2012 2nd International Conference on Advances in Computational Tools for Engineering Applications (ACTEA) 2012
DOI: 10.1109/ictea.2012.6462860
|View full text |Cite
|
Sign up to set email alerts
|

Development of stripe biometric based fingerprint authentications systems in Automated Teller Machines

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
2
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 1 publication
0
6
0
Order By: Relevance
“…Constraint ( 8) aims to ensure that the modules and raw materials flowing into P from supplier (S) and remanufacturing centers (R) must meet the producers' (P) capacity limit. Constraint (9) means that the flow from module disassembly and recycling centers (L) to suppliers (S) must not exceed the capacity of S. Constraint (10) is the capacity constraint of warehouse (W). Lastly, Constraints (11) to (15) are the capacity constraints of C, D, R, L, and M, respectively.…”
Section: Capacity Constraintsmentioning
confidence: 99%
See 1 more Smart Citation
“…Constraint ( 8) aims to ensure that the modules and raw materials flowing into P from supplier (S) and remanufacturing centers (R) must meet the producers' (P) capacity limit. Constraint (9) means that the flow from module disassembly and recycling centers (L) to suppliers (S) must not exceed the capacity of S. Constraint (10) is the capacity constraint of warehouse (W). Lastly, Constraints (11) to (15) are the capacity constraints of C, D, R, L, and M, respectively.…”
Section: Capacity Constraintsmentioning
confidence: 99%
“…First, the field of RL has attracted the attention of numerous scholars [4][5][6][7] and has achieved beneficial research results. Second, used ATMs can be upgraded and modified, such as adding facial [8], finger vein [9], iris and other biometric recognition functions to ATMs, or remanufacturing their internal function modules for recycling. At present, taking most cities in China as an example, banks directly return idle or outdated ATMs to manufacturers for harmless treatment, or use commercial bidding to deal with them through a third party.…”
Section: Introductionmentioning
confidence: 99%
“…If customer wants to send the money or debit the money from bank account, he/she will get One Time Password on registered mobile phone number. The GSM system created One Time Password for enforce verify [13,14] transaction from the desire bank side. This OTP requires to be entered for the transaction deal to be execute.…”
Section: Architecturementioning
confidence: 99%
“…A biometric device is perhaps the ultimate attempt in trying to prove who you are (Polemi, 1997). Biometrics authentications in conjunction with password/PIN system provided a level of improved security in authentication and verification (Lasisi and Ajisafe, 2012).…”
Section: Biometric Authenticationmentioning
confidence: 99%