SlideShare a Scribd company logo
1 of 5
Download to read offline
Computer Engineering and Intelligent Systems                                                   www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.4, 2011


                  Intelligent Agent for detection of ATM Theft
                                             Muhammad Javed
                           Institute of Computing and Information Technology
                                      Gomal University, PAKISTAN
                                         javed_gomal@yahoo.com

                                              Bashir Ahmad
                           Institute of Computing and Information Technology
                                      Gomal University, PAKISTAN
                                          bashahmad@gmail.com

                                           Muhammad Ali Abid
                           Institute of Computing and Information Technology
                                      Gomal University, PAKISTAN
                                        maliabid_awan@yahoo.com
                                           Imran Ali Khan
                   Department of Computer Science, COMSTS, Abbotabad, PAKISTAN
                                             imran@ciit.net.pk

Abstract
ATM service is considered as more profitable service of a bank. There are many pre caution have been
determined to use an ATM but still some threats are face by customer to use an ATM, such as existence of
another person with a customer will be encountered as threat for ATM. The focus of this paper is to design
the architecture of an intelligent agent which incorporates with ATM agent to detect the existence of
unknown person with customer and takes some safety steps for customer. Finally proposed intelligent can
be enhanced to detect the more theft face by customer of ATM.
Keywords: ATM, Intelligent Agent, Threats.
1. Introduction
      In artificial intelligence, an intelligent agent is anything that can be viewed as perceiving its
environment through sensors and acting upon that environment through effectors. The rational performance
of an agent is observed in terms of the performed task. In computer science intelligent agent refers to
software agent which is not a rational agent [6].
Automatic Teller Machine (ATM) is a profitable service of bank which allows the customer to access the
financial transaction in public space. A customer need a magnetic chip card to access the financial
transaction. ATM agents are used to replace the function of bank teller or clerk of bank [7]. During the use
of ATM many thefts are face by customer such as theft of couriers, theft of personal identification number,
burglary of ATMs and theft of money from ATMs by bank. Besides these, another theft is encounter for
customer which is the existence of another person in ATM room. To overcome this theft an intelligent agent
is proposed, whose objective is work with coordination of ATM agent and make the secure financial
transaction of customers. The functions of proposed software intelligent agent are formally described by
using Object Constraint Language (OCL) for further enhancement and evaluation of proposed intelligent
agent [8].


2. Intelligent Agents
         In AI, Intelligent Agent is used to observe and act upon an environment to achieve some predefine
goals. Intelligent agent may have ability to learn from its environment. In computer science, an intelligent


                                                   260
Computer Engineering and Intelligent Systems                                                     www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.4, 2011

