This project was centered on card based security system. The current process of security is being operated manually and due to this procedure numerous problem are been encountered. A design was taken to computerized the manual process in order to check this problem. The problems were identified after series of interviews and examination of documents after which analysis was made and a computerized procedure recommended. This project will also suggest how to successfully implement the computerized procedure and to overcome the obstacle that would hinder the successful implementation of the system. The new system was designed using Microsoft visual basic 6.0 programming language. This language was chosen because of its easy syntax and features for developing windows based applications.
1.0 INTRODUCTION AND HISTORICAL BACKGROUND
The idea of self-service in retail banking developed through independent and simultaneous effort in Japan, Sweden, the United States and the United Kingdom. In the USA, Luther George Sunsjan has been wrongly credited with developing and building the first cash dispenser machine.
There is no evidence to suggest that Sunsjan worked in this device before 1959 while his 132nd patent was first filled in June 30, 1960 (and granted 26 February, 1963).
The roll out of the machine, called bank graph, was delayed a couple of years. This was particularly due to Sunjlan’s reflection electronics being acquired by universal match corporation. An experimental Bank graph was installed in New York City in 1961 by the bank of New York, but removed after 6 months due to the lack of customer’s acceptance. The bank graph, however embodied the pre-occupation by its banking in finding alternative means to capture deposits, while the concern of the European and Asian Bank was cash distribution.
The first cash dispensing device used in Tokyo in 1966. Although little known of this first device, it seems to have been activated with a credit and rather accessing current account balances. This technology has no immediate consequences in the international market 1972. In the UK, IBM (international business machine) 2984 was designed at the required of bank. The 2984 CIT (cash issuing terminal was the first cashpoint, similar in function till today’s machines; cash point is still registered trademark of TSB in the UK. All are online and issued a variable amount which was immediately deducted from the account. A small number of 2984’s were supplied to a US bank. Notable historical model of ATM’s include 10xx and TSB 900 series and NOR 50xx series.
1.1 OBJECTIVE OF THE STUDY
To total aim of this project work is to implement a card – based security for customers withdraw using Ecobank as a case study.
This project involves the running of the card based machine (ATM) and also explain the reason for the proposed project.
Generally, this project work should be test effectively the system (card–based security) can be compared with the manual based security.
1.2 STATEMENT OF PROBLEM
One of the major problems in banking industry is account fraud. Appreciation of card based security which is significant different from other security based system as going to reduce the rate of fraud in banking sector.
1.3 SIGNIFICANCE OF THE STUDY
This project work will enhance the security of the customer’s account and transaction. It makes customer to access their bank account in order to make cash withdrawals and check their account balances as well as purchase cell phone prepaid credit without entering into their banking hall.
📚 Over 50,000 Project Materials
📱 100% Offline: No internet needed
📝 Over 98 Departments
🔍 Software coding and Machine construction
🎓 Postgraduate/Undergraduate Research works
📥 Instant Whatsapp/Email Delivery
The project topic, "Predicting Disease Outbreaks Using Machine Learning and Data Analysis," focuses on utilizing advanced computational techniques to ...
The project on "Implementation of a Real-Time Facial Recognition System using Deep Learning Techniques" aims to develop a sophisticated system that ca...
The project topic "Applying Machine Learning for Network Intrusion Detection" focuses on utilizing machine learning algorithms to enhance the detectio...
The project topic "Analyzing and Improving Machine Learning Model Performance Using Explainable AI Techniques" focuses on enhancing the effectiveness ...
The project topic "Applying Machine Learning Algorithms for Predicting Stock Market Trends" revolves around the application of cutting-edge machine le...
The project topic, "Application of Machine Learning for Predictive Maintenance in Industrial IoT Systems," focuses on the integration of machine learn...
Anomaly detection in Internet of Things (IoT) networks using machine learning algorithms is a critical research area that aims to enhance the security and effic...
Anomaly detection in network traffic using machine learning algorithms is a crucial aspect of cybersecurity that aims to identify unusual patterns or behaviors ...
Predictive maintenance is a proactive maintenance strategy that aims to predict equipment failures before they occur, thereby reducing downtime and maintenance ...