scholarly journals MOBILE ATM USING ANDROID APPLICATION

Author(s):  
Rashmi Tupe ◽  
Sophia Salve ◽  
Aarti Pagare ◽  
Pooja Dushing ◽  
Dr. Vaishali Vikhe

Nowadays, dependency on banking in the virtual world has been increased to the peak position. To make it consistent advanced technologies should be used. As OTP is currently used worldwide for security purposes, it can be overruled by QR code. Main advantage of QR code over OTP data storage. OTP can only confirm that the user is authorized user and not some third party is involved in this transaction while QR code not only confirms the authorized user but QR code itself can store information such as transaction id, transaction date, time and also amount of transaction. So, there is no need of explicitly keeping track of transaction every transaction. Aim of this paper to enhance the functionality of ATM machine using android application. Proposed system is combining the ATM and mobile banking and minimizes the time of withdrawing cash from ATM. This will increase the speed of transaction almost three times fast; could have excellent impact on customer’s satisfaction. With the help of QR code information get encrypted so it also increases security. As the population increasing ATM queues will be longer day by day. By implementing proposed system current system will not hampered, by doing some minor changes in existing system it will be possible to get cash within seconds. According to analyst report, cost of transaction using mobile application i almost ten times less than ATM and about fifty times less, if physical bank branch used.

Author(s):  
Rohit Kuthe ◽  
Nilesh Sonkusare ◽  
L. H. Patil

This paper talks about an innovative and rather an interesting manner of intimating the message to the people using the wireless electronic display on the screen. This will help us in passing any message almost immediately without any delay just by sending an SMS which is better and more reliable than the old traditional way of passing the message on a screen. Our aim is to reduce the amount of paper work and make use the possible technological resources.  In this paper, we are trying to implement our system in such a way that it can display message send from the authorized user to the various receiving ends. So spreading of important message or screen will take place within the very short span of time to respective mobile application. Means user or registered person will be able to send the message from anywhere and this message will be displayed on a screen at the respective place.


2014 ◽  
Vol 13 (7) ◽  
pp. 4625-4632
Author(s):  
Jyh-Shyan Lin ◽  
Kuo-Hsiung Liao ◽  
Chao-Hsing Hsu

Cloud computing and cloud data storage have become important applications on the Internet. An important trend in cloud computing and cloud data storage is group collaboration since it is a great inducement for an entity to use a cloud service, especially for an international enterprise. In this paper we propose a cloud data storage scheme with some protocols to support group collaboration. A group of users can operate on a set of data collaboratively with dynamic data update supported. Every member of the group can access, update and verify the data independently. The verification can also be authorized to a third-party auditor for convenience.


2020 ◽  
Vol 1 (2) ◽  
Author(s):  
Mamay Syani ◽  
Nindi Werstantia

Ordering catering is an activity undertaken by customers to buy products in the form of food packages. In Cimahi Catering catering ordering process is done by customers by coming directly to the location or calling to Cimahi Catering. Based on interviews with the authors related parties, in the process of ordering catering there are some customers who complain about the order process is due to take time, energy and more costs. In the case of recording data ordering was deemed less effective because the data is still conventional. This is at risk of logging errors. As a solution of these problems the authors build an Application Ordering Catering Based Android Mobile to assist in the process of ordering catering by customers and the management of reservation data catering by the Cimahi Catering. Research methodology used is Extreme Programming method. In making this application the author uses android programming base and MySQL as the data storage. This application is made to efficiently time, effort and produce accurate information. The results of testing the built application has a performance that suits the needs of the user. Based on the results of User Acceptance Test get a positive response with 85% percentage. Keyword: Android, application, catering, mobile, ordering, uat