agent is referred to as software agent while in economic it is refer as agent. A simple agent is also known as
agent function which maps every possible percept percepts sequence to a possible action. Agents are
classified as physical agent, temporal agent, spatial agents, processing agents, learning agents, decision
agents and believable agents. The environment of an agent can be define in different way such as
observable or partially observable, deterministic or stochastic, episodic or sequential, static or dynamic,
discrete or continuous and single agent or multi agents [3].
3. Automatic Teller Machine
An automated teller machine (ATM) is a computerized telecommunications device that provides the
customers of a financial institution with access to financial transactions in a public space. With the use of
an ATM, customers can access their bank accounts for cash withdrawals and check their account balances.
ATMs are normaly placed inside the premises of banks, but can also be placed in different locations such
as shopping centers/malls, airports or restaurants. Now-a-days Automated Teller Machines (ATM) is
considered as very common technology for dispensing notes to cash-holders. The ATM structure for cash
withdrawal differs across countries [2].
The first ATM was installed in the USA in 1969. ATMs have a positive effect on the nominal currency
growth, but this effect is not very robust. Among all profitable services of bank ATM is consider as more
profitable service because t attract number of non-bank customers. The structure of ATM comprise on main
components such as CPU, magnetic chip card, PIN pad, Secure crypto processor, function keys and vault.
The main theft which are relevant to ATM are [1,4].
    Theft of couriers who fill ATMs with cash
    Theft of personal identification numbers
    Theft by electronic data interception
    Theft by fraudulent electronic transactions
    Theft of money from ATMs by bank
    Burglary of ATMs
    Vandalism of ATMs
    Fraudulent use of ATM cards obtained from customers through dummy ATMs that keep their cards.
4. Object Constraint Language
  The Object Constraint Language (OCL) is a formal language used to describe expressions on UML
models. These expressions specify the invariant conditions that must hold for the system being modeled or
queries. The main features of OCL language are:
   OCL is pure specification language
   OCL is not a programming language
   OCL is a type language.
The basic constructs and its description is shown in table-1.
                               Table-1: Basic constructs of OCL
Basic Constructs          Description               Example
Context                   Define context for the               context Person
                          expression.                          context Company inv:
                                                               context c : Company inv:
                                                               context Person::income (d: Date) : Integer
Self                      Refer to the contextual            self.TotalPerson=0
                          instance.
Pre, Post                 Constraints on operations          Pre : TotalPerson=0
Initial and Derived       Represent the initial or derived        Init : Self.Totalperson=0
Values                    value of an attribute
Basic types               Boolean, Integer, String, Real                        ------------
Enumeration Types         It defines a number of             context Person inv: gender = Gender::male
                          enumeration literals
Comment                   It describe comments               -- this is a comment
Classifiers               types, classes, interfaces,                           ------------
                          associations and data types.

                                                    261
Computer Engineering and Intelligent Systems                                                   www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.4, 2011

Basic Constructs          Description                      Example
Selection                 Comparison of values             If condition then
                                                             statements
                                                           end if

5. Architecture of proposed Intelligent agent
          The function of proposed intelligent agent is incorporated with the function of ATM Agent. This
is revealed as informally through use case diagram of UML for security purpose and shown figure-1 [5].




            Figure-1. Use case diagram of Proposed intelligent with ATM agent

The structure of proposed intelligent agent with ATM agent is shown in figure-2. The architecture of
proposed intelligent agent is divided into two parts. The first part comprise on sensor of intelligent agent
which detect the existence of more than one person in room of ATM and send information to first software
module of second part of intelligent agent. The second part comprise on two software modules. The
function of first module is to interact with sensor of first part and retrieve information, process the
information and send to second module.




                     Figure-2. Structure of Proposed intelligent agent with ATM agent
          The second software module interact with ATM agent and display information for customer about
the existence of another person, and it also prompt to customer for continuation of transaction in normal or
secure form. If customer wants to continue transaction in secure form then second software module makes
the integrated processing with ATM agent and process the transaction of customer in secure form. The
processing of both software modules based on the algorithms which allow the communication among
customers, ATM agent and sensor. The function of proposed intelligent agent with ATM agent is shown in
figure-3.




                                                   262
Computer Engineering and Intelligent Systems                                                                          www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.4, 2011


                                                                    Customer enter to the ATM
                                                                    room




                                                                    Sensor of intelligent agent
                                                                    detect the existence of more
                                                                    than one persons




                                                                            Are more
                                                                            than one
                                                                            person


                               First module takes information from                              Normal ATM process and no
                               sensor, process it and send to second                            further work of Agent
                               module




                               Work of second module will be integrated
                               with ATM agent, it display prompt for
                               customer to allow the existence of another
                               person




                                          Customer
                                          Response to
                                          allow person




        Agent will not interpret the                             Agent will enforce and
        normal transaction                                       instruct the ATM agent to do
                                                                 transaction in secure form


Figure-3. Flowchart for function of proposed intelligent agent with ATM agent
         For formal specification of the working of proposed intelligent agent three context are defined
which are Sensor, Customer, ATM Agent, Module1 and Module2. The OCL expressions for formal
specification of sensor’s work are:

 -- Expression to define Sensor context
 Context Person
 Context Person: Response=boolean
 Context Sensor::TotalPerson : Integer
 Init : Self.Totalperson=0
 Derive : Self.TotalPerson=Person.size();
 If Self.TotalPerson>=2 then
     Context Module1::Observe(Self.TotalPerson)
 End if



 Context Module1
 Context Module1::Observe(TP : integer)
   Self.Process();                                                263
Computer Engineering and Intelligent Systems                                                     www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.4, 2011




 Context Module2
 Context ATMAgent.Info: String
 Self.Info=Module2.Process()
 Context ATMAgent:Display(Info)
 If Person.Response=True then
     Context ATMAgent.NormalTransaction()
 Else
     Context ATMAgent.SecureTransaction()
 End if



6. Conclusion and future work.
       Financial transactions of customer through ATM are faced by number of thefts. Among these thefts
one is related with the existence of more than person (causes robbery on gun point) in ATM room. The
focus of this research is to propose an intelligent agent, whose function is incorporated with the function of
ATM agent, to make the transaction of customer more secure. The structure of proposed intelligent Agent
is divided into two parts i.e. sensor and software modules. The functionality of software modules can be
modified to remove those thefts which are face by customer in ATM room. These thefts are proposed for
future work.
Reference
Michael S. Scott, “Robbery at Automated Teller Machines”, Guide No.8, 2001
Heli Snellman, “Automated Teller Machine network market structure and cash sage”, ISBN 952-462-
318-8, 2006
Ira Rudowsky, “Intelligent Agents” Proceedings of the Americas Conference on Information Systems, New
York, New York, August 2004
Diana L. Taylor, Superintendent of Banks , “Using An Automated Teller Machine(Atm) What You Need
To Know”, State of New York Banking Department, 25 Nov 2009
Donald G. Firesmith,” Security Use Cases”, Vol. 2, No. 3, May-June 2003
http://wikipedia/intelligent agent.htm
http://wikipedia/ Automated teller machine.htm
OMG Available Specification,” Object Constraint Language”, May 2006




                                                    264

More Related Content

What's hot

Harvard vs Von Neumann Architecture
Harvard vs Von Neumann ArchitectureHarvard vs Von Neumann Architecture
Harvard vs Von Neumann ArchitectureProject Student
 
Online car parking reservation system 9160262550 dinesh
Online car parking reservation system   9160262550 dineshOnline car parking reservation system   9160262550 dinesh
Online car parking reservation system 9160262550 dineshDinesh Nalluri
 
input output organization.pptx
input output organization.pptxinput output organization.pptx
input output organization.pptxMeenakshiR43
 
Online Job Portal ppt presentation
Online Job Portal ppt presentationOnline Job Portal ppt presentation
Online Job Portal ppt presentationPrateek Kulshrestha
 
Micro programmed control
Micro programmed  controlMicro programmed  control
Micro programmed controlShashank Singh
 
Online Banking Project
Online Banking ProjectOnline Banking Project
Online Banking ProjectM.Saber
 
Computer Organisation & Architecture (chapter 1)
Computer Organisation & Architecture (chapter 1) Computer Organisation & Architecture (chapter 1)
Computer Organisation & Architecture (chapter 1) Subhasis Dash
 
Microcontroller 8051 1
Microcontroller 8051  1Microcontroller 8051  1
Microcontroller 8051 1khan yaseen
 
Coal 1 - introduction to assembly programming in Assembly Programming
Coal 1 - introduction to assembly programming in Assembly ProgrammingCoal 1 - introduction to assembly programming in Assembly Programming
Coal 1 - introduction to assembly programming in Assembly ProgrammingMuhammad Taqi Hassan Bukhari
 
Motorola microprocessor
Motorola microprocessorMotorola microprocessor
Motorola microprocessorIffat Anjum
 
Design of Accumulator Unit
Design of Accumulator UnitDesign of Accumulator Unit
Design of Accumulator UnitHarshad Koshti
 
ARM Exception and interrupts
ARM Exception and interrupts ARM Exception and interrupts
ARM Exception and interrupts NishmaNJ
 
Hotel management system project
Hotel management system projectHotel management system project
Hotel management system projectMohammed Al Babeli
 

What's hot (20)

Harvard vs Von Neumann Architecture
Harvard vs Von Neumann ArchitectureHarvard vs Von Neumann Architecture
Harvard vs Von Neumann Architecture
 
Online car parking reservation system 9160262550 dinesh
Online car parking reservation system   9160262550 dineshOnline car parking reservation system   9160262550 dinesh
Online car parking reservation system 9160262550 dinesh
 
Project Report
Project ReportProject Report
Project Report
 
input output organization.pptx
input output organization.pptxinput output organization.pptx
input output organization.pptx
 
22CS201 COA
22CS201 COA22CS201 COA
22CS201 COA
 
Online Job Portal ppt presentation
Online Job Portal ppt presentationOnline Job Portal ppt presentation
Online Job Portal ppt presentation
 
Micro programmed control
Micro programmed  controlMicro programmed  control
Micro programmed control
 
Blackberry Technology ppt
Blackberry Technology pptBlackberry Technology ppt
Blackberry Technology ppt
 
Online Banking Project
Online Banking ProjectOnline Banking Project
Online Banking Project
 
Job portal
Job portalJob portal
Job portal
 
Computer Organisation & Architecture (chapter 1)
Computer Organisation & Architecture (chapter 1) Computer Organisation & Architecture (chapter 1)
Computer Organisation & Architecture (chapter 1)
 
Microcontroller 8051 1
Microcontroller 8051  1Microcontroller 8051  1
Microcontroller 8051 1
 
Coal 1 - introduction to assembly programming in Assembly Programming
Coal 1 - introduction to assembly programming in Assembly ProgrammingCoal 1 - introduction to assembly programming in Assembly Programming
Coal 1 - introduction to assembly programming in Assembly Programming
 
Motorola microprocessor
Motorola microprocessorMotorola microprocessor
Motorola microprocessor
 
Hardware-Software Codesign
Hardware-Software CodesignHardware-Software Codesign
Hardware-Software Codesign
 
Design of Accumulator Unit
Design of Accumulator UnitDesign of Accumulator Unit
Design of Accumulator Unit
 
ARM Exception and interrupts
ARM Exception and interrupts ARM Exception and interrupts
ARM Exception and interrupts
 
Loaders
LoadersLoaders
Loaders
 
Job center
Job centerJob center
Job center
 
Hotel management system project
Hotel management system projectHotel management system project
Hotel management system project
 

Viewers also liked

Counseling anxiety disorders brochure
Counseling anxiety disorders brochureCounseling anxiety disorders brochure
Counseling anxiety disorders brochureBeloit Health System
 
Ppt revisedffff
Ppt revisedffffPpt revisedffff
Ppt revisedffffpeterccw
 
Bizcipleship slide share 1.5 - www.bizcipleship.com
Bizcipleship slide share 1.5 - www.bizcipleship.comBizcipleship slide share 1.5 - www.bizcipleship.com
Bizcipleship slide share 1.5 - www.bizcipleship.comBrett Johnson
 
Power of Visual Storytelling: A Picture or Twitvid is Worth a Thousand Words
Power of Visual Storytelling: A Picture or Twitvid is Worth a Thousand WordsPower of Visual Storytelling: A Picture or Twitvid is Worth a Thousand Words
Power of Visual Storytelling: A Picture or Twitvid is Worth a Thousand WordsJacki Halas
 

Viewers also liked (6)

Socialmedia
SocialmediaSocialmedia
Socialmedia
 
Employers Need 3 Things
Employers Need 3 Things Employers Need 3 Things
Employers Need 3 Things
 
Counseling anxiety disorders brochure
Counseling anxiety disorders brochureCounseling anxiety disorders brochure
Counseling anxiety disorders brochure
 
Ppt revisedffff
Ppt revisedffffPpt revisedffff
Ppt revisedffff
 
Bizcipleship slide share 1.5 - www.bizcipleship.com
Bizcipleship slide share 1.5 - www.bizcipleship.comBizcipleship slide share 1.5 - www.bizcipleship.com
Bizcipleship slide share 1.5 - www.bizcipleship.com
 
Power of Visual Storytelling: A Picture or Twitvid is Worth a Thousand Words
Power of Visual Storytelling: A Picture or Twitvid is Worth a Thousand WordsPower of Visual Storytelling: A Picture or Twitvid is Worth a Thousand Words
Power of Visual Storytelling: A Picture or Twitvid is Worth a Thousand Words
 

Similar to 28 javed intelligent agent for 260-264

Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...IJRTEMJOURNAL
 
IRJET-Artificial Intelligence and its Applications Goal
IRJET-Artificial Intelligence and its Applications GoalIRJET-Artificial Intelligence and its Applications Goal
IRJET-Artificial Intelligence and its Applications GoalIRJET Journal
 
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...IRJET Journal
 
Bluetooth Based Automatic Hotel Service System Using Python
Bluetooth Based Automatic Hotel Service System Using PythonBluetooth Based Automatic Hotel Service System Using Python
Bluetooth Based Automatic Hotel Service System Using PythonIOSR Journals
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoTDesign and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoTIJRTEMJOURNAL
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT	Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT journal ijrtem
 
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatforms
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatformsA Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatforms
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatformsIRJET Journal
 
IRJET- A Survey on Cardless Automated Teller Machine(ATM)
IRJET- A Survey on Cardless Automated Teller Machine(ATM)IRJET- A Survey on Cardless Automated Teller Machine(ATM)
IRJET- A Survey on Cardless Automated Teller Machine(ATM)IRJET Journal
 
An AI Based ATM Intelligent Security System using Open CV and YOLO
An AI Based ATM Intelligent Security System using Open CV and YOLOAn AI Based ATM Intelligent Security System using Open CV and YOLO
An AI Based ATM Intelligent Security System using Open CV and YOLOYogeshIJTSRD
 
Camouflage Surveillance Robot In Defense Using Artificial Intelligence
Camouflage Surveillance Robot In Defense Using Artificial IntelligenceCamouflage Surveillance Robot In Defense Using Artificial Intelligence
Camouflage Surveillance Robot In Defense Using Artificial IntelligenceIRJET Journal
 
ADVANCE ATM SECURITY SYSTEM
ADVANCE ATM SECURITY SYSTEMADVANCE ATM SECURITY SYSTEM
ADVANCE ATM SECURITY SYSTEMIRJET Journal
 
A Modern Technique for Unauthorized Human Detection and Intimation
A Modern Technique for Unauthorized Human Detection and IntimationA Modern Technique for Unauthorized Human Detection and Intimation
A Modern Technique for Unauthorized Human Detection and Intimationijtsrd
 
Third Generation Automatic Teller Machine
Third Generation Automatic Teller MachineThird Generation Automatic Teller Machine
Third Generation Automatic Teller Machineijsrd.com
 
IRJET - Identification and Classification of IoT Devices in Various Appli...
IRJET -  	  Identification and Classification of IoT Devices in Various Appli...IRJET -  	  Identification and Classification of IoT Devices in Various Appli...
IRJET - Identification and Classification of IoT Devices in Various Appli...IRJET Journal
 
Internet of Things Based Central Monitoring System for ATM’s
Internet of Things Based Central Monitoring System for ATM’sInternet of Things Based Central Monitoring System for ATM’s
Internet of Things Based Central Monitoring System for ATM’sIRJET Journal
 
IRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATMIRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATMIJTET Journal
 
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN AlgorithmIRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN AlgorithmIRJET Journal
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligenceguest45deb89
 
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...IRJET Journal
 
Simulation, modelling and packet sniffing facilities for IoT: A systematic an...
Simulation, modelling and packet sniffing facilities for IoT: A systematic an...Simulation, modelling and packet sniffing facilities for IoT: A systematic an...
Simulation, modelling and packet sniffing facilities for IoT: A systematic an...IJECEIAES
 

Similar to 28 javed intelligent agent for 260-264 (20)

Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
 
IRJET-Artificial Intelligence and its Applications Goal
IRJET-Artificial Intelligence and its Applications GoalIRJET-Artificial Intelligence and its Applications Goal
IRJET-Artificial Intelligence and its Applications Goal
 
