scholarly journals RECOGNITION OF IDENTIFICATION DATA OF BANK CARDS

Author(s):  
Zh. H. Spabekova ◽  
A. G. Karelova ◽  
A. E. Qami ◽  
Z. S. Abilkaiyr

This article describes the recognition of bank card information. Recognizing an object with a camera is one of the most important tasks at the moment. Recognizing credit card data at the same time is a rather complex algorithmic task, but at the moment the implementation of this task is very relevant and in-demand due to the increase in the number of payment transactions via mobile devices. The implementation of this task can save a person from having to enter most of the data when making online payments. The fundamental difficulties of this problem are discussed and methods for solving it are proposed. The problem under consideration is solved for the case of application on mobile devices, which imposes strict requirements for computational complexity. The article presents the results of a formal analysis of the performance and accuracy of the proposed algorithm. The error spectrum of the recognition system as a whole shows that the proposed algorithm solves the problem with the required accuracy. The main question that was investigated at this work: is it possible to use the Tesseract OCR library for text recognition from video images, for example, timecode? That is, digital time data embedded in the footage images. This is important for the automation of individual procedures for video technical expert studies. Object recognition by the camera is one of the most important tasks at the moment. The fundamental difficulties of this problem are discussed and methods for its solution are proposed. The article presents the results of a formal analysis of the performance and accuracy of the proposed algorithm. The spectrum of errors of the recognition system as a whole shows that the proposed algorithm solves the problem with the required accuracy.

Author(s):  
Shalini S

Credit card fraud is a significant threat in the BFSI sector. This credit card fraud detection system analyzes user behavioral patterns and their location to identify any unusual patterns. This consists of user characteristics, which includes user spending styles as well as standard user geographic places to verify his identity. One of the user behavior patterns includes spending habits, usage patterns, etc. This system deals with user credit card data for various characteristics, which includes user country, usual spending procedures. Based upon previous transactions information of that person, the system recognizes unusual patterns in the payment method. The fraud detection system contains the past transaction data of each user. Based on this data, it identifies the standard user behavior patterns for individual users, and any deviation from those normal user patterns becomes a trigger for the detection system. If it detects any unusual patterns, then user will be required to undergo the security verification, which identifies the original user using QR code recognition system. In case of any unusual activity, the system not only raises alerts but it will block the user after three invalid attempts.


2018 ◽  
Vol 30 (3) ◽  
pp. 3-22
Author(s):  
Won-Seop Shim ◽  
Seung-Mook Choi ◽  
Chang-Sup Shim

2019 ◽  
pp. 245-256
Author(s):  
Chiranji Lal Chowdhary ◽  
Rachit Bhalla ◽  
Esha Kumar ◽  
Gurpreet Singh ◽  
K. Bhagyashree ◽  
...  

2021 ◽  
Vol 2021 (008) ◽  
pp. 1-55
Author(s):  
Akos Horvath ◽  
◽  
Benjamin Kay ◽  
Carlo Wix ◽  
◽  
...  

We use credit card data from the Federal Reserve Board's FR Y-14M reports to study the impact of the COVID-19 shock on the use and availability of consumer credit across borrower types from March through August 2020. We document an initial sharp decrease in credit card transactions and outstanding balances in March and April. While spending starts to recover by May, especially for risky borrowers, balances remain depressed overall. We find a strong negative impact of local pandemic severity on credit use, which becomes smaller over time, consistent with pandemic fatigue. Restrictive public health interventions also negatively affect credit use, but the pandemic itself is the main driver. We further document a large reduction in credit card originations, especially to risky borrowers. Consistent with a tightening of credit supply and a flight-to-safety response of banks, we find an increase in interest rates of newly issued credit cards to less creditworthy borrowers.


Author(s):  
Xian Wang ◽  
Paula Tarrío ◽  
Ana María Bernardos ◽  
Eduardo Metola ◽  
José Ramón Casar

Many mobile devices embed nowadays inertial sensors. This enables new forms of human-computer interaction through the use of gestures (movements performed with the mobile device) as a way of communication. This paper presents an accelerometer-based gesture recognition system for mobile devices which is able to recognize a collection of 10 different hand gestures. The system was conceived to be light and to operate in a user-independent manner in real time. The recognition system was implemented in a smart phone and evaluated through a collection of user tests, which showed a recognition accuracy similar to other state-of-the art techniques and a lower computational complexity. The system was also used to build a human-robot interface that enables controlling a wheeled robot with the gestures made with the mobile phone


