Pin number theft recognition and cash transaction using sixth sense technology in ATM/CDM

2018 ◽  
Vol 7 (2.31) ◽  
pp. 178 ◽  
Author(s):  
S Pradeep Kumar ◽  
N Shanmugasundaram

Nowadays peoples using credit/debit card for cash transaction for their daily needs. Meanwhile for deposit and withdrawal of huge amount the consumers use the automated teller machine or cash deposit machine. Due to this the crime related to ATM like pin number theft, fraud calls etc increasing day by day. This paper aim to reduce the risk related to pin number theft. We proposed a sixth sense technology which can access by our gestural interface to do the normal operation for cash transaction rather than touching the pin number plate which will be helpful for eliminating the theft related with pin number tracking. The experimental prototype model is designed and the results are verified and presented in this paper. 

2022 ◽  
pp. 1865-1875
Author(s):  
Krishan Tuli ◽  
Amanpreet Kaur ◽  
Meenakshi Sharma

Cloud computing is offering various IT services to many users in the work on the basis of pay-as-you-use model. As the data is increasing day by day, there is a huge requirement for cloud applications that manage such a huge amount of data. Basically, a best solution for analyzing such amounts of data and handles a large dataset. Various companies are providing such framesets for particular applications. A cloud framework is the accruement of different components which is similar to the development tools, various middleware for particular applications and various other database management services that are needed for cloud computing deployment, development and managing the various applications of the cloud. This results in an effective model for scaling such a huge amount of data in dynamically allocated recourses along with solving their complex problems. This article is about the survey on the performance of the big data framework based on a cloud from various endeavors which assists ventures to pick a suitable framework for their work and get a desired outcome.


2020 ◽  
Vol 17 (9) ◽  
pp. 4473-4481
Author(s):  
M. L. Chayadevi ◽  
Sujith Madhyastha ◽  
K. N. Nisarga ◽  
H. Charitha ◽  
B. Susharan

There are many scenarios in society with thefts and crimes involved in Automated Teller Machines (ATM). These events are increasing day-by-day and which is also increasing the complexities on the crime investigation agencies. In order to deal with these situations, we have proposed an automated security method inside ATMs using image processing techniques which can alert the concerned authorities immediately whenever these types of situations arise. Hybrid method with Viola-Jones algorithm has been used for face recognition along with the Haar-cascade features. In the case of objects such as knife, gun etc. inside an ATM, combination of SVM and random forest algorithms are used for object detection. TensorFlow with machines learning algorithms have been used in the hybrid methodology. Android application has been developed to prevent and alert the crimes and send alert messages to the concerned. Speech alert system is developed to assist blind and physically challenged people.


Author(s):  
Saumendu Roy ◽  
Dr. Md. Alam Hossain ◽  
Sujit Kumar Sen ◽  
Nazmul Hossain ◽  
Md. Rashid Al Asif

Load balancing is an integrated aspect of the environment in cloud computing. Cloud computing has lately outgoing technology. It has getting exoteric day by day residence widespread chance in close to posterior. Cloud computing is defined as a massively distributed computing example that is moved by an economic scale in which a repertory of abstracted virtualized energetically. The number of clients in cloud computing is increasing exponentially. The huge amount of user requests attempt to entitle the collection for numerous applications. Which alongside with heavy load not far afield off from cloud server. Whenever particular (Virtual Machine) VMs are overloaded then there are no more duties should be addressed to overloaded VM if under loaded VMs are receivable. For optimizing accomplishment and better response or reaction time the load has to be balanced between overloaded VMs (virtual machines). This Paper describes briefly about the load balancing accession and identifies which is better than others (load balancing algorithm).


2019 ◽  
Vol 8 (2) ◽  
pp. 2038-2040

In our digital India, the use of social media like twitter, blogs and various forums is growing with the rapid rate. Thus the size of the data is becoming big day by day and in the span of this type of high varied and volume data, manual analysis would be a clumsy job. So, there is an alarming rate to analyze that large amount of data to make it suitable for analysis purpose. As a most elaborate open source platform, R has immeasurable user communities that thrives and perpetuate a huge amount of text analysis packages. So, in this paper we are analyzing movie related tweets using machine learning in R.


