Rajab Philip Muchiri : Computer Science Department Egerton University 20115 Njoro, Kenya

 

 

 

 

 

 

 

USSD Protocol, Mobile Communications, SMS

This research has demonstrated how USSD platform can be cooperated in online student registration system. The purpose is to enhance registration management services. It is not meant to replace them but to enhance their usability. Though USSD protocol is efficient it however should be applied with caution. In GSM, all requests to Service Codes in the range *100# to *499# should go through the originator's home HLR while requests to code *500# and above in theory need to be handled by the VLR of the visited network and routed to a local USSD Gateway[23]. In ordinary circumstance, HLR validates by checking that the subscriber is active in its records and the service code is active and valid then routes the request via a USSD Gateway to the appropriate application. The application may perform its own validation during the session such as verifying the IMSI of the request or or performing multi-phase authentication. This may enable someone to sniff on the radio interface or to hi-jack it entirely and record these inputs for subsequent fraudulent use[24]. End-to-end encryption between a client (SIM toolkit or Java) on the handset and the application attached to the USSD Gateway is the only way of guaranteeing the security of such services[25].

 

 

 

 

 

 

 

 

 

[1] Shrinath S Pai J Meenakumari, (2013). SWOT Analysis of M-Governance in Higher Education Administration. International Journal of Computer Applications (0975 – 8887). International Conference on Current Trends in Advanced Computing “ICCTAC- 2013” [2] Maged F., (October, 2007). Automated Student Course's Registration using Computer Telephony Intergration. The International Arab Journal of Information Technology Vol. 4, No. 4 Oct 2007 [3] Angela C. and Leonida M., (2012). M-Governance: Exploratory Survey on Kenyan Service Delivery and Government Interaction IST-Africa 2012 Conference Proceedings Paul Cunningham and Miriam Cunningham (Eds) IIMC International Information Management Corporation, ISBN: 978-1-905824-34-2. iHub Research [4] Omar Al-Hujran (March, 2012). Toward the Utilization of M-Governance Services in Developing Countries. International Journal of Business and Social Science Vol. 3 No. 5 [5] Rajab Philip Muchiri, Lucyann Muthoni Karani (October, 2015). Developing a Campus Emergency Management Information System (CEMIS) International Journal of Computer Trends and Technology (IJCTT) – volume 28 Number 2. [6] iHub Research Report (November 2012). "Mobile Phone Usage at the Kenyan Base of the Pyramid". [7] Maria R. Lee. Utilizing PDA for Campus M-Service, Department of Information Management Shih Chien University 70, Ta-Chih Street, Taipei 104, Taiwan [8] Puneet Gupta (July 7, 2010). End to End USSD System. TATA Tele Service Limited, India. [9] Taskin E., (2012). GSM MSC/VLR Unstructured Supplementary Service Data (USSD) Service, Uppsala University. [10] Dialogic (August, 2008). USSD Service for Interactive Mobile Users. Building user friendly mobile telephony applications using Dialogic Distributed Signalling Interface Components. [11] Sanganagouda J.,(2011). USSD: A communication Technology to Potentially ouster SMS Dependency, Aricent. [12] Baraka W. N., Anael S. and Loserian S. L., (2013). Security Perspectives For USSD Versus SMS In Conducting Mobile Transactions: A Case Study Of Tanzania. International Journal of Technology Enhancement and Emerging Engineering Research, Vol. 1 Issue 338 ISSN 2347-4289 [13] Desai S., (2011). Mitigating Security Risks in USSDBased Mobile Payment Applications. Aujas: Bangalore. [14] Arielarnesto, (20th Dec 2011). Online Student Registration and Billing System [15] E. Ramganesh E., Kirubakaran E. and Gobi R.,(August, 2015). A Roadmap for a Higher Learning Institution based m-Governance Framework in the Grey Revolution. International Journal of Advanced Research in Computer Science and Software Engineering. Volume 5, Issue 8. Available online at: www.ijarcsse.com [16] Kendall K. and Kendall J., (2002). Systems Analysis and Design, Fourth Edition. [17] Muchiri Philip Rajab, Zakary O. Bosire and Peter Kemei (2015). Development of a Web Based Electronic Procurement System International Journal of Advanced Research in Computer Science. Available Online at www.ijarcs.info [18] Pressman B. and Roger S., (1999). " Software Engineering", Fourth Edition. [19] Daniel T. K., (June, 2013). Unstructured Supplementary Service Data (USSD) Based Prototype for Credit Unions' Loan Request Processes in Kenya. Master of Science Thesis in Information Technology at Strathmore University. [20] [3GPP TS 22.090] Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); Unstructured Supplementary Service Data (USSD); Stage 1 [21] [3GPP TS 23.038] Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); Alphabets and language-specific information [3GPP TS 23.090] Digital cellular telecommunications system (Phase 2+); [22] Universal Mobile Telecommunications System (UMTS); Unstructured Supplementary Service Data (USSD); Stage 2 [23] PMT Document Report. Secure USSD Facility for Financial Institutions Analysis and Recommendation Report. PMT Document No. PMT/AMR/USSD/SF version 2.0d1 [24] P. Kaur and K.K. Saluja, (February, 2012). A Review of Security issues and mitigation Measures in GSM. International Journal of Research in Engineering & Applied Sciences. Volume 2(Issue 2: p. 16. [25] Toorani M. and A. Beheshti(2008). Solutions to the GSM security weaknesses in the Second International Conference on Next Generation Mobile Applications, Services and Technologies. NGMAST'08. 2008: IEEE.