Home / Computer Science / Design and implementation of a computerised online monetary transaction system

Design and implementation of a computerised online monetary transaction system

 

Table Of Contents


<p> </p><p>Title page &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; –<br>Certification &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; –<br>Dedication – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; –<br>Acknowledgment – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; –<br>Abstract &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>Table of contents – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –</p><p><strong>

Chapter ONE

- INTRODUCTION</strong><br>1.0 &nbsp; &nbsp; Introduction &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>1.1 &nbsp; &nbsp; Theoretical Background &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>1.2 &nbsp; &nbsp; Statement of Problem &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>1.3 &nbsp; &nbsp; Aim and Objectives of Study – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>1.4 &nbsp; &nbsp; Significance of Study &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>1.5 &nbsp; &nbsp; Scope of the Study – &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>1.6 &nbsp; &nbsp; Organization of study &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>1.7 &nbsp; &nbsp; Definition of Terms &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –</p><p><strong>

Chapter TWO

</strong><br><strong>REVIEW OF RELATED LITERATURE</strong><br>2.0 &nbsp; &nbsp; Introduction &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>2.1 &nbsp; &nbsp; Overview of Online Monetary transaction – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>2.2 &nbsp; &nbsp; Concept of Monetary Transaction &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>2.3 &nbsp; &nbsp; Features of Online Monetary Transaction – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>2.4 &nbsp; &nbsp; Security of Online Transaction &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>2.5 &nbsp; &nbsp; Attacks of Online transaction System &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>2.6 &nbsp; &nbsp; Counter Measures of Net-Banking System – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>2.7 &nbsp; &nbsp; Advantages and Disadvantages of Online Monetary<br>Transaction &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>2.7-1 Client Focus &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>2.7-2 Cost Reduction &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>2.7-3 Market Expansion &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>2.8 &nbsp; &nbsp; Risks of Online Banking &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>2.8-1 Strategic Risk &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>2.8-2 Operational Risk – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>2.8-3 Legal Risk &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>2.8-4 Reputational Risk &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –</p><p><strong>

Chapter THREE

: </strong>SYSTEM ANALYSIS AND DESIGN<br>3.0 &nbsp; &nbsp; Introduction &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>3.1 &nbsp; &nbsp; Research Methodology – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>3.2 &nbsp; &nbsp; System Analysis – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>3.2-1 Analysis of the Existing System &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>3.2-2 Problems of the Existing System &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>3.2-3 Analysis of the Proposed System &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>3.2.3-1 Advantages of Proposed System &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>3.2.3-2 Disadvantages of Proposed System &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>3.3 &nbsp; &nbsp; System Design &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>3.3.1 Input Layout &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>3.3.2 Program Flowchart &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>3.3.3 Output Layout &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –</p><p><strong>

Chapter FOUR

:</strong>&nbsp;SYSTEM IMPLEMENTATION<br>4.0 &nbsp; &nbsp; Introduction &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>4.1 &nbsp; &nbsp; System Flowchart &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>4.2 &nbsp; &nbsp; Choice of Programming language &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>4.3 &nbsp; &nbsp; Analysis of Modules &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>4.4 &nbsp; &nbsp; Programming Environment &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>4.5 &nbsp; &nbsp; System Implementation &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; — &nbsp; &nbsp; &nbsp; –</p><p><strong>

Chapter FIVE

: </strong>CONSTRAINTS OF THE STUDY, SUMMARY, CONCLUSION AND RECOMMENDATIONS<br>5.0 &nbsp; &nbsp; Introduction &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>5.1 &nbsp; &nbsp; Constraints of the Study &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>5.2 &nbsp; &nbsp; Summary &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>5.3 &nbsp; &nbsp; Conclusion – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp;–<br>5.4 &nbsp; &nbsp; Recommendations &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>References – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>Appendix A: Program Flowchart &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>Appendix B: Source Code &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>Appendix C: System Output &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –</p> <br><p></p>

Project Abstract

Project Overview

Introduction
Thousands of banks perform millions of monetary transactions every day and thousands of users follow almost the same banking system. the number of users increases more banks and more staff; are needed it means more money has to be put this system. If advanced computerized based banking system is developed, so there is no need to open new branches in remote areas or same branch provides services to other banking system example ATM system.
Banking system requires authenticity and validity if a system provides these basic logic that mean we can developed a new system that authenticate and validate the user and user can do any type of virtual or monetary transaction any time any where in minimum amount of time. One of the most authentic codes for recognition of any person is signature. It always appear on almost all types of documents, such as property documents, bank cheques, and credit slips, thus signature has a great importance in our daily life, therefore automatic signature verification is important in the field of document analysis and processing for which a lot of work has been done in the past.
Online monetary transaction system allows customers of financial institutions to conduct financial transactions on secure website operated by the institution, which can be a retail or virtual book, credit union or building society. To access a financial institution’s online banking facility; a customer having personal internet access must register with the institution for the services, and setup some password (under various names) for customer verification.
Financial institutions new routinely allocate customers number (also under various names), whether or not customers intend to access their online monetary transaction system facility. Customer numbers are normally not the same as account numbers, because more than one account numbers can be linked to one customer number. The customer will link to the customer number.
To access online banking, the customer would go to the financial institution’s website, and enter the online banking facility using the customer number and password. Some financial institutions have setup additional security steps for access, but there is no consistency to the approach adopted.
Net banking offers an inexpensive alternative to banking to expand a bank’s customer base and many banks are using online banking to increase the quality of services to their customers. Many banks have opened websites on the internet and many plan to offer banking services over the internet.

Blazingprojects Mobile App

πŸ“š Over 50,000 Project Materials
πŸ“± 100% Offline: No internet needed
πŸ“ Over 98 Departments
πŸ” Software coding and Machine construction
πŸŽ“ Postgraduate/Undergraduate Research works
πŸ“₯ Instant Whatsapp/Email Delivery

Blazingprojects App

Related Research

Computer Science. 3 min read

Predicting Disease Outbreaks Using Machine Learning and Data Analysis...

The project topic, "Predicting Disease Outbreaks Using Machine Learning and Data Analysis," focuses on utilizing advanced computational techniques to ...

BP
Blazingprojects
Read more β†’
Computer Science. 2 min read

Implementation of a Real-Time Facial Recognition System using Deep Learning Techniqu...

The project on "Implementation of a Real-Time Facial Recognition System using Deep Learning Techniques" aims to develop a sophisticated system that ca...

BP
Blazingprojects
Read more β†’
Computer Science. 2 min read

Applying Machine Learning for Network Intrusion Detection...

The project topic "Applying Machine Learning for Network Intrusion Detection" focuses on utilizing machine learning algorithms to enhance the detectio...

BP
Blazingprojects
Read more β†’
Computer Science. 3 min read

Analyzing and Improving Machine Learning Model Performance Using Explainable AI Tech...

The project topic "Analyzing and Improving Machine Learning Model Performance Using Explainable AI Techniques" focuses on enhancing the effectiveness ...

BP
Blazingprojects
Read more β†’
Computer Science. 4 min read

Applying Machine Learning Algorithms for Predicting Stock Market Trends...

The project topic "Applying Machine Learning Algorithms for Predicting Stock Market Trends" revolves around the application of cutting-edge machine le...

BP
Blazingprojects
Read more β†’
Computer Science. 2 min read

Application of Machine Learning for Predictive Maintenance in Industrial IoT Systems...

The project topic, "Application of Machine Learning for Predictive Maintenance in Industrial IoT Systems," focuses on the integration of machine learn...

BP
Blazingprojects
Read more β†’
Computer Science. 4 min read

Anomaly Detection in Internet of Things (IoT) Networks using Machine Learning Algori...

Anomaly detection in Internet of Things (IoT) networks using machine learning algorithms is a critical research area that aims to enhance the security and effic...

BP
Blazingprojects
Read more β†’
Computer Science. 3 min read

Anomaly Detection in Network Traffic Using Machine Learning Algorithms...

Anomaly detection in network traffic using machine learning algorithms is a crucial aspect of cybersecurity that aims to identify unusual patterns or behaviors ...

BP
Blazingprojects
Read more β†’
Computer Science. 3 min read

Predictive maintenance using machine learning algorithms...

Predictive maintenance is a proactive maintenance strategy that aims to predict equipment failures before they occur, thereby reducing downtime and maintenance ...

BP
Blazingprojects
Read more β†’
WhatsApp Click here to chat with us