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
 
Bluetooth Based Automatic Hotel Service System Using Python
Bluetooth Based Automatic Hotel Service System Using PythonBluetooth Based Automatic Hotel Service System Using Python
Bluetooth Based Automatic Hotel Service System Using Python
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoTDesign and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT	Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT
 
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatforms
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatformsA Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatforms
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatforms
 
IRJET- A Survey on Cardless Automated Teller Machine(ATM)
IRJET- A Survey on Cardless Automated Teller Machine(ATM)IRJET- A Survey on Cardless Automated Teller Machine(ATM)
IRJET- A Survey on Cardless Automated Teller Machine(ATM)
 
An AI Based ATM Intelligent Security System using Open CV and YOLO
An AI Based ATM Intelligent Security System using Open CV and YOLOAn AI Based ATM Intelligent Security System using Open CV and YOLO
An AI Based ATM Intelligent Security System using Open CV and YOLO
 
Camouflage Surveillance Robot In Defense Using Artificial Intelligence
Camouflage Surveillance Robot In Defense Using Artificial IntelligenceCamouflage Surveillance Robot In Defense Using Artificial Intelligence
Camouflage Surveillance Robot In Defense Using Artificial Intelligence
 
ADVANCE ATM SECURITY SYSTEM
ADVANCE ATM SECURITY SYSTEMADVANCE ATM SECURITY SYSTEM
ADVANCE ATM SECURITY SYSTEM
 
A Modern Technique for Unauthorized Human Detection and Intimation
A Modern Technique for Unauthorized Human Detection and IntimationA Modern Technique for Unauthorized Human Detection and Intimation
A Modern Technique for Unauthorized Human Detection and Intimation
 
Third Generation Automatic Teller Machine
Third Generation Automatic Teller MachineThird Generation Automatic Teller Machine
Third Generation Automatic Teller Machine
 
IRJET - Identification and Classification of IoT Devices in Various Appli...
IRJET -  	  Identification and Classification of IoT Devices in Various Appli...IRJET -  	  Identification and Classification of IoT Devices in Various Appli...
IRJET - Identification and Classification of IoT Devices in Various Appli...
 
Internet of Things Based Central Monitoring System for ATM’s
Internet of Things Based Central Monitoring System for ATM’sInternet of Things Based Central Monitoring System for ATM’s
Internet of Things Based Central Monitoring System for ATM’s
 
IRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATMIRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATM
 
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN AlgorithmIRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligence
 
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
 
Simulation, modelling and packet sniffing facilities for IoT: A systematic an...
Simulation, modelling and packet sniffing facilities for IoT: A systematic an...Simulation, modelling and packet sniffing facilities for IoT: A systematic an...
Simulation, modelling and packet sniffing facilities for IoT: A systematic an...
 

More from Alexander Decker

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inAlexander Decker
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksAlexander Decker
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dAlexander Decker
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceAlexander Decker
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifhamAlexander Decker
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaAlexander Decker
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenAlexander Decker
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget forAlexander Decker
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabAlexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalAlexander Decker
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesAlexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloudAlexander Decker
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveragedAlexander Decker
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenyaAlexander Decker
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health ofAlexander Decker
 

More from Alexander Decker (20)

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
 

Recently uploaded

Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 

Recently uploaded (20)

Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 

28 javed intelligent agent for 260-264

  • 1. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.4, 2011 Intelligent Agent for detection of ATM Theft Muhammad Javed Institute of Computing and Information Technology Gomal University, PAKISTAN javed_gomal@yahoo.com Bashir Ahmad Institute of Computing and Information Technology Gomal University, PAKISTAN bashahmad@gmail.com Muhammad Ali Abid Institute of Computing and Information Technology Gomal University, PAKISTAN maliabid_awan@yahoo.com Imran Ali Khan Department of Computer Science, COMSTS, Abbotabad, PAKISTAN imran@ciit.net.pk Abstract ATM service is considered as more profitable service of a bank. There are many pre caution have been determined to use an ATM but still some threats are face by customer to use an ATM, such as existence of another person with a customer will be encountered as threat for ATM. The focus of this paper is to design the architecture of an intelligent agent which incorporates with ATM agent to detect the existence of unknown person with customer and takes some safety steps for customer. Finally proposed intelligent can be enhanced to detect the more theft face by customer of ATM. Keywords: ATM, Intelligent Agent, Threats. 1. Introduction In artificial intelligence, an intelligent agent is anything that can be viewed as perceiving its environment through sensors and acting upon that environment through effectors. The rational performance of an agent is observed in terms of the performed task. In computer science intelligent agent refers to software agent which is not a rational agent [6]. Automatic Teller Machine (ATM) is a profitable service of bank which allows the customer to access the financial transaction in public space. A customer need a magnetic chip card to access the financial transaction. ATM agents are used to replace the function of bank teller or clerk of bank [7]. During the use of ATM many thefts are face by customer such as theft of couriers, theft of personal identification number, burglary of ATMs and theft of money from ATMs by bank. Besides these, another theft is encounter for customer which is the existence of another person in ATM room. To overcome this theft an intelligent agent is proposed, whose objective is work with coordination of ATM agent and make the secure financial transaction of customers. The functions of proposed software intelligent agent are formally described by using Object Constraint Language (OCL) for further enhancement and evaluation of proposed intelligent agent [8]. 2. Intelligent Agents In AI, Intelligent Agent is used to observe and act upon an environment to achieve some predefine goals. Intelligent agent may have ability to learn from its environment. In computer science, an intelligent 260
  • 2. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.4, 2011 agent is referred to as software agent while in economic it is refer as agent. A simple agent is also known as agent function which maps every possible percept percepts sequence to a possible action. Agents are classified as physical agent, temporal agent, spatial agents, processing agents, learning agents, decision agents and believable agents. The environment of an agent can be define in different way such as observable or partially observable, deterministic or stochastic, episodic or sequential, static or dynamic, discrete or continuous and single agent or multi agents [3]. 3. Automatic Teller Machine An automated teller machine (ATM) is a computerized telecommunications device that provides the customers of a financial institution with access to financial transactions in a public space. With the use of an ATM, customers can access their bank accounts for cash withdrawals and check their account balances. ATMs are normaly placed inside the premises of banks, but can also be placed in different locations such as shopping centers/malls, airports or restaurants. Now-a-days Automated Teller Machines (ATM) is considered as very common technology for dispensing notes to cash-holders. The ATM structure for cash withdrawal differs across countries [2]. The first ATM was installed in the USA in 1969. ATMs have a positive effect on the nominal currency growth, but this effect is not very robust. Among all profitable services of bank ATM is consider as more profitable service because t attract number of non-bank customers. The structure of ATM comprise on main components such as CPU, magnetic chip card, PIN pad, Secure crypto processor, function keys and vault. The main theft which are relevant to ATM are [1,4].  Theft of couriers who fill ATMs with cash  Theft of personal identification numbers  Theft by electronic data interception  Theft by fraudulent electronic transactions  Theft of money from ATMs by bank  Burglary of ATMs  Vandalism of ATMs  Fraudulent use of ATM cards obtained from customers through dummy ATMs that keep their cards. 4. Object Constraint Language The Object Constraint Language (OCL) is a formal language used to describe expressions on UML models. These expressions specify the invariant conditions that must hold for the system being modeled or queries. The main features of OCL language are:  OCL is pure specification language  OCL is not a programming language  OCL is a type language. The basic constructs and its description is shown in table-1. Table-1: Basic constructs of OCL Basic Constructs Description Example Context Define context for the  context Person expression.  context Company inv:  context c : Company inv:  context Person::income (d: Date) : Integer Self Refer to the contextual self.TotalPerson=0 instance. Pre, Post Constraints on operations Pre : TotalPerson=0 Initial and Derived Represent the initial or derived Init : Self.Totalperson=0 Values value of an attribute Basic types Boolean, Integer, String, Real ------------ Enumeration Types It defines a number of context Person inv: gender = Gender::male enumeration literals Comment It describe comments -- this is a comment Classifiers types, classes, interfaces, ------------ associations and data types. 261
