Você está na página 1de 3

International Conference on Current Trends in Engineering and Technology, ICCTET13

421

3G ATM
AnnMary Antony R.Aswathy K.H.Keerthana Department of Electronics and Department of Electronics and Department of Electronics and Communication, Communication, Communication, Federal Institute Of Science And Federal Institute Of Science And Federal Institute Of Science And Technology, Angamaly, Technology, Angamaly, Technology, Angamaly, India. India. India. keerthanaharidask@gmail.com otherwise it gives alarm through Alert module. Each Abstract- In this project we proposed a new banking model, processing information produces by voice annunciator in which a customer can get the information of ATM, module. whether ATM is working or not. And also in this system we have created new generation ATM machine which can be operated without the ATM card. Using this system ATM machine can be operated by using our SIM in the mobile phone. When we insert our SIM in the reader unit of the ATM machine it connect the mobile to the server. In server we can collect the related information of the mobile number, i.e, the users account details, their photo etc. Camera near the ATM machine will capture the user image in the server. Only when the image matches it asks the pin number and further processing starts. Otherwise the process is terminated. So by using this system need of ATM card is completely eliminated. We can operate the ATM machine by using our SIM itself. By using this malfunctions can be avoided. Our transaction will be much secured. Keywords - Face Recognition, PCA Principal Component Analysis, Handshaking, UART, GSM. 1. Introduction A automated teller machine (ATM) or banking Machine (ABM) is a computerized telecommunications device that provides the clients of a financial institution with access to financial transactions in a public space without the need for a cashier, human clerk or bank teller. On most modern ATMs, the customer is identified by inserting a plastic ATM card with a magnetic stripe or a plastic smartcard with a chip, that contains a unique card number and some security information such as an expiration date or CVV. Authentication is provided by the customer entering a personal identification number (PIN)[1]. Using an ATM, customers can access their bank accounts in order to make cash withdrawals (or credit card cash advances) and check their account balances as well as purchase cell phone prepaid credit. If the currency being withdrawn from the ATM is different from that which the bank account is denominated. Thus, [2]ATMs often provide the best possible exchange rate for foreign travelers and are heavily used for this purpose as well. 2. Block Diagram Automated functions are performed through image processing and transaction is based on subscriber identity module Security maintenance is provided by behavior recognition. [3]Effective mobile communication is ensured for entire process. Alert module is for signaling illicit transactions. Mobile scanning device scans SIM number through GSM Modem. At the same time, web camera captures the images and comparing using digital signal processing. If images and PIN number are same then further processing continued,

Fig.1Block Diagram 3.GSM Modem Global system for mobile communication (GSM) is a globally accepted standard for digital cellular communication. GSM is the name of a standardization group established in 1982 to create a common European mobile telephone standard that would formulate specifications for a pan-European mobile cellular radio system operating at 900 MHz. A [4]GSM modem is a wireless modem that works with a GSM wireless network. A wireless modem behaves like a dial-up modem. The main difference between them is that a dial-up modem sends and receives data through a fixed telephone line while a wireless modem sends and receives data through radio waves. A GSM modem can be an external device or a PC Card / PCMCIA Card. Typically, an external GSM modem is connected to a computer through a serial cable or a USB cable. A GSM modem in the form of a PC Card / PCMCIA Card is designed for use with a laptop computer. It should be inserted into one of the PC Card / PCMCIA Card slots of a laptop computer. Like a GSM mobile phone, a GSM modem requires a SIM card from a wireless carrier in order to operate. As mentioned in earlier sections of this SMS tutorial, computers use AT commands to control modems. Both GSM modems and dial-up modems support a common set of standard AT commands. You can use a GSM modem just like a dial-up modem .In addition to the standard AT commands, GSM modems support an extended set of AT commands. These extended AT commands are defined in the GSM standards.

IEEE 2013 IEEE 32107 July 3, 2013, Coimbatore, India.

International Conference on Current Trends in Engineering and Technology, ICCTET13


With the extended AT commands, you can do things like, Reading, writing and deleting SMS messages. Sending SMS messages. Monitoring the signal strength. Monitoring the charging status and charge level of the battery. Reading, writing and searching phone book entries. The number of SMS messages that can be processed by a GSM modem per minute is very low, only about six to ten SMS messages per minute.

422

5. Software Simulation A. Logic synthesizer Synthesizer transforms the VHDL into a netlist. The netlist is just a description of the various logic gates in our design and how they are interconnected. B. Implementation phase It employs three different tools. A translator merges together one or more netlists along with any design constraints. This is fed to a mapper that combines gates in the netlist into groups that will fit efficiently into the LUTs of the FPGA. The gate groupings are sent to the place & route tool that assigns them to LUTs at various locations in the FPGA and then determines how to connect them together using the routing resources (wires) in the switching matrix. This part takes the most time as finding a placement that can be routed efficiently requires a lot of computation C. Bitstream generator It takes the output of the implementation phase, combines it with a few other configuration settings, and outputs a binary bitstream. This bitstream (which, depending upon the size of the FPGA, can be many megabits in length) contains the truth-tables that will be loaded into the RAM of every LUT and the connection settings for the wiring matrix that will connect them. At this point, a bitstream is just a bunch of 1s and 0s in a file on the computer. The downloader will transfer this file into a physical FPGA chip. In most cases, this chip is already mounted on a circuit board where it waits for the bitstream that will make it perform its intended function. D. ATM status report block It send status of different ATM ,whether working or not .to particular customer mobile via Spartan 3a hardware and UART. 6. Serial Communication Serial communication is basically the transmission or reception of data one bit at a time. Today's computers generally address data in bytes or some multiple thereof. A byte contains 8 bits. A bit is basically either a logical 1 or zero. Every character on this page is actually expressed internally as one byte. The serial port is used to convert each byte to a stream of ones and zeroes as well as to convert a stream of ones and zeroes to bytes. The serial port contains a electronic chip called a Universal Asynchronous Receiver/Transmitter (UART) that actually does the conversion. The serial port has many pins. We will discuss the transmit and receive pin first. Electrically speaking, whenever the serial port sends a logical one (1) a negative voltage is effected on the transmit pin. Whenever the serial port sends a logical zero (0) a positive voltage is affected. When no data is being sent, the serial port's transmit pin's voltage is negative (1) and is said to be in a MARK state. Note that the serial port can also be forced to keep the transmit pin at a positive voltage (0) and is said to be the SPACE or BREAK state. (The terms MARK and SPACE are also used to simply denote a negative voltage (1) or a positive voltage (0) at the transmit pin respectively). When transmitting a byte, the UART (serial port) first sends a START BIT which is a positive voltage (0),

Fig.2 GSM Modem 4. Face Recognition Principal component analysis (PCA) involves a mathematical procedure which extracts facial features for recognition; this approach transforms face images into a smallest of characteristic feature images called Eigen faces. The first principal component accounts for as much of the variability in the data as possible, and each succeeding component accounts for as much of the remaining variability as possible. These methods capture the local facial features and their geometric relationships. They often locate anchor points at key facial features (eyes, nose, mouth, etc), connect these points to form a net and then measure the distances and angles of the net to create a unique face print.

Fig.3 PCA - Principal Component Analysis It converts the i/p and database face images to corresponding Eigen values. Eigen value corresponds to the energy of the face images. These Eigen values are compared. Eigen values are calculated by the following steps, Read image. Find its mean value = average of the colour. Find difference image = i/p img-mean. Co-variance matrix = gives effective colour. Eigen value = gives energy of image.

IEEE 2013 IEEE 32107 July 3, 2013, Coimbatore, India.

International Conference on Current Trends in Engineering and Technology, ICCTET13


followed by the data (general 8 bits, but could be 5, 6, 7, or 8 bits) followed by one or two STOP Bits which is a negative(1) voltage. The sequence is repeated for each byte sent. Figure shows a diagram of what a byte transmission would look like.

423

Fig.5 Byte Transmission At this point you may want to know what the duration of a bit is. In other words, how long does the signal stay in a particular state to define a bit. The answer is simple. It is dependent on the baud rate. The baud rate is the number of times the signal can switch states in one second. Therefore, if the line is operating at 9600 baud, the line can switch states 9,600 times per second. This means each bit has the duration of 1/9600 of a second or about100sec. When transmitting a character there are other characteristics other than the baud rate that must be known or that must be setup. 7. Conclusion From this we implement image-recognition techniques that can provide the important functions required by advanced intelligent ATM Security, to avoid theft and protect the usage of unauthenticated users. Secured and safety environment system for automobile users will be provided by implementing this project. We can predict the theft by using this system in our day to day life. We Predict and indent system for the society. [1] References Faune Hughes, Daniel Lichter,Richard Oswald, and Michael Whitfield ,Face Biometrics:A Longitudinal Study, Seidenberg School of CSIS,Pace University, White Plains,NY 10606,USA. GaryG.Yen, Nethrie Nithianandan, Facial Feature Extraction Using Genetic Algorithm, Intelligent Systems and Control Laboratory School of Electrical and Computer Engineering. Oklahoma State University, Stillwater, OK 74074-5032, USA. D.L. Jiang, Y.X. Hu, S.C. Yan, H.J. Zhang, "Efficient 3D Reconstruction for Face Recognition", 0031_3203/2004Pattern recognition society: doi:10.1016/j.patcog.2004.11.004 Animetrics offers FaceR CredentialME service on Sprint 3G and 4G networks August 12th, 2010.

[2]

[3]

[4]

IEEE 2013 IEEE 32107 July 3, 2013, Coimbatore, India.

Você também pode gostar