SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Downloaden Sie, um offline zu lesen
IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 4, 2013 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 1027
Third Generation Automatic Teller Machine
Gayathri B1
AnnMary Antony2
Keerthana K H3
Aswathy R4
1,2,3,4
Department of Electronics and Communication
1,2,3,4
Federal Institute Of Science And Technology, Angamaly Kerala, India
Abstract— In this paper we proposed a new model in the
banking system, one knows that ATM cards are widely used
nowadays. In the proposed system, one can fetch the money
without an ATM card. ATM can be operated by using the
SIM (Subscriber Identity Module) in the mobile phone
.When we insert our SIM in the reader unit of the ATM, it
connects the mobile to the server. In server we can collect
the related information of the mobile number, i.e, the users
account detail, their photo etc. Camera in the ATM will
capture the user’s image to the server. If the image in the
server and camera matches, it proceeds for PIN number and
the processing begins. Else the process is terminated. Using
this kind of system need for ATM card is completely
eliminated. We can operate the ATM machine by using our
SIM itself. By using this malfunctions can be avoided. Our
transaction will be more secured.
I. INTRODUCTION
An automated teller machine (ATM) or banking
machine (ABM) is a computerized telecommunications
device that provides the clients of a financial institution with
access to financial transactions in a public space without the
need for a cashier, human clerk or bank teller. On most
modern ATMs, the customer is identified by inserting a
plastic ATM card with a magnetic stripe or a
plastic smartcard with a chip that contains a unique card
number and some security information such as name, expiry
date and CVV(Card Verification Value). Authentication is
provided by the customer entering a Personal Identification
Number (PIN).
Using an ATM, customers can access their
bank accounts in order to make cash withdrawals (or credit
card cash advances) and check their account balances as
well as make use for purchase in shops. ATM’s often
provides the best possible exchange rate for foreign
travellers.
In this paper, automated functions are performed
via image processing and transaction upon Subscriber
Identity Module security maintenance is provided by
behaviour recognition. Effective mobile communication is
ensured throughout the entire process. Alert module is
provided during an illicit transaction. Mobile scanning
device scans SIM number through GSM Modem, at the
same time web camera captures the images. Using Digital
Signal Processing functions they are verified, if images and
PIN number are same then further process begins, otherwise
it leaves an alarm through Alert module. Information’s are
processed and intimated to customer by voice annunciator
module.
II. GSM MODEM
Global System for Mobile communication (GSM) is a
globally accepted standard fo-r digital cellular
communication. A GSM modem acts like a dial-up modem,
being an external device. Typically, an external GSM
modem is connected to a computer
Fig. 1: Block Diagram of the System
through a serial cable or a USB cable. System uses AT
commands to control modems. GSM modems also support
an extended set of AT commands than normal dialup
modem. These extended AT commands are defined in the
GSM standards. With the extended AT commands, one can
do things like:Reading, writing and deleting SMS messages.
1) Sending SMS messages.
2) Monitoring the signal strength.
3) Monitoring the charging status and charge level of
the battery.
4) Reading, writing and searching phone book entries.
The number of SMS messages that can be processed by a
GSM modem per minute is very low -- only about six to ten
SMS messages per minute.
Fig. 2: GSM Modem
Third Generation Automatic Teller Machine
(IJSRD/Vol. 1/Issue 4/2013/0051)
All rights reserved by www.ijsrd.com 1028
III. FACE RECOGNITION
Principal component analysis (PCA) involves a
mathematical procedure which extracts facial features for
recognition, this approach transforms face images into a
smallest of characteristic feature images called Eigen faces.
The first principal component accounts for as much of the
variability in the data as possible, and each succeeding
component accounts for as much of the remaining
variability as possible. These methods capture the local
facial features and their geometric relationships. They often
locate anchor points at key facial features (eyes, nose,
mouth, etc.), connect these points to form a net and then
measure the distances and angles of the net to create a
unique face ‘print’.
Fig. 3: PCA: Principal Component Analysis
It converts the input and database face images to
corresponding Eigen values. Eigen value corresponds to the
energy of the face images. These Eigen values are
compared. Here is how Eigen value is calculated?
1) Read image.
2) Find its mean value = average of the colour
3) Find difference image = input image-mean
4) Co-variance matrix = gives effective colour
5) 5. Eigen value = gives energy of image
IV. SOFTWARE SIMULATION
Fig. 4: Software Simulation Block Diagram
Logic synthesizer, Synthesizer transforms the VHDL into
a net list. The net list is just a description of the various
logic gates in our design and how they are interconnected
Implementation phase. It employs three different tools. A
translator merges together one or more net lists along with
any design constraints. This is fed to a mapper that combines
gates in the net list into groups that will fit efficiently into
the LUTs of the FPGA. The gate groupings are sent to the
place & route tool that assigns them to LUTs at various
locations in the FPGA and then determines how to connect
them together using the routing resources (wires) in the
switching matrix. This part takes the most time as finding a
placement that can be routed efficiently requires a lot of
computation bit stream generator it takes the output of the
implementation phase, combines it with a few other
configuration settings, and outputs a binary bit stream. This
bit stream (which, depending upon the size of the FPGA can be
many megabits in length) contains the truth-tables that will be
loaded into the RAM of every LUT and the connection
settings for the wiring matrix that will connect them. At this
point, a bit stream is just a bunch of 1s and 0s in a file on
the computer. The downloader will transfer this file into a
physical FPGA chip. In most cases, this chip is already
mounted on a circuit board where it waits for the bit stream
that will make it perform its intended function.
ATM status report block
It send status of different ATM, whether working
or not .to particular customer mobile via Spartan 3a
hardware and UART.
V. CONCLUSION
From this we implement image-recognition techniques that
can provide the important functions required by advanced
intelligent ATM Security, to avoid theft and protect the
usage of unauthenticated users. Secured and safety
environment system for automobile users will be provided
by implementing this project. We can predict the theft by
using this system in our day to day life. We Predict and
indent system for the society.
REFERENCES
[1] Faune Hughes, Daniel Lichter, Richard Oswald, and
Michael Whitfield ,Face Biometrics: A Longitudinal
Study, Seidenberg School of CSIS, Pace University,
White Plains, NY 10606,USA.
[2] Gary G.Yen, Nethrie Nithianandan, Facial Feature
Extraction Using Genetic Algorithm, Intelligent
Systems and Control Laboratory School of Electrical
and Computer Engineering. Oklahoma State
University, Stillwater, OK 74074-5032, USA
[3] D.L. Jiang, Y.X. Hu, S.C. Yan, H.J. Zhang, "Efficient
3D Reconstruction for Face Recognition",
0031_3203/2004 Pattern
recognitionsociety:doi:10.1016/j.patcog.2004.11.004
[4] Animetrics offers FaceRℱ CredentialME service on
Sprint 3G and 4G networks August 12th, 2010.

Weitere Àhnliche Inhalte

Was ist angesagt?

Ieee+Hardware+List+2009
Ieee+Hardware+List+2009Ieee+Hardware+List+2009
Ieee+Hardware+List+2009pavan
 
IRJET - Image Thresholding based Secured Electronic Smart Voting Machine ...
IRJET -  	  Image Thresholding based Secured Electronic Smart Voting Machine ...IRJET -  	  Image Thresholding based Secured Electronic Smart Voting Machine ...
IRJET - Image Thresholding based Secured Electronic Smart Voting Machine ...IRJET Journal
 
To protect user’s password from theft by using rfid and mems technology
To protect user’s password from theft by using rfid and mems technologyTo protect user’s password from theft by using rfid and mems technology
To protect user’s password from theft by using rfid and mems technologyeSAT Journals
 
137.gsm, fprs ,keypad_based_atm_security_(doc)
137.gsm, fprs ,keypad_based_atm_security_(doc)137.gsm, fprs ,keypad_based_atm_security_(doc)
137.gsm, fprs ,keypad_based_atm_security_(doc)Karteek Irukulla
 
IRJET- Biometric Voting Machine using Aadhar Authentication
IRJET-  	  Biometric Voting Machine using Aadhar AuthenticationIRJET-  	  Biometric Voting Machine using Aadhar Authentication
IRJET- Biometric Voting Machine using Aadhar AuthenticationIRJET Journal
 
A Digital Pen with a Trajectory Recognition Algorithm
A Digital Pen with a Trajectory Recognition AlgorithmA Digital Pen with a Trajectory Recognition Algorithm
A Digital Pen with a Trajectory Recognition AlgorithmIOSR Journals
 
Implementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting SystemImplementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting SystemAssociate Professor in VSB Coimbatore
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Embedded System Design for Iris Recognition System.
Embedded System Design for Iris Recognition System.Embedded System Design for Iris Recognition System.
Embedded System Design for Iris Recognition System.Lakshmi Sarvani Videla
 
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...IRJET Journal
 
Smart Cards
Smart CardsSmart Cards
Smart CardsRajan Kumar
 
Advanced Braille System-Communication Device for Blind-Deaf People
Advanced Braille System-Communication Device for Blind-Deaf PeopleAdvanced Braille System-Communication Device for Blind-Deaf People
Advanced Braille System-Communication Device for Blind-Deaf PeopleIRJET Journal
 
IRJET- Smart Bus Transportation System
IRJET- Smart Bus Transportation SystemIRJET- Smart Bus Transportation System
IRJET- Smart Bus Transportation SystemIRJET Journal
 

Was ist angesagt? (20)

Ieee+Hardware+List+2009
Ieee+Hardware+List+2009Ieee+Hardware+List+2009
Ieee+Hardware+List+2009
 
IRJET - Image Thresholding based Secured Electronic Smart Voting Machine ...
IRJET -  	  Image Thresholding based Secured Electronic Smart Voting Machine ...IRJET -  	  Image Thresholding based Secured Electronic Smart Voting Machine ...
IRJET - Image Thresholding based Secured Electronic Smart Voting Machine ...
 
To protect user’s password from theft by using rfid and mems technology
To protect user’s password from theft by using rfid and mems technologyTo protect user’s password from theft by using rfid and mems technology
To protect user’s password from theft by using rfid and mems technology
 
C132733
C132733C132733
C132733
 
137.gsm, fprs ,keypad_based_atm_security_(doc)
137.gsm, fprs ,keypad_based_atm_security_(doc)137.gsm, fprs ,keypad_based_atm_security_(doc)
137.gsm, fprs ,keypad_based_atm_security_(doc)
 
Design and Implementation of Security Based ATM theft Monitoring system
Design and Implementation of Security Based ATM theft Monitoring systemDesign and Implementation of Security Based ATM theft Monitoring system
Design and Implementation of Security Based ATM theft Monitoring system
 
IRJET- Biometric Voting Machine using Aadhar Authentication
IRJET-  	  Biometric Voting Machine using Aadhar AuthenticationIRJET-  	  Biometric Voting Machine using Aadhar Authentication
IRJET- Biometric Voting Machine using Aadhar Authentication
 
Presentation iot
Presentation iotPresentation iot
Presentation iot
 
A Digital Pen with a Trajectory Recognition Algorithm
A Digital Pen with a Trajectory Recognition AlgorithmA Digital Pen with a Trajectory Recognition Algorithm
A Digital Pen with a Trajectory Recognition Algorithm
 
Implementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting SystemImplementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting System
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Security
SecuritySecurity
Security
 
Embedded System Design for Iris Recognition System.
Embedded System Design for Iris Recognition System.Embedded System Design for Iris Recognition System.
Embedded System Design for Iris Recognition System.
 