  • 3. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.4, 2011 Basic Constructs Description Example Selection Comparison of values If condition then statements end if 5. Architecture of proposed Intelligent agent The function of proposed intelligent agent is incorporated with the function of ATM Agent. This is revealed as informally through use case diagram of UML for security purpose and shown figure-1 [5]. Figure-1. Use case diagram of Proposed intelligent with ATM agent The structure of proposed intelligent agent with ATM agent is shown in figure-2. The architecture of proposed intelligent agent is divided into two parts. The first part comprise on sensor of intelligent agent which detect the existence of more than one person in room of ATM and send information to first software module of second part of intelligent agent. The second part comprise on two software modules. The function of first module is to interact with sensor of first part and retrieve information, process the information and send to second module. Figure-2. Structure of Proposed intelligent agent with ATM agent The second software module interact with ATM agent and display information for customer about the existence of another person, and it also prompt to customer for continuation of transaction in normal or secure form. If customer wants to continue transaction in secure form then second software module makes the integrated processing with ATM agent and process the transaction of customer in secure form. The processing of both software modules based on the algorithms which allow the communication among customers, ATM agent and sensor. The function of proposed intelligent agent with ATM agent is shown in figure-3. 262
  • 4. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.4, 2011 Customer enter to the ATM room Sensor of intelligent agent detect the existence of more than one persons Are more than one person First module takes information from Normal ATM process and no sensor, process it and send to second further work of Agent module Work of second module will be integrated with ATM agent, it display prompt for customer to allow the existence of another person Customer Response to allow person Agent will not interpret the Agent will enforce and normal transaction instruct the ATM agent to do transaction in secure form Figure-3. Flowchart for function of proposed intelligent agent with ATM agent For formal specification of the working of proposed intelligent agent three context are defined which are Sensor, Customer, ATM Agent, Module1 and Module2. The OCL expressions for formal specification of sensor’s work are: -- Expression to define Sensor context Context Person Context Person: Response=boolean Context Sensor::TotalPerson : Integer Init : Self.Totalperson=0 Derive : Self.TotalPerson=Person.size(); If Self.TotalPerson>=2 then Context Module1::Observe(Self.TotalPerson) End if Context Module1 Context Module1::Observe(TP : integer) Self.Process(); 263
  • 5. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.4, 2011 Context Module2 Context ATMAgent.Info: String Self.Info=Module2.Process() Context ATMAgent:Display(Info) If Person.Response=True then Context ATMAgent.NormalTransaction() Else Context ATMAgent.SecureTransaction() End if 6. Conclusion and future work. Financial transactions of customer through ATM are faced by number of thefts. Among these thefts one is related with the existence of more than person (causes robbery on gun point) in ATM room. The focus of this research is to propose an intelligent agent, whose function is incorporated with the function of ATM agent, to make the transaction of customer more secure. The structure of proposed intelligent Agent is divided into two parts i.e. sensor and software modules. The functionality of software modules can be modified to remove those thefts which are face by customer in ATM room. These thefts are proposed for future work. Reference Michael S. Scott, “Robbery at Automated Teller Machines”, Guide No.8, 2001 Heli Snellman, “Automated Teller Machine network market structure and cash sage”, ISBN 952-462- 318-8, 2006 Ira Rudowsky, “Intelligent Agents” Proceedings of the Americas Conference on Information Systems, New York, New York, August 2004 Diana L. Taylor, Superintendent of Banks , “Using An Automated Teller Machine(Atm) What You Need To Know”, State of New York Banking Department, 25 Nov 2009 Donald G. Firesmith,” Security Use Cases”, Vol. 2, No. 3, May-June 2003 http://wikipedia/intelligent agent.htm http://wikipedia/ Automated teller machine.htm OMG Available Specification,” Object Constraint Language”, May 2006 264