SlideShare a Scribd company logo
International Journal of Research in Engineering and Science (IJRES)
ISSN (Online): 2320-9364, ISSN (Print): 2320-9356
www.ijres.org Volume 3 Issue 4 ǁ April. 2015 ǁ PP.10-15
www.ijres.org 10 | Page
SMS hashing system (Real-Time) for the reliability of financial
transactions
*Eshwar Kumar Reddy Chyagari, **Akhil Reddy Laxmanagari
Graduate Student, Cleveland State University
Graduate Student, Cleveland State University
Abstract-The sole reason to go with this project is to increase the security for the people using ATM. Once the
card and password related to it is stolen it might be a huge loss to the card holder, so to rectify this problem we
are implementing this project. Now a day’s using the ATM (Automated Teller Machine) which provide
customers with the convenient banknote trading is very common. In the recent times the cases regarding the
illegal transactions has shown a considerable increase. How to carry on the valid identity to the customer
becomes the focus in current financial circle. Traditional ATM systems authenticate generally by using the
credit card and the password, the method has some defects. In recent years, the algorithm of fingerprint
recognition has been continuously updated, which has offered new verification means for us. The original
password authentication method combined with the biometric identification technology verify the clients’
identity better and achieve the purpose that use of ATM machines improve the safety effectively.
Keywords-ATM terminal; ARM9; fingerprint recognition; Gabor filtering.
I. INTRODUCTION
With the development of computer network technology and e-commerce, the self-service banking system
has got extensive popularization with the characteristic offering high-quality 24hours service for customer.
Nowadays, using the ATM (Automatic Teller Machine) which provides customers with the convenient banknote
trading is very common. However, the financial crime cases rises repeatedly in recent years, a lot of criminals
tamper with the ATM terminal and steal user's credit card and password by illegal means. Once user's bank card
is lost and the password is stolen, the criminal will draw all cash in the shortest time, which will bring enormous
financial losses to customer. How to carry on the valid identity to the customer becomes the focus in current
financial circle.
Traditional ATM systems authenticate generally by using the credit card and the password, the method has
some defects. Using credit card and password cannot verify the client's identity exactly. In recent years, the
algorithm that the fingerprint recognition continuously updated, which has offered new verification means for
us, the original password authentication method combined with the biometric identification technology verify
the clients' identity better and achieve the purpose that use of ATM machines improve the safety effectively.
II. THE CHARACTERISTICS OF THE SYSTEM DESIGN
The embedded ATM client authentication system is based on fingerprint recognition which is designed
after analysed existed ATM system. The S3C2440 chip is used as the core of these embedded systems which is
associated with the technologies of fingerprint recognition and current high- speed network communication. The
primary functions are shown as follows:
Fingerprint recognition: The masters' fingerprint information was used as the standards of identification. It
must certify the feature of the human fingerprint before using ATM system.
Remote authentication: System can compare current Client’s fingerprint information with remote Finger print
data server.
Telephone alarming: Once an exception happens, such as log in as the fake identity, the system will start the
phone alarm to inform client and bank staff as soon as possible.
Message alarming: The message can be send to the relevant staff’s mobile phone without any noise, in order to
carry on emergency processing.
Police network connection: The system can call the police via the police network.
Two discriminant analysis methods: Besides the fingerprint recognition, the mode of password
SMS hashing system (Real-Time) for the reliability of financial transactions
www.ijres.org 11 | Page
recognitioncan be also used for the system.
III. HARDWARE & SOFTWARE DESIGN
The design of entire system consisted of two part which are hardware and software. The hardware are
designed by the rules of embedded system, and the steps of software consisted of three parts. The more details
are shown as follows.
A. Hardware Design
The S3C2440 chip is used as the core of entire hardware. Furthermore, the modules of LCD, keyboard,
alarm, fingerprint recognition are connected with the main chip (S3C2440).The SRAM and FLASH are also
embodied in the system. There are some modules consisted of the system as follows:
•
LCD module: The OMAP5910 is used in this module as a LCD controller, it supported 1024*1024 image
of 15 grey-scale or 3375 colours.
•
Keyboard module: It can be used for inputting passwords.
•
Alarming module: TC35i alarming module is based on GSM technology implement which can call the
credit card owner and send message to relevant staffs without any sound.
•
SRAM and FLASH: The 16-bit 29LV160BB-70REC of FLASH chip and the 32-bit HY57V561620CT-6
of SRAM chip are connected with the main chip. Their functions are storing the running code, the
information of fingerprint and the algorithm. Fingerprint recognition module: Atmel Company's
AT77CI04B be used as a fingerprint recognition. It has a 500dpi resolution, anti-press, anti-static, anti-
corrosion.
•
Ethernet switch controller: RTL8308B can provides eight 10/1 00 Mbps RMII Ethernet ports, which can
Connect police network and remote fingerprint data server.
Before using the ATM terminal, the client's fingerprint feature will be connected to the remote fingerprint
data server to match fingerprint data with the master's, if the result isn't correct, the system will call police
automatically and send alarm to the credit card owner. The block diagram of hardware design is shown in figure
1.
Figure 1: Block diagram of Hardware
Software design
The design of software is very important for this embedded system the design was component of three parts
including the design of main program flow chart, the initializing once and algorithm of fingerprint recognition
of flow chart.
SMS hashing system (Real-Time) for the reliability of financial transactions
www.ijres.org 12 | Page
This system of software is implemented by the steps as follows: first of all, the Linux kernel and the file
system loaded into the main chip. The next, the system is initialized to implement specific task, such as
checking ATM system, GSM commutation and so on, and then each module reset for ready to run commend.
