SlideShare uma empresa Scribd logo
1 de 5
Baixar para ler offline
Computer Engineering and Intelligent Systems                                                   www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.4, 2011


                  Intelligent Agent for detection of ATM Theft
                                             Muhammad Javed
                           Institute of Computing and Information Technology
                                      Gomal University, PAKISTAN
                                         javed_gomal@yahoo.com

                                              Bashir Ahmad
                           Institute of Computing and Information Technology
                                      Gomal University, PAKISTAN
                                          bashahmad@gmail.com

                                           Muhammad Ali Abid
                           Institute of Computing and Information Technology
                                      Gomal University, PAKISTAN
                                        maliabid_awan@yahoo.com
                                           Imran Ali Khan
                   Department of Computer Science, COMSTS, Abbotabad, PAKISTAN
                                             imran@ciit.net.pk

Abstract
ATM service is considered as more profitable service of a bank. There are many pre caution have been
determined to use an ATM but still some threats are face by customer to use an ATM, such as existence of
another person with a customer will be encountered as threat for ATM. The focus of this paper is to design
the architecture of an intelligent agent which incorporates with ATM agent to detect the existence of
unknown person with customer and takes some safety steps for customer. Finally proposed intelligent can
be enhanced to detect the more theft face by customer of ATM.
Keywords: ATM, Intelligent Agent, Threats.
1. Introduction
      In artificial intelligence, an intelligent agent is anything that can be viewed as perceiving its
environment through sensors and acting upon that environment through effectors. The rational performance
of an agent is observed in terms of the performed task. In computer science intelligent agent refers to
software agent which is not a rational agent [6].
Automatic Teller Machine (ATM) is a profitable service of bank which allows the customer to access the
financial transaction in public space. A customer need a magnetic chip card to access the financial
transaction. ATM agents are used to replace the function of bank teller or clerk of bank [7]. During the use
of ATM many thefts are face by customer such as theft of couriers, theft of personal identification number,
burglary of ATMs and theft of money from ATMs by bank. Besides these, another theft is encounter for
customer which is the existence of another person in ATM room. To overcome this theft an intelligent agent
is proposed, whose objective is work with coordination of ATM agent and make the secure financial
transaction of customers. The functions of proposed software intelligent agent are formally described by
using Object Constraint Language (OCL) for further enhancement and evaluation of proposed intelligent
agent [8].


2. Intelligent Agents
         In AI, Intelligent Agent is used to observe and act upon an environment to achieve some predefine
goals. Intelligent agent may have ability to learn from its environment. In computer science, an intelligent


                                                   260
Computer Engineering and Intelligent Systems                                                     www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.4, 2011

agent is referred to as software agent while in economic it is refer as agent. A simple agent is also known as
agent function which maps every possible percept percepts sequence to a possible action. Agents are
classified as physical agent, temporal agent, spatial agents, processing agents, learning agents, decision
agents and believable agents. The environment of an agent can be define in different way such as
observable or partially observable, deterministic or stochastic, episodic or sequential, static or dynamic,
discrete or continuous and single agent or multi agents [3].
3. Automatic Teller Machine
An automated teller machine (ATM) is a computerized telecommunications device that provides the
customers of a financial institution with access to financial transactions in a public space. With the use of
an ATM, customers can access their bank accounts for cash withdrawals and check their account balances.
ATMs are normaly placed inside the premises of banks, but can also be placed in different locations such
as shopping centers/malls, airports or restaurants. Now-a-days Automated Teller Machines (ATM) is
considered as very common technology for dispensing notes to cash-holders. The ATM structure for cash
withdrawal differs across countries [2].
The first ATM was installed in the USA in 1969. ATMs have a positive effect on the nominal currency
growth, but this effect is not very robust. Among all profitable services of bank ATM is consider as more
profitable service because t attract number of non-bank customers. The structure of ATM comprise on main
components such as CPU, magnetic chip card, PIN pad, Secure crypto processor, function keys and vault.
The main theft which are relevant to ATM are [1,4].
    Theft of couriers who fill ATMs with cash
    Theft of personal identification numbers
    Theft by electronic data interception
    Theft by fraudulent electronic transactions
    Theft of money from ATMs by bank
    Burglary of ATMs
    Vandalism of ATMs
    Fraudulent use of ATM cards obtained from customers through dummy ATMs that keep their cards.
4. Object Constraint Language
  The Object Constraint Language (OCL) is a formal language used to describe expressions on UML
models. These expressions specify the invariant conditions that must hold for the system being modeled or
queries. The main features of OCL language are:
   OCL is pure specification language
   OCL is not a programming language
   OCL is a type language.
The basic constructs and its description is shown in table-1.
                               Table-1: Basic constructs of OCL
Basic Constructs          Description               Example
Context                   Define context for the               context Person
                          expression.                          context Company inv:
                                                               context c : Company inv:
                                                               context Person::income (d: Date) : Integer
Self                      Refer to the contextual            self.TotalPerson=0
                          instance.
Pre, Post                 Constraints on operations          Pre : TotalPerson=0
Initial and Derived       Represent the initial or derived        Init : Self.Totalperson=0
Values                    value of an attribute
Basic types               Boolean, Integer, String, Real                        ------------
Enumeration Types         It defines a number of             context Person inv: gender = Gender::male
                          enumeration literals
Comment                   It describe comments               -- this is a comment
Classifiers               types, classes, interfaces,                           ------------
                          associations and data types.

