Premium Essay

National Conference on Research Trends in Computer Science and Technology

In:

Submitted By ogbuefi
Words 2126
Pages 9
International Journal of Electronics Communication and Computer Engineering Volume 3, Issue (1) NCRTCST, ISSN 2249 –071X

National Conference on Research Trends in Computer Science and Technology - 2012

Implementation of ATM Security by Using Fingerprint recognition and GSM
PENNAM KRISHNAMURTHY (M.Tech)
Email: ecemurthy@gmail.com

MR. M. MADDHUSUDHAN REDDDY M.TECH
Email: maddhusudhanreddi@gmail.com

Abstract - The main objective of this system is to develop an embedded system, which is used for ATM security applications. In these systems, Bankers will collect the customer finger prints and mobile number while opening the accounts then customer only access ATM machine. The working of these ATM machine is when customer place finger on the finger print module when it access automatically generates every time different 4-digit code as a message to the mobile of the authorized customer through GSM modem connected to the microcontroller. The code received by the customer should be entered by pressing the keys on the touch screen. After entering it checks whether it is a valid one or not and allows the customer further access. Keywords - ATM terminal; ARM9; fingerprint recognition; image enhancement; GSM MODEM.

II. THE CHARACTERISTICS OF THE SYSTEM DESIGN
The embedded ATM client authentication system is based on fingerprint recognition which is designed after analyzed existed ATM system. The S3C2440 chip is used as the core of these embedded system which is associated with the technologies of fingerprint recognition and current high speed network communication. The primary functions are shown as follows: • Fingerprint recognition: The masters' fingerprint information was used as the standards of identification. It must certify the feature of the human fingerprint before using ATM system. • Remote authentication: System can compare current client's

Similar Documents

Premium Essay

Research Methods In Computer Science

...A Report On “RESEARCH METHODS IN COMPUTER SCIENCE” Submitted by Nitish Ashok Shinde (5210) ME Comp- I 2nd shift Introduction Computer Science has proved its importance in various domains of science like natural sciences, social sciences, humanities and cultural science [1]. Computer science (CS) characterized as an empirical discipline, in which each new program can be seen as an experiment, the structure and behavior of which can be studied [2]. The term Information and Communication Technology (ICT) is analogous to Information Technology, but it stresses more on role of technologies like telecommunications, computers, software's, etc, which enable users to access, store, and manipulate information [3]. Research methods...

Words: 834 - Pages: 4

Premium Essay

Atm Security Enhancement

...International Journal of Electronics Communication and Computer Engineering Volume 3, Issue (1) NCRTCST, ISSN 2249 –071X National Conference on Research Trends in Computer Science and Technology - 2012 Implementation of ATM Security by Using Fingerprint recognition and GSM PENNAM KRISHNAMURTHY (M.Tech) MR. M. MADDHUSUDHAN REDDDY M.TECH Email: ecemurthy@gmail.com Email: maddhusudhanreddi@gmail.com Abstract - The main objective of this system is to develop an embedded system, which is used for ATM security applications. In these systems, Bankers will collect the customer finger prints and mobile number while opening the accounts then customer only access ATM machine. The working of these ATM machine is when customer place finger on the finger print module when it access automatically generates every time different 4-digit code as a message to the mobile of the authorized customer through GSM modem connected to the microcontroller. The code received by the customer should be entered by pressing the keys on the touch screen. After entering it checks whether it is a valid one or not and allows the customer further access. Keywords - ATM terminal; ARM9; fingerprint recognition; image enhancement; GSM MODEM. INTRODUCTION Now-a-days, in the self-service banking system has got extensive popularization with the characteristic offering high-quality 24 hours service for customer. Using the ATM (Automatic Teller Machine) which provide customers...

Words: 2126 - Pages: 9

Free Essay

Ict in Service Delievry

...The International Journal Of Engineering And Science (IJES) ||Volume||2 ||Issue|| 8 ||Pages|| 37-43||2013|| ISSN(e): 2319 – 1813 ISSN(p): 2319 – 1805 The Impact Of Information And Communication Technology (Ict) Compliant Librarians On Library Services Delivery In Academic Library: The Case Of National Open University Of Nigeria(Noun)Library By Nebeolise, Lucy Ndidiamaka National Open University of Nigeria,Victoria Island , Lagos -----------------------------------------------------ABSTRACT----------------------------------------------------- The study aimed at examining the impact of information and communication Technology (ICT) compliant librarians on library services delivery on NOUN library. The paper traces briefly the history of National Open University Library. The e-resources, staff strengths are highlighted. The study adopted the descriptive survey method. The questionnaire was used as instrument for data collection. A total of fifty (50) questionnaires were distributed and collected back. The data collected were analyzed with the use of tables and simple percentages. From the analysis of the data collected, it was found that the use of ICT compliant librarians on library service delivery aids immensely in the development of NOUN library, quick delivery of information services, access and easy retrieval of information by users. The study shows thatInadequate ICT skilled professional...

Words: 4437 - Pages: 18

Premium Essay

Motion Vector

...International Journal of Engineering Trends and Technology- Volume3Issue3- 2012 Hiding Messages Using Motion Vector Technique In Video Steganography P.Paulpandi1, Dr.T.Meyyappan,M.sc.,M.Phil.,M.BA.,Ph.D2 Research Scholar1, Associate professor2 Department of Computer Science & Engineering, Alagappa University,Karaikudi. Tamil Nadu,India. Abstract- Steganography is the art of hiding information in ways that avert the revealing of hiding messages.Video files are generally a collection of images. so most of the presented techniques on images and audio can be applied to video files too. The great advantages of video are the large amount of data that can be hidden inside and the fact that it is a moving stream of image. In this paper, we proposed a new technique using the motion vector, to hide the data in the moving objects. Moreover, to enhance the security of the data, the data is encrypted by using the AES algorithm and then hided. The data is hided in the horizontal and the vertical components of the moving objects. The PSNR value is calculated so that the quality of the video after the data hiding is evaluated. Keywords- Data hiding, Video Steganography,PSNR, Moving objects, AES Algorithm. I. INTRODUCTION Since the rise of the Internet one of the most important factors of information technology and communication has been the security of information. Steganography is a technology that hides a user defined information within an object, a text...

Words: 2564 - Pages: 11

Premium Essay

Sanderson

...Polytechnic Institute, Affiliate of Sloan Foundation Industry Studies Centers Major Interests: • Innovation Management • Product Design, Marketing and Brand Management • Innovative Teaching Approaches (Multimedia Enhanced on campus and Distance Learning) AWARDS 1995 Boeing Outstanding Educator Award Hesburg Award Team (for Educational Innovation) In 1995, I was a co-recipient of the Boeing Outstanding Educator Award and a member of the team receiving the Hesburg Award for Educational Innovation TEACHING Teaching Role. My recent teaching has been in Rensselaer’s resident MBA program (both full and parttime), Professional and Distance Education Program and undergraduate programs. My research and teaching have made important contributions to efforts to build the marketing and management and technology curricula in the School of Management at Rensselaer and at other universities who have adopted our teaching materials. As a pioneer in interactive leaning material on product development and manufacturing, I have developed several interactive multimedia cases and collaborated on the development of simulations designed to teach marketing principles and bridge management and engineering disciplines. The simulations teach marketing, design and manufacturing concepts by exposing students to tradeoffs inherent in new product development. They help provide an understanding of design, manufacturing, and marketing decisions, as well as cash and investment flows, inventory management, and product ...

Words: 9701 - Pages: 39

Premium Essay

An Evolution of Computer Science Research

...Abbreviated version of this report is published as "Trends in Computer Science Research" Apirak Hoonlor, Boleslaw K. Szymanski and M. Zaki, Communications of the ACM, 56(10), Oct. 2013, pp.74-83 An Evolution of Computer Science Research∗ Apirak Hoonlor, Boleslaw K. Szymanski, Mohammed J. Zaki, and James Thompson Abstract Over the past two decades, Computer Science (CS) has continued to grow as a research field. There are several studies that examine trends and emerging topics in CS research or the impact of papers on the field. In contrast, in this article, we take a closer look at the entire CS research in the past two decades by analyzing the data on publications in the ACM Digital Library and IEEE Xplore, and the grants awarded by the National Science Foundation (NSF). We identify trends, bursty topics, and interesting inter-relationships between NSF awards and CS publications, finding, for example, that if an uncommonly high frequency of a specific topic is observed in publications, the funding for this topic is usually increased. We also analyze CS researchers and communities, finding that only a small fraction of authors attribute their work to the same research area for a long period of time, reflecting for instance the emphasis on novelty (use of new keywords) and typical academic research teams (with core faculty and more rapid turnover of students and postdocs). Finally, our work highlights the dynamic research landscape in CS, with its focus constantly moving...

Words: 15250 - Pages: 61

Premium Essay

Tools

...field (also called Electronic Government, Digital Government, Electronic Governance, and similar names) emerged in the late 1990´s. Since then it spurred several scientific conferences and journals. Because the field grew considerably in size, both its contents and position with respect to other research fields and disciplines need to be explained and discussed. What is e-Gov? What is e-Gov research? What does it mean for the field of Information Systems? This paper briefly sketches the short eGov history and current status, and discusses the content of the field as it appears in current research. We conclude with a discussion of e-Gov as a research field of interest both as a new application area for IS theories and methods and as a source of new insight. Keywords: electronic government, governance I. INTRODUCTION The e-Gov (Electronic Government or Electronic Governance) field1 emerged in the late 1990´s as a context within which to share experiences among practitioners. Over the past few years eGov gave rise to several conferences with more and more scientific content. Some specialized journals now appear. Because the field grew to considerable size, both its contents and position with respect to other research fields and disciplines needs to be explained and discussed. What is e-Gov? What is e-Gov research? What does it mean for the field of Information Systems? Synonyms for e-Gov include digital government, one-stop government, and online government. While digital government...

Words: 8545 - Pages: 35

Premium Essay

The Impact of Information Technology in Nigeria’s Banking Industry

...JOURNAL OF COMPUTER SCIENCE AND ENGINEERING, VOLUME 7, ISSUE 2, JUNE 2011 63 The Impact of Information Technology in Nigeria’s Banking Industry 1 Oluwagbemi Oluwatolani 2Abah Joshua and 3Achimugu Philip Abstract-Today, information technology (IT) has become a key element in economic development and a backbone of knowledgebased economies in terms of operations, quality delivery of services and productivity of services. Therefore, taking advantage of information technologies (IT) is an increasing challenge for developing countries. There is now growing evidence that Knowledgedriven innovation is a decisive factor in the competitiveness of nations, industries, organizations and firms. Organizations like the banking sector have benefited substantially from e-banking, which is one among the IT applications for strengthening the competitiveness. This paper presents the current trend in the application of IT in the banking industries in Nigeria and gives an insight into how quality banking has been enhanced via IT. The paper further reveals that the deployment of IT facilities in the Nigerian Banking industry has brought about fundamental changes in the content and quality of banking business in the country. This analysis and clarification of how Nigerian Banks have used IT to reengineer their operations is detailed through literature review and observation. Three categories of variables that relate to the use and implementation of information technology devices were considered...

Words: 2996 - Pages: 12

Premium Essay

Lindo Enterprise

...EDUCATION Ph.D. Information Science & Technology, Syracuse University (Sept 2004- Sept 2010) Dissertation Topic: Leadership perceptions and behaviors in self-managing virtual teams (Open Source Software Development Teams). Chair: Dr. Robert Heckman Committee Members: Dr. Kevin Crowston, Dr. Nora Misiolek, Dr. Derrick Cogburn M.B.A. Specializations in Supply Chain Management, and Global Entrepreneurship, Syracuse University (Syracuse, NY. 2001-2003) GPA: 3.8 / 4.0 M.S. Information Management, Syracuse University (Syracuse, NY, 2000-2002) GPA: 3.9 / 4.0 B.S. Business Administration, Middle East Technical University (Ankara, 1996-2000) GPA: 3.7 / 4.0 JOURNAL ARTICLES Eseryel, U. Y., Eseryel, D. (Submitted). Leading by Doing Work: Leadership in Self-Managing Virtual Teams. Crowston, K., Howison, J., Chengetai, M., & Eseryel, U. Y. (2007). A Balancing Act: The role of face-to-face meetings in technology-supported self-organizing distributed teams. IEEE Transactions on Professional Communications, 50(3), 185-203. Crowston, K., Li, Q., Wei, K., Eseryel, U. Y., & Howison, J. (2007). Self-organization of teams in free/libre open source software development. Information and Software Technology Journal, Special Issue on Qualitative Software Engineering Research, 49(6), 564-575. Nicholson, S., Sierra, T., Eseryel, U. Y., Park, J., Barkow, P., Pozo, E., & Ward, J. (2006).  How much of it is real? Analysis of paid placement in Web search engine results. Journal...

Words: 4481 - Pages: 18

Premium Essay

Social Networking and Education: Emerging Research Within Cscl

...Social Networking and Education: Emerging Research within CSCL Abstract: In this paper I introduce a youth-initiated practice: online social networking that is transforming our society in important ways and has vast implications for learning research and education. I introduce the social and technical features that characterize social networking systems and outline results from emerging research that suggests the social and intellectual practices in which participants naturally engage and how these relate to the competencies increasingly valued in formal education. Next, I discuss one research projects which I am currently pursuing that build on early work and suggest how educational programs might employ such practices to advantage. Finally, I discuss what I see as the educative value of this technology in certain contexts and suggest a course for future research and development. My overall goals are to inform other researchers interested in pursuing similar projects and to stimulate interdisciplinary conversation about where such agendas fit within and advance the aims of CSCL. Social Networking Systems: The Next Wave of CSCL? Recent conference symposia, papers and journal articles within the CSCL community have demonstrated keen interest in learning from students’ everyday out-of-school socio-technical practices about how to better develop future technology-powered contexts for learning (Barron, 2006; Fields & Kafai, 2007; Forte & Bruckman, 2008; Gardner & Kolodner, 2007;...

Words: 3735 - Pages: 15

Premium Essay

Business Intelligence

...ISSUE: BUSINESS INTELLIGENCE RESEARCH BUSINESS INTELLIGENCE AND ANALYTICS: FROM BIG DATA TO BIG IMPACT Hsinchun Chen Eller College of Management, University of Arizona, Tucson, AZ 85721 U.S.A. {hchen@eller.arizona.edu} Roger H. L. Chiang Carl H. Lindner College of Business, University of Cincinnati, Cincinnati, OH 45221-0211 U.S.A. {chianghl@ucmail.uc.edu} Veda C. Storey J. Mack Robinson College of Business, Georgia State University, Atlanta, GA 30302-4015 U.S.A. {vstorey@gsu.edu} Business intelligence and analytics (BI&A) has emerged as an important area of study for both practitioners and researchers, reflecting the magnitude and impact of data-related problems to be solved in contemporary business organizations. This introduction to the MIS Quarterly Special Issue on Business Intelligence Research first provides a framework that identifies the evolution, applications, and emerging research areas of BI&A. BI&A 1.0, BI&A 2.0, and BI&A 3.0 are defined and described in terms of their key characteristics and capabilities. Current research in BI&A is analyzed and challenges and opportunities associated with BI&A research and education are identified. We also report a bibliometric study of critical BI&A publications, researchers, and research topics based on more than a decade of related academic and industry publications. Finally, the six articles that comprise this special issue are introduced and characterized in terms of the proposed BI&A research framework. Keywords: Business...

Words: 16335 - Pages: 66

Premium Essay

Cloud Computing

...Cloud Computing for Education and Learning: Education and Learning as a Service (ELaaS) Mohssen M. Alabbadi Computer Research Institute (CRI) King Abdulaziz City for Science & Technology (KACST) Riyadh, Saudi Arabia Alabbadi@kacst.edu.sa Abstract—Cloud computing, despite its hype, is being widely deployed, with its dynamic scalability and usage of virtualized resources, in many organizations for several applications. It is envisioned that, in the near future, cloud computing will have a significant impact on the educational and learning environment, enabling their own users (i.e., learners, instructors, and administrators) to perform their tasks effectively with less cost by utilizing the available cloud-based applications offered by the cloud service providers. This paper discusses the use of cloud computing in the educational and learning arena, to be called ‟Education and Learning as a Service” (ELaaS), emphasizing its possible benefits and offerings. It is essential for an educational and learning organization, with its budget restrictions and sustainability challenges, to use the cloud formation best suited for a particular IT activity. The Jericho Forum proposes a cloud computing formation model, called the Cloud Cube Model (CCM), which is based on 4 criteria. To preserve the symmetry of the cube, a new cloud computing formation model, called the Complete Cloud Computing Formations (C3F), is proposed. The IT activities in the educational and learning organizations are...

Words: 5560 - Pages: 23

Premium Essay

Bpcl

...BUSINESS INTELLIGENCE RESEARCH BUSINESS INTELLIGENCE AND ANALYTICS: FROM BIG DATA TO BIG IMPACT Hsinchun Chen Eller College of Management, University of Arizona, Tucson, AZ 85721 U.S.A. {hchen@eller.arizona.edu} Roger H. L. Chiang Carl H. Lindner College of Business, University of Cincinnati, Cincinnati, OH 45221-0211 U.S.A. {chianghl@ucmail.uc.edu} Veda C. Storey J. Mack Robinson College of Business, Georgia State University, Atlanta, GA 30302-4015 U.S.A. {vstorey@gsu.edu} Business intelligence and analytics (BI&A) has emerged as an important area of study for both practitioners and researchers, reflecting the magnitude and impact of data-related problems to be solved in contemporary business organizations. This introduction to the MIS Quarterly Special Issue on Business Intelligence Research first provides a framework that identifies the evolution, applications, and emerging research areas of BI&A. BI&A 1.0, BI&A 2.0, and BI&A 3.0 are defined and described in terms of their key characteristics and capabilities. Current research in BI&A is analyzed and challenges and opportunities associated with BI&A research and education are identified. We also report a bibliometric study of critical BI&A publications, researchers, and research topics based on more than a decade of related academic and industry publications. Finally, the six articles that comprise this special issue are introduced and characterized in terms of the proposed BI&A research framework. Keywords:...

Words: 16335 - Pages: 66

Premium Essay

Accounting and Ngo

...CHOWDHURY, Ph.D. Professor and Dean, School of Business North South University, Dhaka, Bangladesh E-mail: hannan@northsouth.edu Phone: 8852000, Ext.1717 (O), Cell: 01713063097 Permanent Address: Mailing Address: House # 35, Road # 24, Suite # 504 House # 3, Road #78, Apt # 403, Gulshan 2, Dhaka, Bangladesh Gulshan 2, Dhaka-1212, Bangladesh EDUCATION: Post Doctoral Industrial Statistics, (Concentration: Quality Improvement) September 2002 University of Calgary, Alberta, Canada. Research: Modeling censored data for quality improvement from replicated design of experiments. Ph.D. Industrial Engineering, (Area: Production Management and Applied Statistics.) September 1999 Northeastern University, Boston, USA. Thesis: Analysis of censored life test data and robust design method for reliability improvement from highly fractionated experiments. M.S. Operations Research, (Area: Decision Science and Operations Research) June 1996 Northeastern University, Boston, USA. M.Sc. Statistics, First Class, 4th Position December 1987 Department of Statistics, Jahangirnagar University, Dhaka, Bangladesh. B.Sc. (Hons.) Statistics, First Class, 6th Position, (Minor: Mathematics, Economics), July 1986 Department of Statistics, Jahangirnagar University, Dhaka, Bangladesh. EMPLOYMENT: April 2008- present Professor, School of Business, North South University, Dhaka, Bangladesh. Teaching business statistics, operations management...

Words: 10312 - Pages: 42

Premium Essay

Survey Book

...other professions, is dynamic. This dynamism is in response to Information and Communication Technology (ICT). With the introduction of ICT into the field of library and information science (LIS), it has become imperative that library and information science practitioners possess the skill needed to function effectively in an ICT environment. Lawal (2002), quoting Francis Bacon, describes a professional as one who has mastered certain specialized intellectual techniques, and adds that it was the intellectual content which came to distinguish the profession from the medieval craft. According to him, increased specialization of skills means that the term “profession” is now used for certain occupations which enjoy prestige and which give esoteric service. Such professions include architects, surveyors, doctors, librarians and information scientists, and engineers, among others. The intellectual work of librarians derives from the application of scientific principles in organizing, storing, retrieving, and disseminating information. In recent years, the library profession has been affected by developments in ICT. Igbinosa (2007) notes that advances in ICT have changed the paradigm of librarians' work from information storage to one of access to world literature resources using electronic databases, the Internet, and other digital resources. According to Omekwu (2005), digital technology has revolutionized the information acquisition, storage, and retrieval processes. The application...

Words: 2773 - Pages: 12