Before using ATM terminal, the password and finger print is required. First need to enter owner’s
password, if password is successful then the system is required the owner’s fingerprint. If all the recognition is
right the system would enter into the waiting status. In addition, the number of time that recognition of
fingerprint and password are restricted to 3.1 for more than 3 times, the system will call police through police
network, telephone to the owner and send message to relevant staff. Then locked the owner’s credit card. The
overall flow chart of software is shown in figure 2.
Figure 2. The overall flow chart of software
In the process of inputting fingerprint, the AT77CI04B which is a linear sensor that captures fingerprint
images by sweeping the finger over the sensing area, will used for acquiring the image of fingerprint. These
products embed true hardware based 8-way navigation and click functions. The Fingerprint information will be
temporarily stored in SRAM and upload to the remote finger data server to compare through bank network. The
result of process will be controlled by main chip (S3C2440).
The initializing process means that set the hardware and software and then start the multiple mission
module, each module will be started according to the priority processes. At first, initialize the system clock, and
execute the codes of open interrupt and the open interrupt task. Then, the system would judge and enter process
of module finally, the system would start to attempt multiple tasks. The initializing flowchart is shown in
figure 3.
C. The design of fingerprint recognition algorithm
The design of algorithm based on fingerprint recognition is so vital for the whole system. We would
approach two steps to process the images of fingerprint.
SMS hashing system (Real-Time) for the reliability of financial transactions
www.ijres.org 13 | Page
Figure 3: Flow chart of fingerprint recognition
1) The detail of fingerprint recognition process:
The first step was the acquisition of fingerprint image by above device mentioned in the algorithm, and the
results could be sent to the following process.
Secondly, pre-processing the images acquired. After obtain the fingerprint image, it must be pre-
processing. Generally, pre-processing of ones is filtering, histogram computing, image enhancement and image
binarization.
Lastly, the characteristic value was extracted, and the results of the above measures would be compared
with the information of owner's fingerprint in the database so as to verify whether the character is matched, and
then the system returned the results matched or not.
2) The design of fingerprint image enhancement:
Fingerprint recognition module is an extremely important part of the system, the high-quality images was
the major factors of influencing the performance in the system. There is a lot of noise in fingerprint image, the
image enhancement was the precondition for recognition of fingerprint characteristics. The algorithm of
fingerprint recognition based on the algorithm of Gabor and direction filter was used. Finger print enhancement
algorithm based on Gabor filter could be better to remove noise, strengthen the definition between the ridge and
valley, it could significantly improve the image enhancement processing capacity, but this algorithm was slow
in dealing with the high capacity requirements. Fingerprint enhancement algorithm based on direction filter has
a faster processing capabilities, but it was not good to handing the large noise areas. so combination of these two
algorithms could obtain better effects. The algorithm based on direction filter was used in the clear area, and
based on Gabor filter was used in the recoverable region.
a) The Gabor filter algorithms
For each point, according to its frequency, direction, using formula(l) calculate the Gabor filter coefficients,
calculate the filter values of each point and then ,move to the next point, repeat the process above.
SMS hashing system (Real-Time) for the reliability of financial transactions
www.ijres.org 14 | Page
G(u, v) is normalized after the fingerprint image, g (u, v) as a template filter coefficient.
Proposed image block average M, the calculation using image block average gray level range, if the mean
was small, the variance was small, that is not to restore area; if the mean moderate, have a great variance, the
smaller the ratio of mean and variance, it could be regard as the clear area; if the mean moderate, variance and
they were smaller than the ratio of non-recovery area, it could be regard as confusion region. Image block
average calculated as follows: The fingerprint image was divided into w x w area, using equation (5), (6) in
each of a gray-scale mean and variance, And the statistics is greater than the number of M ,marked as m and
less than the number of M , markedas n.
IV. CONCLUSION
The design of ATM terminal system based on fingerprint recognition took advantages of the stability and
reliability of fingerprint characteristics, a new biological technology based on the image enhancement algorithm
of Gabor and direction filter. Additional, the system also contains the original verifying methods which were
inputting owner's password. The security features were enhanced largely for the stability and reliability of owner
recognition. The whole system was built on the technology of embedded system & Computer network which
makes the system more safe, reliable and easy to use.
SMS hashing system (Real-Time) for the reliability of financial transactions
www.ijres.org 15 | Page
REFERENCES
[1] Lin Hong, Wan Yifei, Anil Jain. Fingerprint image enhancement: algorithm and performance evaluation [J]. IEEE Transactions
on Pattern Analysis and Machine intelligence. 1998, 20(8): 777-789.
[2] ESaatci, V Tavsanogh. Fingerprint image enhancement using CNN gabor-Cpe filter[C]. Proceedings of the 7th IEEE
International Workshop on Cellular Neural Networks and their Applications 2002: 377-382.
[3] Gu J, Zhou J, Zhang D.A combination model for orientation field of fingerprints. Pattern Recognition, 2004, 37: 543-553.
[4] Cheng J, Tian J. Fingerprint enhancement with dyadic scale-space. Pattern Recognition Letters, 2004, 25(11): 1273-1284.
[5] Chen H, Tian J. A fingerprint matching algorithm with registration pattern inspection. Journal of Software, 2005, 16(6): 1046-
105.
[6] Smits G FJordaan E M.Improved SVMRegression using Mixtures of Kernels [A]. Proceedings of the 2002 International Joint
Conferenceon Neural Networks [C]. Hawaii: IEEE. 2002. 2785-2.
[7] FU Zhenghua, LI Yongjun, Tian Mi(2007). "The embedded monitoring system based ARM". JOURNAL OF 7INSTRUMENT
TECHNOLOGY, Vol. 07, No. Ipp. 01-2.
[8] Jun Zhou, Guangda Sua, Chun hongJiang. A face and fingerprint identity authentication system based on multi-route detection.
Neurocomputing 70 (2007)922-931.