2018 ◽  
Vol 7 (4.12) ◽  
pp. 58 ◽  
Author(s):  
Ravi Shanker ◽  
Dr. Sahil Verma ◽  
Dr. Kavita

Background/Objectives: With the proliferation of online platforms, information is generated every second, and there is an urgent need to firstly store the huge amount of data and secondly to secure that data. The level of sophistication is increasing day by day, so alongside the demand for excessive computational power and resources also hikes up. With the advancements in technology and with the concepts like globalization coming into picture, people find the need of sharing information important. Methods/Statistical Analysis: Information security aspects are analyzed based on confidentiality, integrity, availability, authentication, authorization and non-Repudiation. Findings: Different web application needs different security parameter and out of these authentication and access control are among the top security issues which can be resolved by using two factor and three factor authentication and are more effective with respect to mobility. Application/Improvement: Most handheld devices have built-in sensors which can be used for self authentication and authorization. Device ID, fingerprint, iris, SMS based OTPs add extra security to information security.  


2015 ◽  
Vol 67 (1) ◽  
pp. 44-50
Author(s):  
Ionut Daniel Geonea ◽  
Nicolae Dumitru ◽  
Alexandru Margine

Abstract In this paper is presented the design solution and experimental prototype of a wheelchair for disabled people. Design solution proposed to be implemented uses two reduction gears motors and a mechanical transmission with chains. It’s developed a motion controller based on a PWM technology, which allows the user to control the wheelchair motion. The wheelchair has the ability of forward – backward motion and steering. The design solution is developed in Solid Works, and it’s implemented to a wheelchair prototype model. Wheelchair design and motion makes him suitable especially for indoor use. It is made a study of the wheelchair kinematics, first using a kinematic simulation in Adams. Are presented the wheelchair motion trajectory and kinematics parameters. The experimental prototype is tested with a motion analysis system based on ultra high speed video cameras recording. The obtained results from simulation and experimentally tests, demonstrate the efficiency of wheelchair proposed solution.


2014 ◽  
Vol 945-949 ◽  
pp. 666-669
Author(s):  
Jie Yang ◽  
Xue Jun Wang

Belt conveyor has the strong adapt ability and it uses widely in convey machinery. Roller is one of the key components in the belt conveyor; it plays an important role in the normal operation of belt conveyor. In order to study the influence factors of roller service life, this paper analyzed the movement of the roller and used Solid edge ST4 and ADAMS software to establish the virtual prototype model of roller and kinematics simulation of the model. This paper concludes the main factors affect the life are the sealing effect, poor alignment of the roller and the alignment of the bearing. Through the analysis of roller can reduce the design errors, improve the processing and installation accuracy mostly at the same time in the production process, it also can reduce the design and process time significantly and lower manufacturing cost and prolong the service life of roller.


Author(s):  
Mounica B ◽  
Thejas T R ◽  
Syed Nadeem Pasha ◽  
Swaraj K S

Traffic is a major issue in many cities. There are no existing ways which are both cost effective and efficient to measure the traffic. Sentiment analysis is a contextual mining of text, which identifies and extracts subjective information in source material. The Social sites have a huge amount of information because of its vast users. In this project we will use twitter as the source. It is an active site which has many users and also tweets regarding the traffic. Sentiment Analysis is the mechanized procedure of breaking down content information and arranging it into sentiments positive, negative or impartial. Performing Sentiment Analysis on information from Twitter utilizing AI can assist organizations with seeing how individuals are discussing their image. Within excess of 321 million dynamic clients, sending a day by day normal of 500 million Tweets, Twitter permits organizations to contact an expansive crowd and associate with clients without middle people.


2012 ◽  
Vol 3 (6) ◽  
pp. 199-203
Author(s):  
Naveed Dastgir

Now days, the Word Wide Web (WWW) covers most of the information channels across the world and is the cheapest resource to publish the corporate as well as individual information. The key advantage of WWW is that the published information instantly becomes available around the globe. Since the information load on the Internet is increasing day by day, therefore, it is causing serious troubles for the researchers and scientists to retrieve the targeted and relevant information from the huge bulk of data. While surfing the Internet, precious time of researchers and scientists is wasted due to browsing of the irrelevant and unnecessary material. Such an approach of information retrieval results in overlooking the important contents. In this paper, we look into the elementary components of a customized search engine in order to develop an agent-based search engine tool that may help researchers and scientists to find their desired information in an efficient manner and with minimal clicks of pointer. Through this tool, the researchers and scientists will be able to find a summarized report against their search phrase along with the search details, which will provide them a solid background to their research subject based on history available on the WWW. The important aspect of this search engine is that it retrieves the subject-specific material from the designated websites in accordance with the user-defined criteria.


Sign in / Sign up

Export Citation Format

Share Document