Design and implementation of an ATM systems using Double authentication/ Wawuyile, Tom.

By: Publication details: Busitema University: Busitema University,Description: xi, Col.ill.: 30 cm CDSubject(s): DDC classification:
  • 22 005.8072 WAW
Online resources:
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number URL Copy number Status Date due Barcode
Book Reference Book Reference Engineering Library 005.8072 WAW (Browse shelf(Opens below)) Link to resource 1 Not for loan BUML22075817

TABLE OF CONTENTS............................................................................................................... ix
CHAPTER ONE............................................................................................................................. 1
INTRODUCTION .......................................................................................................................... 1
1.1 Background ........................................................................................................................... 1
1.2 Problem statement................................................................................................................. 2
1.3 Objectives.............................................................................................................................. 2
1.3.1 Main objective ................................................................................................................ 2
1.3.2 Specific objectives.......................................................................................................... 3
1.4 Justification ........................................................................................................................... 3
1.5 Scope of the project............................................................................................................... 3
CHAPTER TWO ............................................................................................................................ 4
LITRATURE REVIEW.................................................................................................................. 4
2.1 Introduction ........................................................................................................................... 4
2.2 Definition of concepts........................................................................................................... 4
2.2.1 Authentication ................................................................................................................ 4
2.2.2 Automated Teller Machine (ATM) ................................................................................ 5
2.3 COMPONENTS OF THE ATM MACHINE ....................................................................... 6
x
2.3.1 Card reader: .................................................................................................................... 6
2.3.2 Keypad............................................................................................................................ 7
2.3.3 Display screen................................................................................................................. 7
2.3.4 Receipt printer ................................................................................................................ 7
2.3.5 Cash dispenser................................................................................................................ 7
2.3.6 Biometric device............................................................................................................. 8
2.3.7 Storage device................................................................................................................. 8
2.3.8 Processor......................................................................................................................... 8
2.4 WORKING PROCESS OF ATM ......................................................................................... 8
2.4.1 DISPENSING MONEY................................................................................................... 10
2.5 RASPBERRY PI................................................................................................................. 10
2.6 EXISTING ATM AUTHENTICATION SYSTEM IN UGANDA.................................... 10
2.7 DRAWBACKS ATTRIBUTED TO EXISTING SYSTEMS ............................................ 11
2.8 WAYS TO IMPROVE ATM SYSTEM............................................................................. 11
2.8.1 The implemented system.................................................................................................. 12
2.8.2 Principle of operation of the system............................................................................. 12
2.8.3 Fingerprint........................................................................................................................ 12
2.8.4 Advantages of biometric in ATMS (finger print) ............................................................ 13
CHAPTER THREE ...................................................................................................................... 14
METHODOLOGY ....................................................................................................................... 14
3.1 Data collection................................................................................................................ 14
3.1.1 Interviewing ............................................................................................................ 14
3.1.2 Observation............................................................................................................. 14
3.1.3 Internet.......................................................................................................................... 14
3.2 System requirements........................................................................................................... 14
xi
3.3 Prototype development........................................................................................................ 15
3.3.1 Requirement analysis.................................................................................................... 15
3.3.2 Implementation............................................................................................................. 15
3.3.3 Validation and testing................................................................................................... 15
CHAPTER FOUR......................................................................................................................... 16
SYSTEM ANALYSIS AND DESIGN......................................................................................... 16
4.1 Introduction ......................................................................................................................... 16
4.2 Functional analysis.............................................................................................................. 16
4.2.1 Functional requirements............................................................................................... 16
4.2.2 Non-functional requirements........................................................................................ 16
4.3 System design and analysis................................................................................................. 17
4.3.1 Hardware analysis......................................................................................................... 17
4.3.2 Why I chose this model of the fingerprint scanner....................................................... 20
4.3.3 Software analysis.......................................................................................................... 21
4.3.4 Logic design ................................................................................................................. 22
4.3.5 UML (Unified Modelling Language) Use Case Diagram for the system .................... 23
4.3.6 UML State Machine Diagram ...................................................................................... 23
4.3.7 Circuit diagram of the system (circuit diagram)........................................................... 24
CHAPTER FIVE .......................................................................................................................... 25
IMPLEMENTATION AND TESTING ....................................................................................... 25
5.1 Introduction ......................................................................................................................... 25
5.2 system development ............................................................................................................ 25
5.2.1 Python programming language..................................................................................... 25
5.2.2 Kivy environment......................................................................................................... 25
5.3 Code design......................................................................................................................... 25
xii
5.3.1 Inputting the pin number screen code........................................................................... 25
5.3.2 Home screen design code; ............................................................................................ 26
5.3.3 Fingerprint screen code ................................................................................................ 27
5.3.4 Code for the click event of withdraw button ................................................................ 28
4.3.5 Code for remotely connecting to the server.................................................................. 28
5.4 system testing, validation and evaluation............................................................................ 29
5.4.1 Unit testing ................................................................................................................... 29
5.4.2 System testing............................................................................................................... 29
CHAPTER SIX............................................................................................................................. 30
CONCLUSION AND RECOMMENDATION............................................................................ 30
6.1 Introduction ......................................................................................................................... 30
6.2 Summary of the work.......................................................................................................... 30
6.3 Critical analysis/appraisal of the work ................................................................................ 30
6.4 Challenges........................................................................................................................... 31
6.5 Recommendations............................................................................................................... 31
6.6 Conclusion........................................................................................................................... 3

FET 0112

There are no comments on this title.

to post a comment.