More Related Content

What's hot

Atm security
Atm securityAtm security
Atm security
Pushkar Dutt
 
Project Synopsis
Project SynopsisProject Synopsis
Project Synopsis
Paras Garg
 
FINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEMFINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEM
Journal For Research
 
Fingerprint based transaction system
Fingerprint based transaction systemFingerprint based transaction system
Fingerprint based transaction system
sagar solanky
 
Atm with an eye
Atm with an eyeAtm with an eye
Atm with an eye
Mohammad Azhar
 
Fingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication SystemFingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication System
International Journal of Engineering Inventions www.ijeijournal.com
 
ATM Frauds and Solutions
ATM Frauds and SolutionsATM Frauds and Solutions
ATM Frauds and Solutions
Clarice_Wilson
 
IRJET- A Survey on Cardless Automated Teller Machine(ATM)
IRJET- A Survey on Cardless Automated Teller Machine(ATM)IRJET- A Survey on Cardless Automated Teller Machine(ATM)
IRJET- A Survey on Cardless Automated Teller Machine(ATM)
IRJET Journal
 
Finger Vein Based Licensing And Authentication Scheme Using GSM
Finger Vein Based Licensing And Authentication Scheme Using GSMFinger Vein Based Licensing And Authentication Scheme Using GSM
Finger Vein Based Licensing And Authentication Scheme Using GSM
IOSR Journals
 
IRJET- Security for Building & ATM Machine
IRJET- Security for Building & ATM MachineIRJET- Security for Building & ATM Machine
IRJET- Security for Building & ATM Machine
IRJET Journal
 
ATM for visually challenged people
ATM for visually challenged peopleATM for visually challenged people
ATM for visually challenged people
IRJET Journal
 
project_report
project_reportproject_report
project_report
Ejaz Navas
 
IRJET- High Security System for Money Carrying VAN to ATM’S
IRJET- High Security System for Money Carrying VAN to ATM’SIRJET- High Security System for Money Carrying VAN to ATM’S
IRJET- High Security System for Money Carrying VAN to ATM’S
IRJET Journal
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eye
John Williams
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technology
Alfred Oboi
 
IRJET- Secured Merchant Payment using Biometric Transaction
IRJET-  	  Secured Merchant Payment using Biometric TransactionIRJET-  	  Secured Merchant Payment using Biometric Transaction
IRJET- Secured Merchant Payment using Biometric Transaction
IRJET Journal
 
ATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSMATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSM
Alpesh Kurhade
 
Best practice for_physical_atm_security
Best practice for_physical_atm_securityBest practice for_physical_atm_security
Best practice for_physical_atm_security
billhien
 
Tounchpoint VAS Linkin
Tounchpoint VAS LinkinTounchpoint VAS Linkin
Tounchpoint VAS Linkin
Muhammad Ehrar Hussain
 
Atm (bm)
Atm (bm)Atm (bm)
Atm (bm)
Neha Patel
 

What's hot (20)

Atm security
Atm securityAtm security
Atm security
 
Project Synopsis
Project SynopsisProject Synopsis
Project Synopsis
 
FINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEMFINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEM
 
Fingerprint based transaction system
Fingerprint based transaction systemFingerprint based transaction system
Fingerprint based transaction system
 
Atm with an eye
Atm with an eyeAtm with an eye
Atm with an eye
 
Fingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication SystemFingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication System
 
ATM Frauds and Solutions
ATM Frauds and SolutionsATM Frauds and Solutions
ATM Frauds and Solutions
 
IRJET- A Survey on Cardless Automated Teller Machine(ATM)
IRJET- A Survey on Cardless Automated Teller Machine(ATM)IRJET- A Survey on Cardless Automated Teller Machine(ATM)
IRJET- A Survey on Cardless Automated Teller Machine(ATM)
 
Finger Vein Based Licensing And Authentication Scheme Using GSM
Finger Vein Based Licensing And Authentication Scheme Using GSMFinger Vein Based Licensing And Authentication Scheme Using GSM
Finger Vein Based Licensing And Authentication Scheme Using GSM
 
IRJET- Security for Building & ATM Machine
IRJET- Security for Building & ATM MachineIRJET- Security for Building & ATM Machine
IRJET- Security for Building & ATM Machine
 
ATM for visually challenged people
ATM for visually challenged peopleATM for visually challenged people
ATM for visually challenged people
 
project_report
project_reportproject_report
project_report
 
IRJET- High Security System for Money Carrying VAN to ATM’S
IRJET- High Security System for Money Carrying VAN to ATM’SIRJET- High Security System for Money Carrying VAN to ATM’S
IRJET- High Security System for Money Carrying VAN to ATM’S
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eye
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technology
 
