Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Integration of Multi Bank Multi user in Single Card With user Behavior Monitoring using Hmm & Formula Verification

Author : Jayakeerthi A N 1 Pavithra R 2 Prithikka V 3 Mrs. M Kiruthiga Devi 4

Date of Publication :9th March 2017

Abstract: Usage of ATM cards for transaction has become very common, hence managing of multiple accounts becomes tedious. A solution to this issue is to integrate multi bank multi user in a single card along with user behavior monitoring. In this system Big Data, Business analytical and RFID like technology are integrated to provide solution to this most challenge oriented activity. The implementation involves developing an application for a Banking sector particularly for a Debit / ATM card section. RFID smart card is used as ATM Card for transaction, users can create account and get the card from the bank.They can access their cards with unique identity numbers accordingly. Users can include their family members’ accounts details in the same card and their behavior is monitored through HMM algorithm, verified using OTP and authenticated using formula based method. They can withdraw cash from their accounts after successful authentication of the corresponding PIN numbers and OTP along with formula based authentication

Reference :

    1. N. Manwani and P. S. Sastry, “Noise tolerance under risk minimization,” IEEE Trans. Cybern., vol. 43, no. 3, pp. 1146–1151, Jun. 2013
    2. H. K. Chan and F. T. S. Chan, “Early order completion contract approach to minimize the impact of demand uncertainty on supply chains,” IEEE Trans. Ind. Informat., vol. 2, no. 1, pp. 48–58, Feb. 2006
    3. G. M. Gaukler, “Item-level RFID in a retail supply chain with stockout- based substitution,” IEEE Trans. Ind. Informat., vol. 7, no. 2, pp. 362–370, May 2011.
    4. K. Govindan, A. Jafarian, M. E. Azbari, and T.-M. Choi, “Optimal bi-objective redundancy allocation for systems reliability and risk management,” IEEE Trans. Cybern., to be published.
    5. B. Shen, T.-M. Choi, Y. Wang, and C. K. Y. Lo, “The coordination of fashion supply chains with a risk-averse supplier under the markdown money policy,” IEEE Trans. Syst., Man, Cybern., Syst., vol. 43, no. 2, pp. 266–276, Mar. 2013.
    6. H. M. Markowitz, Portfolio Selection: Efficient Diversification of Investment. New York, NY, USA: Wiley, 1959.
    7. D. D. Wu and D. Olson, “Enterprise risk management: A DEA VaR approach in vendor selection,” Int. J. Prod. Res., vol. 48, no. 16, pp. 4919–4932, 2010.
    8. D. D. Wu and D. Olson, “Enterprise risk management: Coping with model risk in a large bank,” J. Oper. Res. Soc., vol. 61, no. 2, pp. 179–190, 2010.
    9. D. L. Olson and D. D. Wu, “Risk management models for supply chain: A scenario analysis of outsourcing to China,” Supply Chain Manag. Int. J., vol. 16, no. 6, pp. 401–408, 2011.
    10. V. Agrawal and S. Seshadri, “Risk intermediation in supply chains, ”IIE Trans., vol. 32, no. 9, pp. 819–831, 2000.
    11. S. K. Mukhopadhyay, X. Zhu, and X. Yue, “Optimal contract design for mixed channels under information asymmetry,” Prod. Oper. Manag., vol. 17, no. 6, pp. 641– 650, 2008.

Recent Article