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
 
Embedded system
Embedded systemEmbedded system
Embedded system
 
Smart Cards
Smart CardsSmart Cards
Smart Cards
 
Aadhar Based Electronic Voting Machine
Aadhar Based Electronic Voting MachineAadhar Based Electronic Voting Machine
Aadhar Based Electronic Voting Machine
 
Advanced Braille System-Communication Device for Blind-Deaf People
Advanced Braille System-Communication Device for Blind-Deaf PeopleAdvanced Braille System-Communication Device for Blind-Deaf People
Advanced Braille System-Communication Device for Blind-Deaf People
 
IRJET- Smart Bus Transportation System
IRJET- Smart Bus Transportation SystemIRJET- Smart Bus Transportation System
IRJET- Smart Bus Transportation System
 
Fingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication SystemFingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication System
 

Ähnlich wie Third Generation Automatic Teller Machine

International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
IRJET - Smartcard based Grocerydispensing Sytem
IRJET - Smartcard based Grocerydispensing SytemIRJET - Smartcard based Grocerydispensing Sytem
IRJET - Smartcard based Grocerydispensing SytemIRJET Journal
 
IRJET- ATM Security using GSM and MEMS Sensor
IRJET- ATM Security using GSM and MEMS SensorIRJET- ATM Security using GSM and MEMS Sensor
IRJET- ATM Security using GSM and MEMS SensorIRJET Journal
 
IRJET- Smart Card Based Automated Toll Plaza System
IRJET-  	  Smart Card Based Automated Toll Plaza SystemIRJET-  	  Smart Card Based Automated Toll Plaza System
IRJET- Smart Card Based Automated Toll Plaza SystemIRJET Journal
 
Biometric ATM2.docx
Biometric ATM2.docxBiometric ATM2.docx
Biometric ATM2.docxKanchanRaut13
 
SMS hashing system (Real-Time) for the reliability of financial transactions
SMS hashing system (Real-Time) for the reliability of financial transactionsSMS hashing system (Real-Time) for the reliability of financial transactions
SMS hashing system (Real-Time) for the reliability of financial transactionsIJRES Journal
 
ATM machine security system using GSM and MEMS sensor
ATM machine security system using GSM and MEMS sensorATM machine security system using GSM and MEMS sensor
ATM machine security system using GSM and MEMS sensorIRJET Journal
 
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...IRJET Journal
 
A Modern Technique for Unauthorized Human Detection and Intimation
A Modern Technique for Unauthorized Human Detection and IntimationA Modern Technique for Unauthorized Human Detection and Intimation
A Modern Technique for Unauthorized Human Detection and Intimationijtsrd
 
Fingerprint Based Smart Pay and Accident Alert System
Fingerprint Based Smart Pay and Accident Alert SystemFingerprint Based Smart Pay and Accident Alert System
Fingerprint Based Smart Pay and Accident Alert SystemIJTET Journal
 
An ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation NetworkAn ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation Networkdbpublications
 
ATM for visually challenged people
ATM for visually challenged peopleATM for visually challenged people
ATM for visually challenged peopleIRJET Journal
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...IJRTEMJOURNAL
 
SMS based Wireless Digital Board with Voice Recognition Based on GSM
SMS based Wireless Digital Board with Voice Recognition Based on GSMSMS based Wireless Digital Board with Voice Recognition Based on GSM
SMS based Wireless Digital Board with Voice Recognition Based on GSMIRJET Journal
 
A Digital Pen with a Trajectory Recognition Algorithm
A Digital Pen with a Trajectory Recognition AlgorithmA Digital Pen with a Trajectory Recognition Algorithm
A Digital Pen with a Trajectory Recognition AlgorithmIOSR Journals
 
Anti-Theft Protection of Vehicle by GSM & GPS with Fingerprint Verification
Anti-Theft Protection of Vehicle by GSM & GPS with Fingerprint VerificationAnti-Theft Protection of Vehicle by GSM & GPS with Fingerprint Verification
Anti-Theft Protection of Vehicle by GSM & GPS with Fingerprint VerificationIJAEMSJORNAL
 

Ähnlich wie Third Generation Automatic Teller Machine (20)

International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
IRJET - Smartcard based Grocerydispensing Sytem
IRJET - Smartcard based Grocerydispensing SytemIRJET - Smartcard based Grocerydispensing Sytem
IRJET - Smartcard based Grocerydispensing Sytem
 
S0102297102
S0102297102S0102297102
S0102297102
 
IRJET- ATM Security using GSM and MEMS Sensor
IRJET- ATM Security using GSM and MEMS SensorIRJET- ATM Security using GSM and MEMS Sensor
IRJET- ATM Security using GSM and MEMS Sensor
 
IRJET- Smart Card Based Automated Toll Plaza System
IRJET-  	  Smart Card Based Automated Toll Plaza SystemIRJET-  	  Smart Card Based Automated Toll Plaza System
IRJET- Smart Card Based Automated Toll Plaza System
 
Biometric ATM2.docx
Biometric ATM2.docxBiometric ATM2.docx
Biometric ATM2.docx
 
SMS hashing system (Real-Time) for the reliability of financial transactions
SMS hashing system (Real-Time) for the reliability of financial transactionsSMS hashing system (Real-Time) for the reliability of financial transactions
SMS hashing system (Real-Time) for the reliability of financial transactions
 
ATM machine security system using GSM and MEMS sensor
ATM machine security system using GSM and MEMS sensorATM machine security system using GSM and MEMS sensor
ATM machine security system using GSM and MEMS sensor
 
IJET-V3I2P5
IJET-V3I2P5IJET-V3I2P5
IJET-V3I2P5
 
N044057478
N044057478N044057478
N044057478
 
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
 
A Modern Technique for Unauthorized Human Detection and Intimation
A Modern Technique for Unauthorized Human Detection and IntimationA Modern Technique for Unauthorized Human Detection and Intimation
A Modern Technique for Unauthorized Human Detection and Intimation
 
Fingerprint Based Smart Pay and Accident Alert System
Fingerprint Based Smart Pay and Accident Alert SystemFingerprint Based Smart Pay and Accident Alert System
Fingerprint Based Smart Pay and Accident Alert System
 
An ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation NetworkAn ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation Network
 
M Commerce
M CommerceM Commerce
M Commerce
 
ATM for visually challenged people
ATM for visually challenged peopleATM for visually challenged people
ATM for visually challenged people
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
 
SMS based Wireless Digital Board with Voice Recognition Based on GSM
SMS based Wireless Digital Board with Voice Recognition Based on GSMSMS based Wireless Digital Board with Voice Recognition Based on GSM
SMS based Wireless Digital Board with Voice Recognition Based on GSM
 
A Digital Pen with a Trajectory Recognition Algorithm
A Digital Pen with a Trajectory Recognition AlgorithmA Digital Pen with a Trajectory Recognition Algorithm
A Digital Pen with a Trajectory Recognition Algorithm
 
Anti-Theft Protection of Vehicle by GSM & GPS with Fingerprint Verification
Anti-Theft Protection of Vehicle by GSM & GPS with Fingerprint VerificationAnti-Theft Protection of Vehicle by GSM & GPS with Fingerprint Verification
Anti-Theft Protection of Vehicle by GSM & GPS with Fingerprint Verification
 

Mehr von ijsrd.com

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Gridijsrd.com
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Lifeijsrd.com
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTijsrd.com
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...ijsrd.com
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...ijsrd.com
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Lifeijsrd.com
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learningijsrd.com
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation Systemijsrd.com
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...ijsrd.com
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigeratorijsrd.com
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...ijsrd.com
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingijsrd.com
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logsijsrd.com
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMijsrd.com
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Trackingijsrd.com
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...ijsrd.com
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparatorsijsrd.com
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...ijsrd.com
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.ijsrd.com
 

Mehr von ijsrd.com (20)

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Grid
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Life
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learning
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation System
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigerator
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processing
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Tracking
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparators
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.
 

KĂŒrzlich hochgeladen

Internet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxInternet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxVelmuruganTECE
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating SystemRashmi Bhat
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdfCaalaaAbdulkerim
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substationstephanwindworld
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionMebane Rash
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
TechTACÂź CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTACÂź CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTACÂź CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTACÂź CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingBootNeck1
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - GuideGOPINATHS437943
 
National Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfNational Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfRajuKanojiya4
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Vishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsVishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsSachinPawar510423
 

KĂŒrzlich hochgeladen (20)

Internet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxInternet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptx
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating System
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdf
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substation
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
TechTACÂź CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTACÂź CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTACÂź CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTACÂź CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event Scheduling
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - Guide
 
National Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfNational Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdf
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Vishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsVishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documents
 

Third Generation Automatic Teller Machine

  • 1. IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 4, 2013 | ISSN (online): 2321-0613 All rights reserved by www.ijsrd.com 1027 Third Generation Automatic Teller Machine Gayathri B1 AnnMary Antony2 Keerthana K H3 Aswathy R4 1,2,3,4 Department of Electronics and Communication 1,2,3,4 Federal Institute Of Science And Technology, Angamaly Kerala, India Abstract— In this paper we proposed a new model in the banking system, one knows that ATM cards are widely used nowadays. In the proposed system, one can fetch the money without an ATM card. ATM can be operated by using the SIM (Subscriber Identity Module) in the mobile phone .When we insert our SIM in the reader unit of the ATM, it connects the mobile to the server. In server we can collect the related information of the mobile number, i.e, the users account detail, their photo etc. Camera in the ATM will capture the user’s image to the server. If the image in the server and camera matches, it proceeds for PIN number and the processing begins. Else the process is terminated. Using this kind of system need for ATM card is completely eliminated. We can operate the ATM machine by using our SIM itself. By using this malfunctions can be avoided. Our transaction will be more secured. I. INTRODUCTION An automated teller machine (ATM) or banking machine (ABM) is a computerized telecommunications device that provides the clients of a financial institution with access to financial transactions in a public space without the need for a cashier, human clerk or bank teller. On most modern ATMs, the customer is identified by inserting a plastic ATM card with a magnetic stripe or a plastic smartcard with a chip that contains a unique card number and some security information such as name, expiry date and CVV(Card Verification Value). Authentication is provided by the customer entering a Personal Identification Number (PIN). Using an ATM, customers can access their bank accounts in order to make cash withdrawals (or credit card cash advances) and check their account balances as well as make use for purchase in shops. ATM’s often provides the best possible exchange rate for foreign travellers. In this paper, automated functions are performed via image processing and transaction upon Subscriber Identity Module security maintenance is provided by behaviour recognition. Effective mobile communication is ensured throughout the entire process. Alert module is provided during an illicit transaction. Mobile scanning device scans SIM number through GSM Modem, at the same time web camera captures the images. Using Digital Signal Processing functions they are verified, if images and PIN number are same then further process begins, otherwise it leaves an alarm through Alert module. Information’s are processed and intimated to customer by voice annunciator module. II. GSM MODEM Global System for Mobile communication (GSM) is a globally accepted standard fo-r digital cellular communication. A GSM modem acts like a dial-up modem, being an external device. Typically, an external GSM modem is connected to a computer Fig. 1: Block Diagram of the System through a serial cable or a USB cable. System uses AT commands to control modems. GSM modems also support an extended set of AT commands than normal dialup modem. These extended AT commands are defined in the GSM standards. With the extended AT commands, one can do things like:Reading, writing and deleting SMS messages. 1) Sending SMS messages. 2) Monitoring the signal strength. 3) Monitoring the charging status and charge level of the battery. 4) Reading, writing and searching phone book entries. The number of SMS messages that can be processed by a GSM modem per minute is very low -- only about six to ten SMS messages per minute. Fig. 2: GSM Modem
  • 2. Third Generation Automatic Teller Machine (IJSRD/Vol. 1/Issue 4/2013/0051) All rights reserved by www.ijsrd.com 1028 III. FACE RECOGNITION Principal component analysis (PCA) involves a mathematical procedure which extracts facial features for recognition, this approach transforms face images into a smallest of characteristic feature images called Eigen faces. The first principal component accounts for as much of the variability in the data as possible, and each succeeding component accounts for as much of the remaining variability as possible. These methods capture the local facial features and their geometric relationships. They often locate anchor points at key facial features (eyes, nose, mouth, etc.), connect these points to form a net and then measure the distances and angles of the net to create a unique face ‘print’. Fig. 3: PCA: Principal Component Analysis It converts the input and database face images to corresponding Eigen values. Eigen value corresponds to the energy of the face images. These Eigen values are compared. Here is how Eigen value is calculated? 1) Read image. 2) Find its mean value = average of the colour 3) Find difference image = input image-mean 4) Co-variance matrix = gives effective colour 5) 5. Eigen value = gives energy of image IV. SOFTWARE SIMULATION Fig. 4: Software Simulation Block Diagram Logic synthesizer, Synthesizer transforms the VHDL into a net list. The net list is just a description of the various logic gates in our design and how they are interconnected Implementation phase. It employs three different tools. A translator merges together one or more net lists along with any design constraints. This is fed to a mapper that combines gates in the net list into groups that will fit efficiently into the LUTs of the FPGA. The gate groupings are sent to the place & route tool that assigns them to LUTs at various locations in the FPGA and then determines how to connect them together using the routing resources (wires) in the switching matrix. This part takes the most time as finding a placement that can be routed efficiently requires a lot of computation bit stream generator it takes the output of the implementation phase, combines it with a few other configuration settings, and outputs a binary bit stream. This bit stream (which, depending upon the size of the FPGA can be many megabits in length) contains the truth-tables that will be loaded into the RAM of every LUT and the connection settings for the wiring matrix that will connect them. At this point, a bit stream is just a bunch of 1s and 0s in a file on the computer. The downloader will transfer this file into a physical FPGA chip. In most cases, this chip is already mounted on a circuit board where it waits for the bit stream that will make it perform its intended function. ATM status report block It send status of different ATM, whether working or not .to particular customer mobile via Spartan 3a hardware and UART. V. CONCLUSION From this we implement image-recognition techniques that can provide the important functions required by advanced intelligent ATM Security, to avoid theft and protect the usage of unauthenticated users. Secured and safety environment system for automobile users will be provided by implementing this project. We can predict the theft by using this system in our day to day life. We Predict and indent system for the society. REFERENCES [1] Faune Hughes, Daniel Lichter, Richard Oswald, and Michael Whitfield ,Face Biometrics: A Longitudinal Study, Seidenberg School of CSIS, Pace University, White Plains, NY 10606,USA. [2] Gary G.Yen, Nethrie Nithianandan, Facial Feature Extraction Using Genetic Algorithm, Intelligent Systems and Control Laboratory School of Electrical and Computer Engineering. Oklahoma State University, Stillwater, OK 74074-5032, USA [3] D.L. Jiang, Y.X. Hu, S.C. Yan, H.J. Zhang, "Efficient 3D Reconstruction for Face Recognition", 0031_3203/2004 Pattern recognitionsociety:doi:10.1016/j.patcog.2004.11.004 [4] Animetrics offers FaceRℱ CredentialME service on Sprint 3G and 4G networks August 12th, 2010.