IRJET- Secured Merchant Payment using Biometric Transaction
IRJET-  	  Secured Merchant Payment using Biometric TransactionIRJET-  	  Secured Merchant Payment using Biometric Transaction
IRJET- Secured Merchant Payment using Biometric Transaction
 
ATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSMATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSM
 
Best practice for_physical_atm_security
Best practice for_physical_atm_securityBest practice for_physical_atm_security
Best practice for_physical_atm_security
 
Tounchpoint VAS Linkin
Tounchpoint VAS LinkinTounchpoint VAS Linkin
Tounchpoint VAS Linkin
 
Atm (bm)
Atm (bm)Atm (bm)
Atm (bm)
 

Similar to SMS hashing system (Real-Time) for the reliability of financial transactions

Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
IRJET Journal
 
Biometric ATM2.docx
Biometric ATM2.docxBiometric ATM2.docx
Biometric ATM2.docx
KanchanRaut13
 
Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationTransactions Using Bio-Metric Authentication
Transactions Using Bio-Metric Authentication
IRJET Journal
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
IJRTEMJOURNAL
 
Atm
AtmAtm
Third Generation Automatic Teller Machine
Third Generation Automatic Teller MachineThird Generation Automatic Teller Machine
Third Generation Automatic Teller Machine
ijsrd.com
 
ATM Banking
ATM BankingATM Banking
ATM Banking
Arnav Sameer
 
IRJET - Anti-Fraud ATM Security System
IRJET  - Anti-Fraud ATM Security SystemIRJET  - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security System
IRJET Journal
 
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMBIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
IRJET Journal
 
IRJET- Face Recognition System with HOG in ATMS
IRJET- Face Recognition System with HOG in ATMSIRJET- Face Recognition System with HOG in ATMS
IRJET- Face Recognition System with HOG in ATMS
IRJET Journal
 
Secure E-Banking Using Bioinformatics
Secure E-Banking Using BioinformaticsSecure E-Banking Using Bioinformatics
Secure E-Banking Using Bioinformatics
ijtsrd
 
ATM (1)
ATM (1)ATM (1)
ATM (1)
Kirthika C
 
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
IRJET Journal
 
IRJET- Guarded Remittance System Employing WANET for Catastrophe Region
IRJET-  	  Guarded Remittance System Employing WANET for Catastrophe RegionIRJET-  	  Guarded Remittance System Employing WANET for Catastrophe Region
IRJET- Guarded Remittance System Employing WANET for Catastrophe Region
IRJET Journal
 
IRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATMIRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATM
IJTET Journal
 
Document Atm machine using c language mini project.pdf
Document  Atm machine using c language mini project.pdfDocument  Atm machine using c language mini project.pdf
Document Atm machine using c language mini project.pdf
NEERAJRAJPUT81
 
S0102297102
S0102297102S0102297102
S0102297102
IOSR Journals
 
python pre-submission report.pdf
python pre-submission report.pdfpython pre-submission report.pdf
python pre-submission report.pdf
SruthiMugle
 
IRJET-An Interline Dynamic Voltage Restorer (IDVR)
IRJET-An Interline Dynamic Voltage Restorer (IDVR)IRJET-An Interline Dynamic Voltage Restorer (IDVR)
IRJET-An Interline Dynamic Voltage Restorer (IDVR)
IRJET Journal
 
87559489 auth
87559489 auth87559489 auth
87559489 auth
homeworkping4
 

Similar to SMS hashing system (Real-Time) for the reliability of financial transactions (20)

Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
 
Biometric ATM2.docx
Biometric ATM2.docxBiometric ATM2.docx
Biometric ATM2.docx
 
Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationTransactions Using Bio-Metric Authentication
Transactions Using Bio-Metric Authentication
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
 
Atm
AtmAtm
Atm
 
Third Generation Automatic Teller Machine
Third Generation Automatic Teller MachineThird Generation Automatic Teller Machine
Third Generation Automatic Teller Machine
 
ATM Banking
ATM BankingATM Banking
ATM Banking
 
IRJET - Anti-Fraud ATM Security System
IRJET  - Anti-Fraud ATM Security SystemIRJET  - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security System
 
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMBIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
 
IRJET- Face Recognition System with HOG in ATMS
IRJET- Face Recognition System with HOG in ATMSIRJET- Face Recognition System with HOG in ATMS
IRJET- Face Recognition System with HOG in ATMS
 
Secure E-Banking Using Bioinformatics
Secure E-Banking Using BioinformaticsSecure E-Banking Using Bioinformatics
Secure E-Banking Using Bioinformatics
 
ATM (1)
ATM (1)ATM (1)
ATM (1)
 
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
 
IRJET- Guarded Remittance System Employing WANET for Catastrophe Region
IRJET-  	  Guarded Remittance System Employing WANET for Catastrophe RegionIRJET-  	  Guarded Remittance System Employing WANET for Catastrophe Region
IRJET- Guarded Remittance System Employing WANET for Catastrophe Region
 
IRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATMIRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATM
 
Document Atm machine using c language mini project.pdf
Document  Atm machine using c language mini project.pdfDocument  Atm machine using c language mini project.pdf
Document Atm machine using c language mini project.pdf
 
S0102297102
S0102297102S0102297102
S0102297102
 
python pre-submission report.pdf
python pre-submission report.pdfpython pre-submission report.pdf
python pre-submission report.pdf
 
IRJET-An Interline Dynamic Voltage Restorer (IDVR)
IRJET-An Interline Dynamic Voltage Restorer (IDVR)IRJET-An Interline Dynamic Voltage Restorer (IDVR)
IRJET-An Interline Dynamic Voltage Restorer (IDVR)
 
87559489 auth
87559489 auth87559489 auth
87559489 auth
 

More from IJRES Journal

Exploratory study on the use of crushed cockle shell as partial sand replacem...
Exploratory study on the use of crushed cockle shell as partial sand replacem...Exploratory study on the use of crushed cockle shell as partial sand replacem...
Exploratory study on the use of crushed cockle shell as partial sand replacem...
IJRES Journal
 
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
IJRES Journal
 
Review: Nonlinear Techniques for Analysis of Heart Rate Variability
Review: Nonlinear Techniques for Analysis of Heart Rate VariabilityReview: Nonlinear Techniques for Analysis of Heart Rate Variability
Review: Nonlinear Techniques for Analysis of Heart Rate Variability
IJRES Journal
 
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
IJRES Journal
 
Study and evaluation for different types of Sudanese crude oil properties
Study and evaluation for different types of Sudanese crude oil propertiesStudy and evaluation for different types of Sudanese crude oil properties
Study and evaluation for different types of Sudanese crude oil properties
IJRES Journal
 
A Short Report on Different Wavelets and Their Structures
A Short Report on Different Wavelets and Their StructuresA Short Report on Different Wavelets and Their Structures
A Short Report on Different Wavelets and Their Structures
IJRES Journal
 
A Case Study on Academic Services Application Using Agile Methodology for Mob...
A Case Study on Academic Services Application Using Agile Methodology for Mob...A Case Study on Academic Services Application Using Agile Methodology for Mob...
A Case Study on Academic Services Application Using Agile Methodology for Mob...
IJRES Journal
 
Wear Analysis on Cylindrical Cam with Flexible Rod
Wear Analysis on Cylindrical Cam with Flexible RodWear Analysis on Cylindrical Cam with Flexible Rod
Wear Analysis on Cylindrical Cam with Flexible Rod
IJRES Journal
 
DDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and DetectionDDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and Detection
IJRES Journal
 
An improved fading Kalman filter in the application of BDS dynamic positioning
An improved fading Kalman filter in the application of BDS dynamic positioningAn improved fading Kalman filter in the application of BDS dynamic positioning
An improved fading Kalman filter in the application of BDS dynamic positioning
IJRES Journal
 
Positioning Error Analysis and Compensation of Differential Precision Workbench
Positioning Error Analysis and Compensation of Differential Precision WorkbenchPositioning Error Analysis and Compensation of Differential Precision Workbench
Positioning Error Analysis and Compensation of Differential Precision Workbench
IJRES Journal
 
Status of Heavy metal pollution in Mithi river: Then and Now
Status of Heavy metal pollution in Mithi river: Then and NowStatus of Heavy metal pollution in Mithi river: Then and Now
Status of Heavy metal pollution in Mithi river: Then and Now
IJRES Journal
 
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
IJRES Journal
 
Experimental study on critical closing pressure of mudstone fractured reservoirs
Experimental study on critical closing pressure of mudstone fractured reservoirsExperimental study on critical closing pressure of mudstone fractured reservoirs
Experimental study on critical closing pressure of mudstone fractured reservoirs
IJRES Journal
 
Correlation Analysis of Tool Wear and Cutting Sound Signal
Correlation Analysis of Tool Wear and Cutting Sound SignalCorrelation Analysis of Tool Wear and Cutting Sound Signal
Correlation Analysis of Tool Wear and Cutting Sound Signal
IJRES Journal
 
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
IJRES Journal
 
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
IJRES Journal
 
A novel high-precision curvature-compensated CMOS bandgap reference without u...
A novel high-precision curvature-compensated CMOS bandgap reference without u...A novel high-precision curvature-compensated CMOS bandgap reference without u...
A novel high-precision curvature-compensated CMOS bandgap reference without u...
IJRES Journal
 
Structural aspect on carbon dioxide capture in nanotubes
Structural aspect on carbon dioxide capture in nanotubesStructural aspect on carbon dioxide capture in nanotubes
Structural aspect on carbon dioxide capture in nanotubes
IJRES Journal
 
Thesummaryabout fuzzy control parameters selected based on brake driver inten...
Thesummaryabout fuzzy control parameters selected based on brake driver inten...Thesummaryabout fuzzy control parameters selected based on brake driver inten...
Thesummaryabout fuzzy control parameters selected based on brake driver inten...
IJRES Journal
 

More from IJRES Journal (20)

Exploratory study on the use of crushed cockle shell as partial sand replacem...
Exploratory study on the use of crushed cockle shell as partial sand replacem...Exploratory study on the use of crushed cockle shell as partial sand replacem...
Exploratory study on the use of crushed cockle shell as partial sand replacem...
 
