نتایج جستجو برای: automated teller machin atm
تعداد نتایج: 146966 فیلتر نتایج به سال:
Models of consumer behaviour based purely upon empirical relationships in data can perform well in the short-term, but often degrade rapidly with changing circumstances. Superior longer term performance can sometimes be attained by developing models for the deeper processes underlying the consumer behaviour. In this paper, we develop a random-effects point-process model for ATM (Automated Telle...
Security and safety are a necessity for automated teller machines (ATM). The ATM security system is implemented using the Internet of things (IoT) GPS (global positioning system). main idea this project to develop an surveillance system. In project, when any physical attack against takes place, then information about sent IoT also alerts surrounding area buzzer, at same time entire data from se...
The foundations of the eld of behavioral speci cation have matured. So, case studies are the important current topics of this eld. In our previous work, we built the behavioral speci cation of the Automated Teller Machine (ATM) system by using object composition and observable projection operators. From this experience, we noticed that this approach had the following problems: there was no good...
In this paper we describe the first decades of the history of the Swedish ATM (Automated teller machine). Sweden was one of the pioneers in using ATMs, starting with cash dispensers or cash machines in 1967. The first machine was made operational and shown to the press on July 6, 1967, in Uppsala at Upsala Sparbank, only one week after the first cash machine in the world was made operational in...
In order to minimize vulnerabilities and achieve target level security, quantification of security is necessary. Unfortunately, quantitative estimation of security in design phase is largely missing. Given the need and significance of such a mechanism, an effort has been made by the authors of the paper to deduce a methodology to find out the impact of Inheritance on vulnerability propagation i...
Design phase of the software development is the most appropriate one for incorporating security decisions. Unfortunately, no efficient methodology or tool exists to address security at design phase. Almost negligible work has been reported to assess the impact of object oriented design characteristics on security, though the effort has already been made for quality. Since, the approach presente...
Security measures at banks can play a critical, contributory role in preventing attacks on customers. These measures are of paramount importance when considering vulnerabilities and causation in civil litigation. Banks must meet certain standards in order to ensure a safe and secure banking environment for their customers. This paper focuses on vulnerabilities and the increasing wave of crimina...
This paper presents an empirical study of the strategic contributions of automated teller machines (ATMs) to improving a bank branch‘s local deposit market share at the expense of its competitors. By extending previous models of deposit market share in branch banking to incorporate ATM technology variables, we develop a tool to provide answers and insights on key questions involving the evaluat...
Automated Teller Machine (ATM) frauds are escalating gradually. The principal cause for this is the repetition of same personalized identification numbers (PINs) for multiple systems or accounts. Indirect PIN entry methods though available are not yet deployed everywhere and are not user friendly. To increase security and applicability we have implemented a new PIN entry method called SteganoPI...
The automated teller machine (ATM) has been an important device in the banking sector and other financial institutions. aim of this study was to isolate identify Bacteria on keypads selected Automated Teller Machines (ATMs) Makurdi metropolis. Swab sticks soaked with sterile normal saline were used collect specimens from ATMs. swab immediately transferred laboratory Microbiology Department Biol...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید