scholarly journals Multi-banking automatic teller machine transaction system by utilizing GSM and biometric identification with one single touch

2020 ◽  
Author(s):  
Muhammad Yasir Imam ◽  
Nabila Jannat ◽  
Gul Sher Khan

Everyone in many banks has many types of bank accounts, people need to bring a lot of ATM cards for their transaction, manytypes of PINs for each account.In the current system, ATM machine user identification systems depend only on bank ATM cards, safety secret pin code, and also such kind of user ID verification methods which measures are not optimal and sometimes there are incidents where we dismiss our secret security PIN code, lose ATM cards, rob ATM cards, stolen secret PIN code.Weare presenting a fresh concept or idea for the ATM machine user identification scheme, "Multi-banking Automatic TellerMachine Transaction System by Utilizing GSM and Biometric Identification with One Single Touch" to get control of theissues in the current ATM machine system. On the base of fingerprint identification method which is also one of most securesystems, unofficial accesses are blocked, as it makes fingerprint technique a unique recognition for every user. Our introducedsystem also assures a very secure GSM and OTP based transaction deals. The presented scheme has no hazard in managingmany account transaction deals and performs high-level security, compared to the current ATM machine scheme.

2020 ◽  
Author(s):  
Muhammad Yasir Imam ◽  
Nabila Jannat ◽  
Gul Sher Khan

Everyone in many banks has many types of bank accounts, people need to bring a lot of ATM cards for their transaction, many types of PINs for each account. In the current system, ATM machine user identification systems depend only on bank ATM cards, safety secret pin code, and also such kind of user ID verification methods which measures are not optimal and sometimes there are incidents where we dismiss our secret security PIN code, lose ATM cards, rob ATM cards, stolen secret PIN code.Weare presenting a fresh concept or idea for the ATM machine user identification scheme, "Multi-banking Automatic Teller Machine Transaction System by Utilizing GSM and Biometric Identification with One Single Touch" to get control of the issues in the current ATM machine system. On the base of the fingerprint identification method which is also one of the most secure systems, unofficial accesses are blocked, as it makes the fingerprint technique a unique recognition for every user. Our introduced system also assures a very secure GSM and OTP based transaction deals. The presented scheme has no hazard in managing many account transaction deals and performs high-level security, compared to the current ATM machine scheme.


2020 ◽  
Vol 7 (1) ◽  
pp. 41-49
Author(s):  
Ajat Sudrajat

Patient satisfaction at the hospital is a benchmark that is a benchmark for patients in getting health care. Each hospital must run a variety of strategies so that patients feel satisfied with health services, one of the strategies is through a good corporate image and trust, where a good corporate image can increase trust. So that affecting patient satisfaction Mitra Medika Narom Hospital Kabupaten Bekasi.             This research was conducted with descriptive and verification methods, namely knowing, analyzing, explaining and testing hypotheses, and making conclusions and suggestions. The sample in this study amounted to 240 respondents using the Eksplanary Survey method. Data analysis techniques used are ordinal scale techniques and path analysis using the Method of Successive Interval (MSI) tool, Microsoft Excel 2016 computer programs and SPSS 16.             The results of this study reveal that the company's image at the Mitra Medika Narom Hospital in Kabupaten Bekasi is in the agreed criteria, meaning that Mitra Medika Narom Hospital has built and made a good company image so that it is better known to all people. Furthermore, trust in Mitra Medika Narom Hospital in Kabupaten Bekasi is in the agreed criteria, meaning that Mitra Medika Narom Hospital has succeeded in building a good and optimal Trust so that patients trust Mitra Medika Narom Hospital to obtain health services. Then the patient satisfaction at the Mitra Medika Narom Hospital in Kabupaten Bekasi is in the agreed criteria, meaning that the patients as respondents feel a high level of satisfaction after completing treatment at the Mitra Medika Narom Hospital. There is a positive, strong and two-way correlation between company image and trust variables of 0.646. There is a partial influence of company image on patient satisfaction at Mitra Medika Narom Hospital significantly by 11.98%. There is a partial influence of trust on patient satisfaction at Mitra Medika Narom Hospital significantly by 25.08%. Then there is a simultan influence of corporate image and trust on patient satisfaction at Mitra Medika Narom Hospital positively and significantly by 37.06% while the remaining 62.94% is contributed by other variables not examined


2017 ◽  
Author(s):  
Fran Quigley

Fran Quigley, Torture, Impunity, and the Need for Independent Prosecutorial Oversight of the Executive Branch, 20 Cornell J. L. & Pub. Pol'y 271 (2010)Allegations of Executive Branch misconduct present an inherent conflict of interest because prosecutorial discretion is invested in a U.S. Attorney General appointed by – and serving at the pleasure of – the President. Various commentators, including Justice Antonin Scalia, Professor Stephen Carter, and the many critics of the former independent counsel statute have posited that checks on executive power provided by the Legislative Branch, the Judiciary, and political pressure will overcome any potential conflicts of interest. This sanguine view of adequate Executive Branch oversight was put to the test when high-level members of the George W. Bush Administration authorized acts of torture. After widespread public disapproval, Congress and the courts responded with efforts to rein in the Administration’s actions. However, the Department of Justice under the Bush Administration not only refused to investigate and prosecute allegations of sanctioning torture, but its attorneys also led the efforts to overcome congressional, judicial, and popular resistance to the Executive Branch conduct – and did so while explicitly acknowledging that the Executive Branch could expect little or no judicial oversight for its actions. Ultimately, the President who sanctioned torture left office, and the voters elected a President who expressed sharply different views on torture. However, the subsequent Administration of President Barack Obama, although affiliated with a different party and on record as opposed to acts of torture sponsored by the previous Administration, has also declined to pursue prosecution of high-level members of the Bush Administration. This most recent development shows that the conflict of interest presented by presidential control over Executive Branch prosecution transcends predictable concerns of self-preservation. The conflict of interest also highlights the natural desire of a sitting President to avoid prosecutions of previous executive officials when such prosecutions would consume political capital needed for the President’s broader legislative and foreign policy agendas. When it comes to controlling Executive Branch criminal conduct, the current structure designed to provide checks and balances comes up empty and thus must be reformed. The most direct and effective reform would be the direct election of the U.S. Attorney General. Even less precise remedies, such as a revived and improved independent counsel or Congress enacting provisions to break up the current monopoly over Executive Branch prosecution, would be significant improvements over the current system, which mocks the principle of equal justice for all.


2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Xiaopeng Yang ◽  
Hui Zhu ◽  
Songnian Zhang ◽  
Rongxing Lu ◽  
Xuesong Gao

Biometric identification services have been applied to almost all aspects of life. However, how to securely and efficiently identify an individual in a huge biometric dataset is still very challenging. For one thing, biometric data is very sensitive and should be kept secure during the process of biometric identification. On the other hand, searching a biometric template in a large dataset can be very time-consuming, especially when some privacy-preserving measures are adopted. To address this problem, we propose an efficient and privacy-preserving biometric identification scheme based on the FITing-tree, iDistance, and a symmetric homomorphic encryption (SHE) scheme with two cloud servers. With our proposed scheme, the privacy of the user’s identification request and service provider’s dataset is guaranteed, while the computational costs of the cloud servers in searching the biometric dataset can be kept at an acceptable level. Detailed security analysis shows that the privacy of both the biometric dataset and biometric identification request is well protected during the identification service. In addition, we implement our proposed scheme and compare it to a previously reported M-Tree based privacy-preserving identification scheme in terms of computational and communication costs. Experimental results demonstrate that our proposed scheme is indeed efficient in terms of computational and communication costs while identifying a biometric template in a large dataset.


Sign in / Sign up

Export Citation Format

Share Document