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
 
Review: Nonlinear Techniques for Analysis of Heart Rate Variability
Review: Nonlinear Techniques for Analysis of Heart Rate VariabilityReview: Nonlinear Techniques for Analysis of Heart Rate Variability
Review: Nonlinear Techniques for Analysis of Heart Rate Variability
 
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
 
Study and evaluation for different types of Sudanese crude oil properties
Study and evaluation for different types of Sudanese crude oil propertiesStudy and evaluation for different types of Sudanese crude oil properties
Study and evaluation for different types of Sudanese crude oil properties
 
A Short Report on Different Wavelets and Their Structures
A Short Report on Different Wavelets and Their StructuresA Short Report on Different Wavelets and Their Structures
A Short Report on Different Wavelets and Their Structures
 
A Case Study on Academic Services Application Using Agile Methodology for Mob...
A Case Study on Academic Services Application Using Agile Methodology for Mob...A Case Study on Academic Services Application Using Agile Methodology for Mob...
A Case Study on Academic Services Application Using Agile Methodology for Mob...
 
Wear Analysis on Cylindrical Cam with Flexible Rod
Wear Analysis on Cylindrical Cam with Flexible RodWear Analysis on Cylindrical Cam with Flexible Rod
Wear Analysis on Cylindrical Cam with Flexible Rod
 
DDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and DetectionDDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and Detection
 
An improved fading Kalman filter in the application of BDS dynamic positioning
An improved fading Kalman filter in the application of BDS dynamic positioningAn improved fading Kalman filter in the application of BDS dynamic positioning
An improved fading Kalman filter in the application of BDS dynamic positioning
 
Positioning Error Analysis and Compensation of Differential Precision Workbench
Positioning Error Analysis and Compensation of Differential Precision WorkbenchPositioning Error Analysis and Compensation of Differential Precision Workbench
Positioning Error Analysis and Compensation of Differential Precision Workbench
 
Status of Heavy metal pollution in Mithi river: Then and Now
Status of Heavy metal pollution in Mithi river: Then and NowStatus of Heavy metal pollution in Mithi river: Then and Now
Status of Heavy metal pollution in Mithi river: Then and Now
 
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
 
Experimental study on critical closing pressure of mudstone fractured reservoirs
Experimental study on critical closing pressure of mudstone fractured reservoirsExperimental study on critical closing pressure of mudstone fractured reservoirs
Experimental study on critical closing pressure of mudstone fractured reservoirs
 
Correlation Analysis of Tool Wear and Cutting Sound Signal
Correlation Analysis of Tool Wear and Cutting Sound SignalCorrelation Analysis of Tool Wear and Cutting Sound Signal
Correlation Analysis of Tool Wear and Cutting Sound Signal
 
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
 
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
 
A novel high-precision curvature-compensated CMOS bandgap reference without u...
A novel high-precision curvature-compensated CMOS bandgap reference without u...A novel high-precision curvature-compensated CMOS bandgap reference without u...
A novel high-precision curvature-compensated CMOS bandgap reference without u...
 
Structural aspect on carbon dioxide capture in nanotubes
Structural aspect on carbon dioxide capture in nanotubesStructural aspect on carbon dioxide capture in nanotubes
Structural aspect on carbon dioxide capture in nanotubes
 
Thesummaryabout fuzzy control parameters selected based on brake driver inten...
Thesummaryabout fuzzy control parameters selected based on brake driver inten...Thesummaryabout fuzzy control parameters selected based on brake driver inten...
Thesummaryabout fuzzy control parameters selected based on brake driver inten...
 

Recently uploaded

Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
aryanpankaj78
 
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
ijseajournal
 
5G Radio Network Througput Problem Analysis HCIA.pdf
5G Radio Network Througput Problem Analysis HCIA.pdf5G Radio Network Througput Problem Analysis HCIA.pdf
5G Radio Network Througput Problem Analysis HCIA.pdf
AlvianRamadhani5
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
shadow0702a
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
Gino153088
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
ecqow
 
smart pill dispenser is designed to improve medication adherence and safety f...
smart pill dispenser is designed to improve medication adherence and safety f...smart pill dispenser is designed to improve medication adherence and safety f...
smart pill dispenser is designed to improve medication adherence and safety f...
um7474492
 
Generative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdfGenerative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdf
mahaffeycheryld
 
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICSUNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
vmspraneeth
 
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
sydezfe
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
nedcocy
 
Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
Prakhyath Rai
 
Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
PreethaV16
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
VANDANAMOHANGOUDA
 
OOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming languageOOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming language
PreethaV16
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
uqyfuc
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
Roger Rozario
 
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
upoux
 
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Transcat
 

Recently uploaded (20)

Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
 
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
 
5G Radio Network Througput Problem Analysis HCIA.pdf
5G Radio Network Througput Problem Analysis HCIA.pdf5G Radio Network Througput Problem Analysis HCIA.pdf
5G Radio Network Througput Problem Analysis HCIA.pdf
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
 
smart pill dispenser is designed to improve medication adherence and safety f...
smart pill dispenser is designed to improve medication adherence and safety f...smart pill dispenser is designed to improve medication adherence and safety f...
smart pill dispenser is designed to improve medication adherence and safety f...
 
Generative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdfGenerative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdf
 
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICSUNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
 
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
 
Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
 
Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
 
OOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming languageOOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming language
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
 
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
 
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
 

SMS hashing system (Real-Time) for the reliability of financial transactions

  • 1. International Journal of Research in Engineering and Science (IJRES) ISSN (Online): 2320-9364, ISSN (Print): 2320-9356 www.ijres.org Volume 3 Issue 4 ǁ April. 2015 ǁ PP.10-15 www.ijres.org 10 | Page SMS hashing system (Real-Time) for the reliability of financial transactions *Eshwar Kumar Reddy Chyagari, **Akhil Reddy Laxmanagari Graduate Student, Cleveland State University Graduate Student, Cleveland State University Abstract-The sole reason to go with this project is to increase the security for the people using ATM. Once the card and password related to it is stolen it might be a huge loss to the card holder, so to rectify this problem we are implementing this project. Now a day’s using the ATM (Automated Teller Machine) which provide customers with the convenient banknote trading is very common. In the recent times the cases regarding the illegal transactions has shown a considerable increase. How to carry on the valid identity to the customer becomes the focus in current financial circle. Traditional ATM systems authenticate generally by using the credit card and the password, the method has some defects. In recent years, the algorithm of fingerprint recognition has been continuously updated, which has offered new verification means for us. The original password authentication method combined with the biometric identification technology verify the clients’ identity better and achieve the purpose that use of ATM machines improve the safety effectively. Keywords-ATM terminal; ARM9; fingerprint recognition; Gabor filtering. I. INTRODUCTION With the development of computer network technology and e-commerce, the self-service banking system has got extensive popularization with the characteristic offering high-quality 24hours service for customer. Nowadays, using the ATM (Automatic Teller Machine) which provides customers with the convenient banknote trading is very common. However, the financial crime cases rises repeatedly in recent years, a lot of criminals tamper with the ATM terminal and steal user's credit card and password by illegal means. Once user's bank card is lost and the password is stolen, the criminal will draw all cash in the shortest time, which will bring enormous financial losses to customer. How to carry on the valid identity to the customer becomes the focus in current financial circle. Traditional ATM systems authenticate generally by using the credit card and the password, the method has some defects. Using credit card and password cannot verify the client's identity exactly. In recent years, the algorithm that the fingerprint recognition continuously updated, which has offered new verification means for us, the original password authentication method combined with the biometric identification technology verify the clients' identity better and achieve the purpose that use of ATM machines improve the safety effectively. II. THE CHARACTERISTICS OF THE SYSTEM DESIGN The embedded ATM client authentication system is based on fingerprint recognition which is designed after analysed existed ATM system. The S3C2440 chip is used as the core of these embedded systems which is associated with the technologies of fingerprint recognition and current high- speed network communication. The primary functions are shown as follows: Fingerprint recognition: The masters' fingerprint information was used as the standards of identification. It must certify the feature of the human fingerprint before using ATM system. Remote authentication: System can compare current Client’s fingerprint information with remote Finger print data server. Telephone alarming: Once an exception happens, such as log in as the fake identity, the system will start the phone alarm to inform client and bank staff as soon as possible. Message alarming: The message can be send to the relevant staff’s mobile phone without any noise, in order to carry on emergency processing. Police network connection: The system can call the police via the police network. Two discriminant analysis methods: Besides the fingerprint recognition, the mode of password
  • 2. SMS hashing system (Real-Time) for the reliability of financial transactions www.ijres.org 11 | Page recognitioncan be also used for the system. III. HARDWARE & SOFTWARE DESIGN The design of entire system consisted of two part which are hardware and software. The hardware are designed by the rules of embedded system, and the steps of software consisted of three parts. The more details are shown as follows. A. Hardware Design The S3C2440 chip is used as the core of entire hardware. Furthermore, the modules of LCD, keyboard, alarm, fingerprint recognition are connected with the main chip (S3C2440).The SRAM and FLASH are also embodied in the system. There are some modules consisted of the system as follows: • LCD module: The OMAP5910 is used in this module as a LCD controller, it supported 1024*1024 image of 15 grey-scale or 3375 colours. • Keyboard module: It can be used for inputting passwords. • Alarming module: TC35i alarming module is based on GSM technology implement which can call the credit card owner and send message to relevant staffs without any sound. • SRAM and FLASH: The 16-bit 29LV160BB-70REC of FLASH chip and the 32-bit HY57V561620CT-6 of SRAM chip are connected with the main chip. Their functions are storing the running code, the information of fingerprint and the algorithm. Fingerprint recognition module: Atmel Company's AT77CI04B be used as a fingerprint recognition. It has a 500dpi resolution, anti-press, anti-static, anti- corrosion. • Ethernet switch controller: RTL8308B can provides eight 10/1 00 Mbps RMII Ethernet ports, which can Connect police network and remote fingerprint data server. Before using the ATM terminal, the client's fingerprint feature will be connected to the remote fingerprint data server to match fingerprint data with the master's, if the result isn't correct, the system will call police automatically and send alarm to the credit card owner. The block diagram of hardware design is shown in figure 1. Figure 1: Block diagram of Hardware Software design The design of software is very important for this embedded system the design was component of three parts including the design of main program flow chart, the initializing once and algorithm of fingerprint recognition of flow chart.