Author(s):  
K. S. Wagh

Data is an important property of various organizations and it is intellectual property of organization. Every organization includes sensitive data as customer information, financial data, data of patient, personal credit card data and other information based on the kinds of management, institute or industry. For the areas like this, leakage of information is the crucial problem that the organization has to face, that poses high cost if information leakage is done. All the more definitely, information leakage is characterize as the intentional exposure of individual or any sort of information to unapproved outsiders. When the important information is goes to unapproved hands or moves towards unauthorized destination. This will prompts the direct and indirect loss of particular industry in terms of cost and time. The information leakage is outcomes in vulnerability or its modification. So information can be protected by the outsider leakages. To solve this issue there must be an efficient and effective system to avoid and protect authorized information. From not so long many methods have been implemented to solve same type of problems that are analyzed here in this survey.  This paper analyzes little latest techniques and proposed novel Sampling algorithm based data leakage detection techniques.


2018 ◽  
Vol 8 (3) ◽  
pp. 124-128
Author(s):  
Nadide Duygu Solak ◽  
Murat Topaloglu

The number of mobile applications has been increasing rapidly in every field of life with the increasing use of smart devices. Smartphones and tablets make our lives easier with their properties and application they include. Minor or major accidents in traffic are always present in the daily life resulting in financial damage and loss of lives. There have been a number of studies done to speed up the processes to be done from the moment an accident happens. This study aims to enable people to perform all of the post-accident processes quickly and accurately with the use of mobile devices. In this way, papers and documents like photographs will be sent to the competent authorities without wasting time and effort. In addition, access to the road assistance needed will be quite easy. Keywords: Traffic accident, loss assessment and proceedings, mobile application.


2021 ◽  
Vol 343 ◽  
pp. 03005
Author(s):  
Florina Chiscop ◽  
Bogdan Necula ◽  
Carmen Cristiana Cazacu ◽  
Cristian Eugen Stoica

The topic of this paper represents our research in the process of creating a virtual model (digital twin) for a fast-food company production chain starting with the moment when a customer launches an order, following with the processing of that order, until the customer receives it. The model will describe elements that are included in this process such as equipment, human resources and the necessary space that is needed to host this layout. The virtual model created in a simulation platform will be a replicate of a real fast-food company, thus helping us observe the real time dynamic of this production system. Using WITNESS HORIZON 23 we will construct the model of the layout based on real time data received from the fast-food company. This digital twin will be used to manage the production chain material flow, evaluating the performance of the system architecture in various scenarios. In order to obtain a diagnosis of the system’s performance we will simulate the workflow running through preliminary architecture in compliance with the real time behaviour to identify the bottlenecks and blockages in the flow trajectory. In the end we will propose two different optimised architectures for the fast-food company production chain.


2020 ◽  
Vol 12 (2) ◽  
pp. 1-21
Author(s):  
Helge Nissen ◽  
Monique Janneck

Participants increasingly use mobile devices, especially smartphones, to fill out online questionnaires. However, standard questionnaire templates are often not optimized for presentation on smartphones, raising the question of whether an unfavorable layout may influence the survey results. In this study, interaction with questionnaires on different devices was investigated regarding processing time, data quality, and user experience of the questionnaire itself. Several standard and newly developed questionnaire layout templates were evaluated by means of an online study (N=301). Results show that processing times are higher on smartphones compared to desktop computers. However, there were no differences regarding data quality. The comparison of different mobile layouts among smartphone users revealed effects on processing time and user experience. Design recommendations are derived.


2019 ◽  
Vol 27 ◽  
pp. 04002
Author(s):  
Diego Herrera ◽  
Hiroki Imamura

In the new technological era, facial recognition has become a central issue for a great number of engineers. Currently, there are a great number of techniques for facial recognition, but in this research, we focus on the use of deep learning. The problems with current facial recognition convection systems are that they are developed in non-mobile devices. This research intends to develop a Facial Recognition System implemented in an unmanned aerial vehicle of the quadcopter type. While it is true, there are quadcopters capable of detecting faces and/or shapes and following them, but most are for fun and entertainment. This research focuses on the facial recognition of people with criminal records, for which a neural network is trained. The Caffe framework is used for the training of a convolutional neural network. The system is developed on the NVIDIA Jetson TX2 motherboard. The design and construction of the quadcopter are done from scratch because we need the UAV for adapt to our requirements. This research aims to reduce violence and crime in Latin America.


Sign in / Sign up

Export Citation Format

Share Document