نتایج جستجو برای: automatic teller machine

تعداد نتایج: 393440  

2011
Stephen Abban Kwaku Tano-Debrah

The metallic keypads of automatic teller machines (ATMs) were examined to investigate their potential as sources of food borne pathogen. The procedure involved culturing and identifying swabs of the keypads of five ATMs, swabs of disinfected fingers and swabs of disinfected fingers used in a cash-redraw simulation. The results indicated the possibility of cross-contamination of the fingers duri...

2006
Jong-Hyeon Lee

There have been many studies on the management of personal information such as PIN code, password, etc. Most schemes include a server containing explicit personal information, and if one can attack this server successfully, then he/she can reach whole personal information on the server. Since information is centralised, the responsibility for services and information is also centralised. There ...

2015
Young Ho Park Seung Yong Kwon Tuyen Danh Pham Kang Ryoung Park Dae Sik Jeong Sungsoo Yoon

An algorithm for recognizing banknotes is required in many fields, such as banknote-counting machines and automatic teller machines (ATM). Due to the size and cost limitations of banknote-counting machines and ATMs, the banknote image is usually captured by a one-dimensional (line) sensor instead of a conventional two-dimensional (area) sensor. Because the banknote image is captured by the line...

2013
Mohammad Esmaeil Akbari Mohsen Gorban Movahhed

1 Department of Electrical Engineering, Ahar Branch, Islamic Azad University, Ahar, Iran [email protected] 2 Department of Electrical Engineering, Ahar Branch, Islamic Azad University, Ahar, Iran [email protected] ABSTRACT In this paper the real time operation of an automatic teller machine (ATM) is analyzed using a Timed Petri Net (TPN) model. In the modeling, the probabili...

2012
Gaurav Sharma Ajay Kakkar

In separate used systems, the computers are exposed to the other users. To keep the data secured from different users various encryption algorithms are entered. As computer systems become more pervasive and complex, security is increasingly important. Cryptographic algorithms and protocols constitute the central component of systems that protect network transmissions and store data. Encryption ...

1999
Constantine Kotropoulos Anastasios Tefas Ioannis Pitas C. Fernández F. Fernández

In this paper, the performance of morphological dynamic link architecture (MDLA) is assessed under optimal and real operating conditions. It is shown that MDLA achieves a very low equal error rate on the extended M2VTS database which contains 295 persons’ video data in 8 shots recorded under optimal conditions. However, its performance severely deteriorates, when it is applied to the IBERMATICA...

2007
DARIUS DILIJONAS LIDIJA BASTINA

Paper analyzes optimization scopes of electronic systems involved in retail banking and presents an approach to cash management and support system for automatic teller machine (ATM) network. This approach is based on an agent oriented technologies. According researches we described most suitable system architecture for ATM cash management and support system. Different software platforms and age...

2010
CSABA SzABO

The paper deals with the technical background and the pedagogical issues of a specific implementation for the collection, assessment and archiving of the students' assignments written in Java. The implemented system automatically applies objectoriented metrics on the collected works in order to measure the characteristic features of the assignments. Tutors use these results for the detection of...

Journal: :Industrial Management and Data Systems 2004
Jeongwook Kim Jintae Kim Sooyong Park Vijayan Sugumaran

As systems get complex, requirements elicitation and analysis are becoming increasingly difficult and important in software development. Even though various analysis methods have been proposed, including scenario-based analysis, goal-based analysis, combining goal with scenario and use case-driven analysis – each method has its own strengths and weaknesses and do not support requirements elicit...

2003
David N. Jansen Holger Hermanns Joost-Pieter Katoen

Performance, dependability and quality of service (QoS) are prime aspects of the UML modeling domain. To capture these aspects effectively in a modeling language requires easy-to-use support for the specification and analysis of randomly varying behaviors. This paper introduces an extension of UML statecharts with randomly varying durations, by enriching a specific syntactic construct: The “aft...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید