SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2391
Multi Bank ATM Family Card: INTEGRATION OF MULTI BANK
MULTIPLE USER IN SINGLE CARD WITH USER BEHAVIOR MONITORING
USING HMM & FORMULA VERIFICATION
Mr .K.Sridharan
Associate Professor
Department of Information Technology
Panimalar Engineering College
K.G.Yuvaraaj K.C.Rahul S.Tamil Kanal S.D.Ashok Kumar
Student
Department of Information Technology
Panimalar Engineering College
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract— The aim of this project is to use debit / credit
card access for the purpose of customer’s money
transactions in case of lack of money in a particular account.
The multibank smart card is an application software
designed to take advantage of today’stechnologyandreduce
or avoid the time delay of amount transaction. This
facilitates multi user to access his/her account with a single
ATM card. User can create account and get the ATM card
from the bank. He can integrate all his accounts in other
banks in this single card with unique PIN number
accordingly. User behavior is monitored through HMM
Model and he can set up a formula based authentication. He
can include all his family members accounts details also in
the same card. He can withdraw cash from the account after
successful authentication of the corresponding PIN number.
Index terms—debit/credit card, money transactions,
application software, ATM card, PIN number
Introduction
Information technology (IT) not only introduces
convenience, but creates many new improvements which
were impossible in the past. For example, advances of
business intelligence (BI) methods and data mining
techniques have brought huge improvements to modern
business operations[10]. Nowadays, in the “big data era,” a
massive amount of data is available for all kindsofindustrial
applications. For example, the cloud service can be
considered as a data warehouse which provides a useful
source of data. Wireless sensor networks [e.g., radio
frequency identification (RFID), near field communications]
can be used to collect useful data ubiquitously. An evolving
topic on the Internet of things (IoTs), which consists of
devices capable of communicating via the Internet
environment, also provides a platform for gathering an
enormous amount of data. In other words, it is now easier to
collect data than ever before. It is said that, extracting and
utilizing useful information from such huge and dynamic
databases for “big data” is far from easy. Since these data are
linked to real-time events, they can be employed for
rescheduling or replanning activities in business
applications which finally reduces the level of risk and
improves profitability and efficiency of the operations. This
undoubtedly can supplement traditional optimization
techniques, which are a priori in nature. For instance, Zhang
et al. considered a dynamic workload scheduling problem
with the help of big data stored in distributed cloudservices.
They developed an evolutionary optimizationalgorithmand
simulated the performance under different scenarios. In
another study, Zhang et al. analyzed the cost minimization
issue of moving data around geographically dispersed data.
Such data migration problem is very important yet
challenging as the volume of big data isgrowing quickly.Dou
et al. Developed a service optimization model for handling
big data stored in cloud systems when privacy is a critical
concern (e.g., the medical data). Service quality may be
compromised if a cloud server refuses to provide the data
due to the privacy issue. Such optimization model can
maximize the service quality and is verified by a simulation
study. Another application of big data is on smart grids.
Simmhan et al. predicted the demand of a cloud-basedsmart
grid system and derived the optimal pricing strategy, based
on the big data on real-time consumption. The approach is
possible due to the data mining algorithm the authors
developed. Owing to the importance of big data analytics for
business applications, this paper is developed. With respect
to the core topic on big data analytics for business
operations and risk management, we organize this paper
into three big sections, namely: 1) BI and data mining; 2)
industrial systems reliability and security; and 3) business
operational risk management (ORM). Each ofthesesections:
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2392
1) examines some carefully selected papers; 2) outlines the
related research challenges; and 3) proposes the future
research directions. To the best of our knowledge, this is the
first paper in the literature which focuses on how big data
analytics can be employed for reducing systems risk and
enhancing efficiency in business operations.
Assistive Technologies
In this project HMM model is used for user behavior
monitoring .This model is a statistical Markov model in
which the system being modeled is assumed to be a Markov
process with unobserved (hidden) states. An HMM can be
presented as the simplest dynamic Bayesian network. In
simpler Markov models (like a Markov chain), the state is
directly visible to the observer, and therefore the state
transition probabilities are the only parameters. In
a hidden Markov model, the state is not directly visible, but
the output, dependent on the state, isvisible.Eachstatehasa
probability distribution over the possible output tokens.
Therefore, the sequence of tokens generated by an HMM
gives some information about the sequence of states. The
adjective 'hidden' referstothestatesequencethrough which
the model passes, not to the parameters of the model; the
model is still referred to as a 'hidden' Markov model even if
these parameters are known exactly.
RFID smart card is used as an ATM card. Radio-frequency
identification (RFID) uses electromagnetic fields to
automatically identify and track tagsattachedtoobjects.The
tags contain electronically stored information. Passive tags
collect energy from a nearby RFID reader's
interrogating radio waves. Active tags have a local power
source such as a battery and may operate at hundreds of
meters from the RFID reader. Unlike a barcode, the tag need
not be within the line of sight of the reader, so it may be
embedded in the tracked object.
Scope
The scope of this project is integration of RFID, IOT and
Big Data. Multi User, Multi Account ATM Card is
implemented. The user behavior is tracked using HMM
Model and Formulae Authentication is implemented for
Security. Easy and comfortable ATM Transaction with
security. Multiple user bank accountscanbeidentifiedby the
RBI.
Existing System
In the existing system, each user has separate ATM card
for each bank transactions. During money withdrawal, the
user needs to access bank account in which there is money.
This becomes a tedious process.ThereisnoRFIDtechnology