Author(s):  
Utkarsh Kumar ◽  
Anil Kumar Gope ◽  
Shweta Singh

In India, the position of mobile banking was in saga and this time, it is in pic position. The speedof reaching the people is going high and high. This is time of wireless world and sense of prestige; no doubt the mobile commerce is contributing to enhance the beauty of life and playing the role of metaphor and has become the part and parcel of our life. This growth has changed people to do business in mobile commerce (М- Commerce). Peoples are transferring to M-Commerce to attain good and fast transaction into market and saving their precious time. M-Commerce has become distinguished in Indian people, quickly during last few years. Due to large number of mobile application, growth rate in mobile penetration in India is increasing with the rapid speed. The mobile users has shifted to use the android phone from simple and black and white phone and taking the service of internet, the role of telecom companies is also important in the being popular of mobile commerce. Although many people have started E-Commerce but still a separate part of the society feel uncomfortable and hesitate to use M-Commerce because of security problems, payment issues and complexity of mobile applications. This paper identifies facts about the feasibility of MCommercein India today its growth and the Strength and opportunity, weakness and threats lying ahead.


Electronics ◽  
2021 ◽  
Vol 10 (11) ◽  
pp. 1343
Author(s):  
Faiza Loukil ◽  
Khouloud Boukadi ◽  
Rasheed Hussain ◽  
Mourad Abed

The insurance industry is heavily dependent on several processes executed among multiple entities, such as insurer, insured, and third-party services. The increasingly competitive environment is pushing insurance companies to use advanced technologies to address multiple challenges, namely lack of trust, lack of transparency, and economic instability. To this end, blockchain is used as an emerging technology that enables transparent and secure data storage and transmission. In this paper, we propose CioSy, a collaborative blockchain-based insurance system for monitoring and processing the insurance transactions. To the best of our knowledge, the existing approaches do not consider collaborative insurance to achieve an automated, transparent, and tamper-proof solution. CioSy aims at automating the insurance policy processing, claim handling, and payment using smart contracts. For validation purposes, an experimental prototype is developed on Ethereum blockchain. Our experimental results show that the proposed approach is both feasible and economical in terms of time and cost.


Sensors ◽  
2021 ◽  
Vol 21 (16) ◽  
pp. 5307
Author(s):  
Ricardo Borges dos Santos ◽  
Nunzio Marco Torrisi ◽  
Rodrigo Palucci Pantoni

Every consumer’s buying decision at the supermarket influences food brands to make first party claims of sustainability and socially responsible farming methods on their agro-product labels. Fine wines are often subject to counterfeit along the supply chain to the consumer. This paper presents a method for efficient unrestricted publicity to third party certification (TPC) of plant agricultural products, starting at harvest, using smart contracts and blockchain tokens. The method is capable of providing economic incentives to the actors along the supply chain. A proof-of-concept using a modified Ethereum IGR token set of smart contracts using the ERC-1155 standard NFTs was deployed on the Rinkeby test net and evaluated. The main findings include (a) allowing immediate access to TPC by the public for any desired authority by using token smart contracts. (b) Food safety can be enhanced through TPC visible to consumers through mobile application and blockchain technology, thus reducing counterfeiting and green washing. (c) The framework is structured and maintained because participants obtain economical incentives thus leveraging it´s practical usage. In summary, this implementation of TPC broadcasting through tokens can improve transparency and sustainable conscientious consumer behaviour, thus enabling a more trustworthy supply chain transparency.


Mobile technology is showing a wide acceptance in the health-care system. As technology is changing there are many health-care applications in the market. The need of these applications is increasing day by day because of unhealthy lifestyle. Among the various ailments, the most common lifestyle disease is diabetes. As we know diabetes can’t be cured, it can only be controlled by managing one’s lifestyle. In this paper, we propose a new application DiaM for managing and mentoring a diabetic patient. DiaM is Artificial Intelligence (AI) based mobile application which not only connect to manage one’s lifestyle but to build the strong will power. Our application has been designed in such a way that all the aspects are covered to manageone’s lifestyle. We have implemented an AI based system which smartly categorizes the patients in different states, which utilizes the different parameter like eating habit, stress, exercise, sleep time, smoking, genetic, BMI, and various other symptoms. On the basis of these states suggestions are been provided to the patient for improving the lifestyle. DiaM also enables patient to connect with the Doctor for monitoring and mentoring. Our application provides real-time alerts to doctor so that they can monitor patient anytime. It is extremely necessary to manage health conditions therefore our application provides a better,accurate and sustainable healthcare system.