  • 3. SMS hashing system (Real-Time) for the reliability of financial transactions www.ijres.org 12 | Page This system of software is implemented by the steps as follows: first of all, the Linux kernel and the file system loaded into the main chip. The next, the system is initialized to implement specific task, such as checking ATM system, GSM commutation and so on, and then each module reset for ready to run commend. Before using ATM terminal, the password and finger print is required. First need to enter owner’s password, if password is successful then the system is required the owner’s fingerprint. If all the recognition is right the system would enter into the waiting status. In addition, the number of time that recognition of fingerprint and password are restricted to 3.1 for more than 3 times, the system will call police through police network, telephone to the owner and send message to relevant staff. Then locked the owner’s credit card. The overall flow chart of software is shown in figure 2. Figure 2. The overall flow chart of software In the process of inputting fingerprint, the AT77CI04B which is a linear sensor that captures fingerprint images by sweeping the finger over the sensing area, will used for acquiring the image of fingerprint. These products embed true hardware based 8-way navigation and click functions. The Fingerprint information will be temporarily stored in SRAM and upload to the remote finger data server to compare through bank network. The result of process will be controlled by main chip (S3C2440). The initializing process means that set the hardware and software and then start the multiple mission module, each module will be started according to the priority processes. At first, initialize the system clock, and execute the codes of open interrupt and the open interrupt task. Then, the system would judge and enter process of module finally, the system would start to attempt multiple tasks. The initializing flowchart is shown in figure 3. C. The design of fingerprint recognition algorithm The design of algorithm based on fingerprint recognition is so vital for the whole system. We would approach two steps to process the images of fingerprint.
  • 4. SMS hashing system (Real-Time) for the reliability of financial transactions www.ijres.org 13 | Page Figure 3: Flow chart of fingerprint recognition 1) The detail of fingerprint recognition process: The first step was the acquisition of fingerprint image by above device mentioned in the algorithm, and the results could be sent to the following process. Secondly, pre-processing the images acquired. After obtain the fingerprint image, it must be pre- processing. Generally, pre-processing of ones is filtering, histogram computing, image enhancement and image binarization. Lastly, the characteristic value was extracted, and the results of the above measures would be compared with the information of owner's fingerprint in the database so as to verify whether the character is matched, and then the system returned the results matched or not. 2) The design of fingerprint image enhancement: Fingerprint recognition module is an extremely important part of the system, the high-quality images was the major factors of influencing the performance in the system. There is a lot of noise in fingerprint image, the image enhancement was the precondition for recognition of fingerprint characteristics. The algorithm of fingerprint recognition based on the algorithm of Gabor and direction filter was used. Finger print enhancement algorithm based on Gabor filter could be better to remove noise, strengthen the definition between the ridge and valley, it could significantly improve the image enhancement processing capacity, but this algorithm was slow in dealing with the high capacity requirements. Fingerprint enhancement algorithm based on direction filter has a faster processing capabilities, but it was not good to handing the large noise areas. so combination of these two algorithms could obtain better effects. The algorithm based on direction filter was used in the clear area, and based on Gabor filter was used in the recoverable region. a) The Gabor filter algorithms For each point, according to its frequency, direction, using formula(l) calculate the Gabor filter coefficients, calculate the filter values of each point and then ,move to the next point, repeat the process above.
  • 5. SMS hashing system (Real-Time) for the reliability of financial transactions www.ijres.org 14 | Page G(u, v) is normalized after the fingerprint image, g (u, v) as a template filter coefficient. Proposed image block average M, the calculation using image block average gray level range, if the mean was small, the variance was small, that is not to restore area; if the mean moderate, have a great variance, the smaller the ratio of mean and variance, it could be regard as the clear area; if the mean moderate, variance and they were smaller than the ratio of non-recovery area, it could be regard as confusion region. Image block average calculated as follows: The fingerprint image was divided into w x w area, using equation (5), (6) in each of a gray-scale mean and variance, And the statistics is greater than the number of M ,marked as m and less than the number of M , markedas n. IV. CONCLUSION The design of ATM terminal system based on fingerprint recognition took advantages of the stability and reliability of fingerprint characteristics, a new biological technology based on the image enhancement algorithm of Gabor and direction filter. Additional, the system also contains the original verifying methods which were inputting owner's password. The security features were enhanced largely for the stability and reliability of owner recognition. The whole system was built on the technology of embedded system & Computer network which makes the system more safe, reliable and easy to use.
  • 6. SMS hashing system (Real-Time) for the reliability of financial transactions www.ijres.org 15 | Page REFERENCES [1] Lin Hong, Wan Yifei, Anil Jain. Fingerprint image enhancement: algorithm and performance evaluation [J]. IEEE Transactions on Pattern Analysis and Machine intelligence. 1998, 20(8): 777-789. [2] ESaatci, V Tavsanogh. Fingerprint image enhancement using CNN gabor-Cpe filter[C]. Proceedings of the 7th IEEE International Workshop on Cellular Neural Networks and their Applications 2002: 377-382. [3] Gu J, Zhou J, Zhang D.A combination model for orientation field of fingerprints. Pattern Recognition, 2004, 37: 543-553. [4] Cheng J, Tian J. Fingerprint enhancement with dyadic scale-space. Pattern Recognition Letters, 2004, 25(11): 1273-1284. [5] Chen H, Tian J. A fingerprint matching algorithm with registration pattern inspection. Journal of Software, 2005, 16(6): 1046- 105. [6] Smits G FJordaan E M.Improved SVMRegression using Mixtures of Kernels [A]. Proceedings of the 2002 International Joint Conferenceon Neural Networks [C]. Hawaii: IEEE. 2002. 2785-2. [7] FU Zhenghua, LI Yongjun, Tian Mi(2007). "The embedded monitoring system based ARM". JOURNAL OF 7INSTRUMENT TECHNOLOGY, Vol. 07, No. Ipp. 01-2. [8] Jun Zhou, Guangda Sua, Chun hongJiang. A face and fingerprint identity authentication system based on multi-route detection. Neurocomputing 70 (2007)922-931.