used in the existing system.
V. ‘Multi Bank Family Card’ Principle Of Operation
In the proposed system,integrationofBigData,Business
analytical and RFID like technology is supposed to be recent
trends in IT. It is most challenge oriented activity. In our
project implementation, we are developing this application
for a Banking sector particularly for a Debit / ATM card
section. We use RFID smart card as ATM Card for
transaction. User can create account and get the ATM card
from the bank. He can integrate all his accounts in other
banks in this single card with unique PIN number
accordingly. User behavior is monitored through HMM
Model and he can set up a formula based authentication. He
can include all his family members’ accounts details also in
the same card. He can withdraw cash from their accounts
after successful authentication of the corresponding PIN
numbers.
The project workflow is as follows: firsttheuserwantsto
create an account and then they are allowed to access the
network. Once the user creates an account, they login into
their account and request the job from the Service Provider.
Based on the user’s request, the Service Provider will
process the user requested job and respond to them. All the
user details will be stored in the database of the Service
Provider. In this project, we will design the User Interface
Frame to communicate with the server through network
coding using the programming Languages like Java. By
sending the request to Server Provider, the user can access
the requested data if they authenticated by the Service
Provider. Bank Service Provider will contain information
about the user in their Data Storage. The Bank Service
provider will maintain the all the user information to
authenticate when they want to login into their account.
Using single card like credit and debit for entire family
members. But maintain unique PIN numbers for different
banks. We will provide a button add “Family card” in our
user card. Now user can add his family members bank ATM
details also along with pin number details. User can include
like further bank account no, bank name, pin number same
way for other family members also. Hidden Markovmodel is
used for user behaviour analysis of cash withdrawal.Hidden
Markov model is applied to understand user’s money
withdrawal sequence which means first condition is total
amount withdrawal in every month. Secondoneisfrequency
of withdrawal of moneyusingcreditcard.Usercanwithdraw
the cash as per money requirement and time frequency is
also monitored & recorded. During registration of the card
user has to give a formula for secured authenticationsystem
user can also add multiple bank accounts in single card. In
this project, we provide security by using formula like(A+B-
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2393
C) while registration. In this formula using alphabets and
two operators like (+ and -). The formula is constant, but
numbers will randomly change for every transaction.Useris
not required to provide the formula at any time, user is only
required to submit the answer after substitution of the
corresponding values in their formula. This formula based
authentication is required only when user tries to withdraw
money beyond the permitted 10% extra and increases the
withdrawal frequency.
Once user is registered by specifying his master bank
account details & formula for authentication. Now user can
add his family card details also.
VI. Architecture Diagram
Figure.1. Architecture diagram of multi bank family
card
VII. Advantages
 This system really awards multiple ATM card on
rotation.
 User can withdrawal cash fromonesingleATMcard
from their family members account.
 Hidden Markov model is used for user behavior
analysis of cash withdrawal
 Security is ensured by the implementation of
formula based authentication
 Big data is included in thesystemforanalyzinghuge
volume of data.
VIII. Dataflow Diagram
Figure.2. User registration and withdrawal workflow
Figure.3. User behavior analysis workflow
Conclusion
In this project, we have implemented to integration of
multi bank multi user in single card with user behavior
monitoring using hmm & formula verification. The new
system helps them to do user can create account and get the
RFID smartcard. Then user can add the beneficiary orfamily
members and he can integrate all beneficiary bank account
details. Also other banks can be integrated in thissinglecard
with unique PIN numbers accordingly. Every user can
withdraw amount from the unique pin number. Authorized
user can only get an authentication formula to the particular
account. User behavior is monitored based on every user’s
money withdrawal sequence, which means first condition is
every month user can withdraw a limited amount. Second
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2394
one is Frequency of withdrawal of money using credit card.
User can withdraw the cash as per limited money
requirement and time frequency is also monitored &
recorded. it is very useful for withdraw amount in without
time delay.
References
[1] N. Manwani and P. S. Sastry, “Noise tolerance under risk
minimization,” IEEE Trans. Cybern., vol. 43, no. 3, pp. 1146–
1151,Jun. 2013.
[2] H. K. Chan and F. T. S. Chan, “Early order completion
contract approach to minimize the impact of demand
uncertainty on supply chains,” IEEETrans. Ind. Informat.,vol.
2, no. 1, pp. 48–58, Feb. 2006.
[3] G. M. Gaukler, “Item-level RFID in a retail supply chain
with stockout- based substitution,” IEEE Trans. Ind.
Informat., vol. 7, no. 2,pp. 362–370, May 2011.
[4] K. Govindan, A. Jafarian, M. E. Azbari, and T.-M. Choi,
“Optimal bi-objective redundancy allocation for systems
reliability and risk management,” IEEE Trans. Cybern., to be
published.
[5] B. Shen, T.-M. Choi, Y. Wang, and C. K. Y. Lo, “The
coordination of fashion supply chains with a risk-averse
supplier under the markdown money policy,” IEEE Trans.
Syst., Man, Cybern., Syst., vol. 43, no. 2,pp. 266–276, Mar.
2013.
[6] H. M. Markowitz, Portfolio Selection: Efficient
Diversification of Investment. New York, NY, USA: Wiley,
1959.
[7] D. D. Wu and D. Olson, “Enterprise risk management: A
DEA VaR approach in vendor selection,” Int. J. Prod. Res., vol.
48, no. 16,pp. 4919–4932, 2010.
[8] D. D. Wu and D. Olson, “Enterprise risk management:
Coping with model risk in a large bank,” J. Oper. Res. Soc., vol.
61, no. 2,pp. 179–190, 2010.
[9] D. L. Olson and D. D. Wu, “Risk management models for
supply chain:A scenario analysis of outsourcing to China,”
Supply Chain Manag. Int. J., vol. 16, no. 6, pp. 401–408, 2011.
[10] Recent Development in Big Data Analytics for Business
Operations and Risk Management Tsan-Ming Choi,Member,
IEEE, Hing Kai Chan, Senior Member,IEEE,andXiaohang Yue
vol. 47, No. 1, Jan 2017 .