2018 ◽  
Vol 30 (4) ◽  
pp. 14-31 ◽  
Author(s):  
Suyel Namasudra ◽  
Pinki Roy

This article describes how nowadays, cloud computing is one of the advanced areas of Information Technology (IT) sector. Since there are many hackers and malicious users on the internet, it is very important to secure the confidentiality of data in the cloud environment. In recent years, access control has emerged as a challenging issue of cloud computing. Access control method allows data accessing of an authorized user. Existing access control schemes mainly focus on the confidentiality of the data storage. In this article, a novel access control scheme has been proposed for efficient data accessing. The proposed scheme allows reducing the searching cost and accessing time, while providing the data to the user. It also maintains the security of the user's confidential data.


2017 ◽  
Vol 7 (1.1) ◽  
pp. 64 ◽  
Author(s):  
S. Renu ◽  
S.H. Krishna Veni

The Cloud computing services and security issues are growing exponentially with time. All the CSPs provide utmost security but the issues still exist. Number of technologies and methods are emerged and futile day by day. In order to overcome this situation, we have also proposed a data storage security system using a binary tree approach. Entire services of the binary tree are provided by a Trusted Third Party (TTP) .TTP is a government or reputed organization which facilitates to protect user data from unauthorized access and disclosure. The security services are designed and implemented by the TTP and are executed at the user side. Data classification, Data Encryption and Data Storage are the three vital stages of the security services. An automated file classifier classify unorganized files into four different categories such as Sensitive, Private, Protected and Public. Applied cryptographic techniques are used for data encryption. File splitting and multiple cloud storage techniques are used for data outsourcing which reduces security risks considerably. This technique offers  file protection even when the CSPs compromise. 


Author(s):  
Ayssam Elkady ◽  
Jovin Joy ◽  
Tarek Sobh

We are developing a framework (RISCWare) for the modular design and integration of sensory modules, actuation platforms, and task descriptions that will be implemented as a tool to reduce efforts in designing and utilizing robotic platforms. The framework is used to customize robotic platforms by simply defining the available sensing devices, actuation platforms, and required tasks. The main purpose for designing this framework is to reduce the time and complexity of the development of robotic software and maintenance costs, and to improve code and component reusability. Usage of the proposed framework prevents the need to redesign or rewrite algorithms or applications due to changes in the robot’s platform, operating systems, or the introduction of new functionalities. In this paper, the RISCWare framework is developed and described. RISCWare is a robotic middleware used for the integration of heterogeneous robotic components. RISCWare consists of three modules. The first module is the sensory module, which represents sensors that collect information about the remote or local environment. The platform module defines the robotic platforms and actuation methods. The last module is the task-description module, which defines the tasks and applications that the platforms will perform such as teleoperation, navigation, obstacle avoidance, manipulation, 3-D reconstruction, and map building. The plug-and-play approach is one of the key features of RISCWare, which allows auto-detection and auto-reconfiguration of the attached standardized components (hardware and software) according to current system configurations. These components can be dynamically available or unavailable. Dynamic reconfiguration provides the facility to modify a system during its execution and can be used to apply patches and updates, to implement adaptive systems, or to support third-party modules. This automatic detection and reconfiguration of devices and driver software makes it easier and more efficient for end users to add and use new devices and software applications. In addition, the software components should be written in a flexible way to get better usage of the hardware resource and also they should be easy to install/uninstall. Several experiments, performed on the RISCbot II mobile manipulation platform, are described and implemented to evaluate the RISCWare framework with respect to applicability and resource utilization.


Sign in / Sign up

Export Citation Format

Share Document