More Related Content

What's hot

IRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention SystemIRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention SystemIRJET Journal
 
An ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation NetworkAn ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation Networkdbpublications
 
IRJET - An Intelligent Recommendation for Social Contextual Image using H...
IRJET -  	  An Intelligent Recommendation for Social Contextual Image using H...IRJET -  	  An Intelligent Recommendation for Social Contextual Image using H...
IRJET - An Intelligent Recommendation for Social Contextual Image using H...IRJET Journal
 
IRJET - Digital KYC with Auto Form Filling
IRJET - 	  Digital KYC with Auto Form FillingIRJET - 	  Digital KYC with Auto Form Filling
IRJET - Digital KYC with Auto Form FillingIRJET Journal
 
IRJET- Securing E-Medical Documents using QR Code
IRJET-  	  Securing E-Medical Documents using QR CodeIRJET-  	  Securing E-Medical Documents using QR Code
IRJET- Securing E-Medical Documents using QR CodeIRJET Journal
 
A secure architecture for m commerce users using biometerics and pin distribu...
A secure architecture for m commerce users using biometerics and pin distribu...A secure architecture for m commerce users using biometerics and pin distribu...
A secure architecture for m commerce users using biometerics and pin distribu...pradip patel
 
QR code based two-factor authentication to verify paper-based documents
QR code based two-factor authentication to verify paper-based documentsQR code based two-factor authentication to verify paper-based documents
QR code based two-factor authentication to verify paper-based documentsTELKOMNIKA JOURNAL
 
Smart banking system
Smart banking systemSmart banking system
Smart banking systemShreyans Jain
 
ONLINE PAYMENT SYSTEM WITH PHISHING AND DDOS DETECTION AND PREVENTION
ONLINE PAYMENT SYSTEM WITH PHISHING AND DDOS DETECTION AND PREVENTIONONLINE PAYMENT SYSTEM WITH PHISHING AND DDOS DETECTION AND PREVENTION
ONLINE PAYMENT SYSTEM WITH PHISHING AND DDOS DETECTION AND PREVENTIONJournal For Research
 
A Secure and Robust Cloud-based Prototype for Online Transaction using Androi...
A Secure and Robust Cloud-based Prototype for Online Transaction using Androi...A Secure and Robust Cloud-based Prototype for Online Transaction using Androi...
A Secure and Robust Cloud-based Prototype for Online Transaction using Androi...IJMTST Journal
 
Design of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope methodDesign of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope methodeSAT Publishing House
 
Analysis of Security Algorithms used in E-Commerce and ATM Transactions
Analysis of Security Algorithms used in E-Commerce and ATM TransactionsAnalysis of Security Algorithms used in E-Commerce and ATM Transactions
Analysis of Security Algorithms used in E-Commerce and ATM TransactionsIJERD Editor
 
Advanced mechanism for single sign on for distributed computer networks
Advanced mechanism for single sign on for distributed computer networksAdvanced mechanism for single sign on for distributed computer networks
Advanced mechanism for single sign on for distributed computer networkseSAT Journals
 
Analysis on need of Smart Card
Analysis on need of Smart CardAnalysis on need of Smart Card
Analysis on need of Smart Cardjournal ijrtem
 
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET-  	  Secure Automated Teller Machine (ATM) by Image ProcessingIRJET-  	  Secure Automated Teller Machine (ATM) by Image Processing
IRJET- Secure Automated Teller Machine (ATM) by Image ProcessingIRJET Journal
 

What's hot (20)

IRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention SystemIRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention System
 
An ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation NetworkAn ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation Network
 
IRJET - An Intelligent Recommendation for Social Contextual Image using H...
IRJET -  	  An Intelligent Recommendation for Social Contextual Image using H...IRJET -  	  An Intelligent Recommendation for Social Contextual Image using H...
IRJET - An Intelligent Recommendation for Social Contextual Image using H...
 
IRJET - Digital KYC with Auto Form Filling
IRJET - 	  Digital KYC with Auto Form FillingIRJET - 	  Digital KYC with Auto Form Filling
IRJET - Digital KYC with Auto Form Filling
 
IRJET- Securing E-Medical Documents using QR Code
IRJET-  	  Securing E-Medical Documents using QR CodeIRJET-  	  Securing E-Medical Documents using QR Code
IRJET- Securing E-Medical Documents using QR Code
 
A secure architecture for m commerce users using biometerics and pin distribu...
A secure architecture for m commerce users using biometerics and pin distribu...A secure architecture for m commerce users using biometerics and pin distribu...
A secure architecture for m commerce users using biometerics and pin distribu...
 
D0351022026
D0351022026D0351022026
D0351022026
 
Assessment and Mitigation of Risks Involved in Electronics Payment Systems
Assessment and Mitigation of Risks Involved in Electronics Payment Systems Assessment and Mitigation of Risks Involved in Electronics Payment Systems
Assessment and Mitigation of Risks Involved in Electronics Payment Systems
 
QR code based two-factor authentication to verify paper-based documents
QR code based two-factor authentication to verify paper-based documentsQR code based two-factor authentication to verify paper-based documents
QR code based two-factor authentication to verify paper-based documents
 
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)
 
Smart banking system
Smart banking systemSmart banking system
Smart banking system
 
ONLINE PAYMENT SYSTEM WITH PHISHING AND DDOS DETECTION AND PREVENTION
ONLINE PAYMENT SYSTEM WITH PHISHING AND DDOS DETECTION AND PREVENTIONONLINE PAYMENT SYSTEM WITH PHISHING AND DDOS DETECTION AND PREVENTION
ONLINE PAYMENT SYSTEM WITH PHISHING AND DDOS DETECTION AND PREVENTION
 
[IJET V2I3P6] Authors: Ajeeth, Sandhya raani M
[IJET V2I3P6] Authors:  Ajeeth, Sandhya raani M[IJET V2I3P6] Authors:  Ajeeth, Sandhya raani M
[IJET V2I3P6] Authors: Ajeeth, Sandhya raani M
 
A Secure and Robust Cloud-based Prototype for Online Transaction using Androi...
A Secure and Robust Cloud-based Prototype for Online Transaction using Androi...A Secure and Robust Cloud-based Prototype for Online Transaction using Androi...
A Secure and Robust Cloud-based Prototype for Online Transaction using Androi...
 
Design of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope methodDesign of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope method
 
AUTHENTICATED MEDICAL DOCUMENTS RELEASING WITH PRIVACY PROTECTION AND RELEAS...
AUTHENTICATED MEDICAL DOCUMENTS RELEASING  WITH PRIVACY PROTECTION AND RELEAS...AUTHENTICATED MEDICAL DOCUMENTS RELEASING  WITH PRIVACY PROTECTION AND RELEAS...
AUTHENTICATED MEDICAL DOCUMENTS RELEASING WITH PRIVACY PROTECTION AND RELEAS...
 
Analysis of Security Algorithms used in E-Commerce and ATM Transactions
Analysis of Security Algorithms used in E-Commerce and ATM TransactionsAnalysis of Security Algorithms used in E-Commerce and ATM Transactions
Analysis of Security Algorithms used in E-Commerce and ATM Transactions
 
Advanced mechanism for single sign on for distributed computer networks
Advanced mechanism for single sign on for distributed computer networksAdvanced mechanism for single sign on for distributed computer networks
Advanced mechanism for single sign on for distributed computer networks
 
Analysis on need of Smart Card
Analysis on need of Smart CardAnalysis on need of Smart Card
Analysis on need of Smart Card
 
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET-  	  Secure Automated Teller Machine (ATM) by Image ProcessingIRJET-  	  Secure Automated Teller Machine (ATM) by Image Processing
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
 

Similar to Multi Bank Atm Family Card: Integration of Multi Bank Multiple User in Single Card with User Behavior Monitoring using Hmm & Formula Verification

SECURE DATA ENCRYPTION FOR ATM TRANSACTIONS
SECURE DATA ENCRYPTION FOR ATM TRANSACTIONSSECURE DATA ENCRYPTION FOR ATM TRANSACTIONS
SECURE DATA ENCRYPTION FOR ATM TRANSACTIONSIRJET Journal
 
IRJET - A Survey Paper on Secure Digital Payment
IRJET -  	  A Survey Paper on Secure Digital PaymentIRJET -  	  A Survey Paper on Secure Digital Payment
IRJET - A Survey Paper on Secure Digital PaymentIRJET Journal
 
Effective Attendance Markingusing Face Recognition & RFID Tags
Effective Attendance Markingusing Face Recognition & RFID TagsEffective Attendance Markingusing Face Recognition & RFID Tags
Effective Attendance Markingusing Face Recognition & RFID TagsIRJET Journal
 
IRJET - Anti-Fraud ATM Security System
IRJET  - Anti-Fraud ATM Security SystemIRJET  - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security SystemIRJET Journal
 
IRJET- E-Gatepass System
IRJET- E-Gatepass SystemIRJET- E-Gatepass System
IRJET- E-Gatepass SystemIRJET Journal
 
Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationTransactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationIRJET Journal
 
A Research Paper on Credit Card Fraud Detection
A Research Paper on Credit Card Fraud DetectionA Research Paper on Credit Card Fraud Detection
A Research Paper on Credit Card Fraud DetectionIRJET Journal
 
IRJET - Customer Churn Analysis in Telecom Industry
IRJET - Customer Churn Analysis in Telecom IndustryIRJET - Customer Churn Analysis in Telecom Industry
IRJET - Customer Churn Analysis in Telecom IndustryIRJET Journal
 
Pradeepnsingh praveenkyadav-131008015758-phpapp02
Pradeepnsingh praveenkyadav-131008015758-phpapp02Pradeepnsingh praveenkyadav-131008015758-phpapp02
Pradeepnsingh praveenkyadav-131008015758-phpapp02PMI_IREP_TP
 
Pradeep n singh_praveenkyadav
Pradeep n singh_praveenkyadavPradeep n singh_praveenkyadav
Pradeep n singh_praveenkyadavPMI2011
 
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsSurvey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsIRJET Journal
 
IRJET - A Joint Optimization Approach to Security and Insurance Managemen...
IRJET -  	  A Joint Optimization Approach to Security and Insurance Managemen...IRJET -  	  A Joint Optimization Approach to Security and Insurance Managemen...
IRJET - A Joint Optimization Approach to Security and Insurance Managemen...IRJET Journal
 
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Implementing Oracle Utility-Meter Data Management For Power Consumption
Implementing Oracle Utility-Meter Data Management For Power ConsumptionImplementing Oracle Utility-Meter Data Management For Power Consumption
Implementing Oracle Utility-Meter Data Management For Power ConsumptionIJERDJOURNAL
 
IRJET- An Overview on Mobile Cloud Computing
IRJET-  	  An Overview on Mobile Cloud ComputingIRJET-  	  An Overview on Mobile Cloud Computing
IRJET- An Overview on Mobile Cloud ComputingIRJET Journal
 
IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...
IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...
IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...IRJET Journal
 
IRJET - Service Base Application
IRJET - Service Base ApplicationIRJET - Service Base Application
IRJET - Service Base ApplicationIRJET Journal
 
SmartMeterPaper_csicc21.pdf
SmartMeterPaper_csicc21.pdfSmartMeterPaper_csicc21.pdf
SmartMeterPaper_csicc21.pdfCodingMzansi
 
Internet of Things Based Central Monitoring System for ATM’s
Internet of Things Based Central Monitoring System for ATM’sInternet of Things Based Central Monitoring System for ATM’s
Internet of Things Based Central Monitoring System for ATM’sIRJET Journal
 

Similar to Multi Bank Atm Family Card: Integration of Multi Bank Multiple User in Single Card with User Behavior Monitoring using Hmm & Formula Verification (20)

SECURE DATA ENCRYPTION FOR ATM TRANSACTIONS
SECURE DATA ENCRYPTION FOR ATM TRANSACTIONSSECURE DATA ENCRYPTION FOR ATM TRANSACTIONS
SECURE DATA ENCRYPTION FOR ATM TRANSACTIONS
 
IRJET - A Survey Paper on Secure Digital Payment
IRJET -  	  A Survey Paper on Secure Digital PaymentIRJET -  	  A Survey Paper on Secure Digital Payment
IRJET - A Survey Paper on Secure Digital Payment
 
Effective Attendance Markingusing Face Recognition & RFID Tags
Effective Attendance Markingusing Face Recognition & RFID TagsEffective Attendance Markingusing Face Recognition & RFID Tags
Effective Attendance Markingusing Face Recognition & RFID Tags
 
IRJET - Anti-Fraud ATM Security System
IRJET  - Anti-Fraud ATM Security SystemIRJET  - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security System
 
IRJET- E-Gatepass System
IRJET- E-Gatepass SystemIRJET- E-Gatepass System
IRJET- E-Gatepass System
 
Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationTransactions Using Bio-Metric Authentication
Transactions Using Bio-Metric Authentication
 
A Research Paper on Credit Card Fraud Detection
A Research Paper on Credit Card Fraud DetectionA Research Paper on Credit Card Fraud Detection
A Research Paper on Credit Card Fraud Detection
 
IRJET - Customer Churn Analysis in Telecom Industry
IRJET - Customer Churn Analysis in Telecom IndustryIRJET - Customer Churn Analysis in Telecom Industry
IRJET - Customer Churn Analysis in Telecom Industry
 
Pradeepnsingh praveenkyadav-131008015758-phpapp02
Pradeepnsingh praveenkyadav-131008015758-phpapp02Pradeepnsingh praveenkyadav-131008015758-phpapp02
Pradeepnsingh praveenkyadav-131008015758-phpapp02
 
Pradeep n singh_praveenkyadav
Pradeep n singh_praveenkyadavPradeep n singh_praveenkyadav
Pradeep n singh_praveenkyadav
 
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsSurvey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
 
IRJET - A Joint Optimization Approach to Security and Insurance Managemen...
IRJET -  	  A Joint Optimization Approach to Security and Insurance Managemen...IRJET -  	  A Joint Optimization Approach to Security and Insurance Managemen...
IRJET - A Joint Optimization Approach to Security and Insurance Managemen...
 
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTP
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Implementing Oracle Utility-Meter Data Management For Power Consumption
Implementing Oracle Utility-Meter Data Management For Power ConsumptionImplementing Oracle Utility-Meter Data Management For Power Consumption
Implementing Oracle Utility-Meter Data Management For Power Consumption
 
IRJET- An Overview on Mobile Cloud Computing
IRJET-  	  An Overview on Mobile Cloud ComputingIRJET-  	  An Overview on Mobile Cloud Computing
IRJET- An Overview on Mobile Cloud Computing
 
IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...
IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...
IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...
 
IRJET - Service Base Application
IRJET - Service Base ApplicationIRJET - Service Base Application
IRJET - Service Base Application
 
SmartMeterPaper_csicc21.pdf
SmartMeterPaper_csicc21.pdfSmartMeterPaper_csicc21.pdf
SmartMeterPaper_csicc21.pdf
 
Internet of Things Based Central Monitoring System for ATM’s
Internet of Things Based Central Monitoring System for ATM’sInternet of Things Based Central Monitoring System for ATM’s
Internet of Things Based Central Monitoring System for ATM’s
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 

Recently uploaded (20)

Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 

Multi Bank Atm Family Card: Integration of Multi Bank Multiple User in Single Card with User Behavior Monitoring using Hmm & Formula Verification

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2391 Multi Bank ATM Family Card: INTEGRATION OF MULTI BANK MULTIPLE USER IN SINGLE CARD WITH USER BEHAVIOR MONITORING USING HMM & FORMULA VERIFICATION Mr .K.Sridharan Associate Professor Department of Information Technology Panimalar Engineering College K.G.Yuvaraaj K.C.Rahul S.Tamil Kanal S.D.Ashok Kumar Student Department of Information Technology Panimalar Engineering College ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract— The aim of this project is to use debit / credit card access for the purpose of customer’s money transactions in case of lack of money in a particular account. The multibank smart card is an application software designed to take advantage of today’stechnologyandreduce or avoid the time delay of amount transaction. This facilitates multi user to access his/her account with a single ATM card. User can create account and get the ATM card from the bank. He can integrate all his accounts in other banks in this single card with unique PIN number accordingly. User behavior is monitored through HMM Model and he can set up a formula based authentication. He can include all his family members accounts details also in the same card. He can withdraw cash from the account after successful authentication of the corresponding PIN number. Index terms—debit/credit card, money transactions, application software, ATM card, PIN number Introduction Information technology (IT) not only introduces convenience, but creates many new improvements which were impossible in the past. For example, advances of business intelligence (BI) methods and data mining techniques have brought huge improvements to modern business operations[10]. Nowadays, in the “big data era,” a massive amount of data is available for all kindsofindustrial applications. For example, the cloud service can be considered as a data warehouse which provides a useful source of data. Wireless sensor networks [e.g., radio frequency identification (RFID), near field communications] can be used to collect useful data ubiquitously. An evolving topic on the Internet of things (IoTs), which consists of devices capable of communicating via the Internet environment, also provides a platform for gathering an enormous amount of data. In other words, it is now easier to collect data than ever before. It is said that, extracting and utilizing useful information from such huge and dynamic databases for “big data” is far from easy. Since these data are linked to real-time events, they can be employed for rescheduling or replanning activities in business applications which finally reduces the level of risk and improves profitability and efficiency of the operations. This undoubtedly can supplement traditional optimization techniques, which are a priori in nature. For instance, Zhang et al. considered a dynamic workload scheduling problem with the help of big data stored in distributed cloudservices. They developed an evolutionary optimizationalgorithmand simulated the performance under different scenarios. In another study, Zhang et al. analyzed the cost minimization issue of moving data around geographically dispersed data. Such data migration problem is very important yet challenging as the volume of big data isgrowing quickly.Dou et al. Developed a service optimization model for handling big data stored in cloud systems when privacy is a critical concern (e.g., the medical data). Service quality may be compromised if a cloud server refuses to provide the data due to the privacy issue. Such optimization model can maximize the service quality and is verified by a simulation study. Another application of big data is on smart grids. Simmhan et al. predicted the demand of a cloud-basedsmart grid system and derived the optimal pricing strategy, based on the big data on real-time consumption. The approach is possible due to the data mining algorithm the authors developed. Owing to the importance of big data analytics for business applications, this paper is developed. With respect to the core topic on big data analytics for business operations and risk management, we organize this paper into three big sections, namely: 1) BI and data mining; 2) industrial systems reliability and security; and 3) business operational risk management (ORM). Each ofthesesections:
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2392 1) examines some carefully selected papers; 2) outlines the related research challenges; and 3) proposes the future research directions. To the best of our knowledge, this is the first paper in the literature which focuses on how big data analytics can be employed for reducing systems risk and enhancing efficiency in business operations. Assistive Technologies In this project HMM model is used for user behavior monitoring .This model is a statistical Markov model in which the system being modeled is assumed to be a Markov process with unobserved (hidden) states. An HMM can be presented as the simplest dynamic Bayesian network. In simpler Markov models (like a Markov chain), the state is directly visible to the observer, and therefore the state transition probabilities are the only parameters. In a hidden Markov model, the state is not directly visible, but the output, dependent on the state, isvisible.Eachstatehasa probability distribution over the possible output tokens. Therefore, the sequence of tokens generated by an HMM gives some information about the sequence of states. The adjective 'hidden' referstothestatesequencethrough which the model passes, not to the parameters of the model; the model is still referred to as a 'hidden' Markov model even if these parameters are known exactly. RFID smart card is used as an ATM card. Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tagsattachedtoobjects.The tags contain electronically stored information. Passive tags collect energy from a nearby RFID reader's interrogating radio waves. Active tags have a local power source such as a battery and may operate at hundreds of meters from the RFID reader. Unlike a barcode, the tag need not be within the line of sight of the reader, so it may be embedded in the tracked object. Scope The scope of this project is integration of RFID, IOT and Big Data. Multi User, Multi Account ATM Card is implemented. The user behavior is tracked using HMM Model and Formulae Authentication is implemented for Security. Easy and comfortable ATM Transaction with security. Multiple user bank accountscanbeidentifiedby the RBI. Existing System In the existing system, each user has separate ATM card for each bank transactions. During money withdrawal, the user needs to access bank account in which there is money. This becomes a tedious process.ThereisnoRFIDtechnology used in the existing system. V. ‘Multi Bank Family Card’ Principle Of Operation In the proposed system,integrationofBigData,Business analytical and RFID like technology is supposed to be recent trends in IT. It is most challenge oriented activity. In our project implementation, we are developing this application for a Banking sector particularly for a Debit / ATM card section. We use RFID smart card as ATM Card for transaction. User can create account and get the ATM card from the bank. He can integrate all his accounts in other banks in this single card with unique PIN number accordingly. User behavior is monitored through HMM Model and he can set up a formula based authentication. He can include all his family members’ accounts details also in the same card. He can withdraw cash from their accounts after successful authentication of the corresponding PIN numbers. The project workflow is as follows: firsttheuserwantsto create an account and then they are allowed to access the network. Once the user creates an account, they login into their account and request the job from the Service Provider. Based on the user’s request, the Service Provider will process the user requested job and respond to them. All the user details will be stored in the database of the Service Provider. In this project, we will design the User Interface Frame to communicate with the server through network coding using the programming Languages like Java. By sending the request to Server Provider, the user can access the requested data if they authenticated by the Service Provider. Bank Service Provider will contain information about the user in their Data Storage. The Bank Service provider will maintain the all the user information to authenticate when they want to login into their account. Using single card like credit and debit for entire family members. But maintain unique PIN numbers for different banks. We will provide a button add “Family card” in our user card. Now user can add his family members bank ATM details also along with pin number details. User can include like further bank account no, bank name, pin number same way for other family members also. Hidden Markovmodel is used for user behaviour analysis of cash withdrawal.Hidden Markov model is applied to understand user’s money withdrawal sequence which means first condition is total amount withdrawal in every month. Secondoneisfrequency of withdrawal of moneyusingcreditcard.Usercanwithdraw the cash as per money requirement and time frequency is also monitored & recorded. During registration of the card user has to give a formula for secured authenticationsystem user can also add multiple bank accounts in single card. In this project, we provide security by using formula like(A+B-
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2393 C) while registration. In this formula using alphabets and two operators like (+ and -). The formula is constant, but numbers will randomly change for every transaction.Useris not required to provide the formula at any time, user is only required to submit the answer after substitution of the corresponding values in their formula. This formula based authentication is required only when user tries to withdraw money beyond the permitted 10% extra and increases the withdrawal frequency. Once user is registered by specifying his master bank account details & formula for authentication. Now user can add his family card details also. VI. Architecture Diagram Figure.1. Architecture diagram of multi bank family card VII. Advantages  This system really awards multiple ATM card on rotation.  User can withdrawal cash fromonesingleATMcard from their family members account.  Hidden Markov model is used for user behavior analysis of cash withdrawal  Security is ensured by the implementation of formula based authentication  Big data is included in thesystemforanalyzinghuge volume of data. VIII. Dataflow Diagram Figure.2. User registration and withdrawal workflow Figure.3. User behavior analysis workflow Conclusion In this project, we have implemented to integration of multi bank multi user in single card with user behavior monitoring using hmm & formula verification. The new system helps them to do user can create account and get the RFID smartcard. Then user can add the beneficiary orfamily members and he can integrate all beneficiary bank account details. Also other banks can be integrated in thissinglecard with unique PIN numbers accordingly. Every user can withdraw amount from the unique pin number. Authorized user can only get an authentication formula to the particular account. User behavior is monitored based on every user’s money withdrawal sequence, which means first condition is every month user can withdraw a limited amount. Second
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2394 one is Frequency of withdrawal of money using credit card. User can withdraw the cash as per limited money requirement and time frequency is also monitored & recorded. it is very useful for withdraw amount in without time delay. References [1] N. Manwani and P. S. Sastry, “Noise tolerance under risk minimization,” IEEE Trans. Cybern., vol. 43, no. 3, pp. 1146– 1151,Jun. 2013. [2] H. K. Chan and F. T. S. Chan, “Early order completion contract approach to minimize the impact of demand uncertainty on supply chains,” IEEETrans. Ind. Informat.,vol. 2, no. 1, pp. 48–58, Feb. 2006. [3] G. M. Gaukler, “Item-level RFID in a retail supply chain with stockout- based substitution,” IEEE Trans. Ind. Informat., vol. 7, no. 2,pp. 362–370, May 2011. [4] K. Govindan, A. Jafarian, M. E. Azbari, and T.-M. Choi, “Optimal bi-objective redundancy allocation for systems reliability and risk management,” IEEE Trans. Cybern., to be published. [5] B. Shen, T.-M. Choi, Y. Wang, and C. K. Y. Lo, “The coordination of fashion supply chains with a risk-averse supplier under the markdown money policy,” IEEE Trans. Syst., Man, Cybern., Syst., vol. 43, no. 2,pp. 266–276, Mar. 2013. [6] H. M. Markowitz, Portfolio Selection: Efficient Diversification of Investment. New York, NY, USA: Wiley, 1959. [7] D. D. Wu and D. Olson, “Enterprise risk management: A DEA VaR approach in vendor selection,” Int. J. Prod. Res., vol. 48, no. 16,pp. 4919–4932, 2010. [8] D. D. Wu and D. Olson, “Enterprise risk management: Coping with model risk in a large bank,” J. Oper. Res. Soc., vol. 61, no. 2,pp. 179–190, 2010. [9] D. L. Olson and D. D. Wu, “Risk management models for supply chain:A scenario analysis of outsourcing to China,” Supply Chain Manag. Int. J., vol. 16, no. 6, pp. 401–408, 2011. [10] Recent Development in Big Data Analytics for Business Operations and Risk Management Tsan-Ming Choi,Member, IEEE, Hing Kai Chan, Senior Member,IEEE,andXiaohang Yue vol. 47, No. 1, Jan 2017 .