                                                    261
Computer Engineering and Intelligent Systems                                                   www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.4, 2011

Basic Constructs          Description                      Example
Selection                 Comparison of values             If condition then
                                                             statements
                                                           end if

5. Architecture of proposed Intelligent agent
          The function of proposed intelligent agent is incorporated with the function of ATM Agent. This
is revealed as informally through use case diagram of UML for security purpose and shown figure-1 [5].




            Figure-1. Use case diagram of Proposed intelligent with ATM agent

The structure of proposed intelligent agent with ATM agent is shown in figure-2. The architecture of
proposed intelligent agent is divided into two parts. The first part comprise on sensor of intelligent agent
which detect the existence of more than one person in room of ATM and send information to first software
module of second part of intelligent agent. The second part comprise on two software modules. The
function of first module is to interact with sensor of first part and retrieve information, process the
information and send to second module.




                     Figure-2. Structure of Proposed intelligent agent with ATM agent
          The second software module interact with ATM agent and display information for customer about
the existence of another person, and it also prompt to customer for continuation of transaction in normal or
secure form. If customer wants to continue transaction in secure form then second software module makes
the integrated processing with ATM agent and process the transaction of customer in secure form. The
processing of both software modules based on the algorithms which allow the communication among
customers, ATM agent and sensor. The function of proposed intelligent agent with ATM agent is shown in
figure-3.




                                                   262
Computer Engineering and Intelligent Systems                                                                          www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.4, 2011


                                                                    Customer enter to the ATM
                                                                    room




                                                                    Sensor of intelligent agent
                                                                    detect the existence of more
                                                                    than one persons




                                                                            Are more
                                                                            than one
                                                                            person


                               First module takes information from                              Normal ATM process and no
                               sensor, process it and send to second                            further work of Agent
                               module




                               Work of second module will be integrated
                               with ATM agent, it display prompt for
                               customer to allow the existence of another
                               person




                                          Customer
                                          Response to
                                          allow person




        Agent will not interpret the                             Agent will enforce and
        normal transaction                                       instruct the ATM agent to do
                                                                 transaction in secure form


Figure-3. Flowchart for function of proposed intelligent agent with ATM agent
         For formal specification of the working of proposed intelligent agent three context are defined
which are Sensor, Customer, ATM Agent, Module1 and Module2. The OCL expressions for formal
specification of sensor’s work are:

 -- Expression to define Sensor context
 Context Person
 Context Person: Response=boolean
 Context Sensor::TotalPerson : Integer
 Init : Self.Totalperson=0
 Derive : Self.TotalPerson=Person.size();
 If Self.TotalPerson>=2 then
     Context Module1::Observe(Self.TotalPerson)
 End if



 Context Module1
 Context Module1::Observe(TP : integer)
   Self.Process();                                                263
Computer Engineering and Intelligent Systems                                                     www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.4, 2011




 Context Module2
 Context ATMAgent.Info: String
 Self.Info=Module2.Process()
 Context ATMAgent:Display(Info)
 If Person.Response=True then
     Context ATMAgent.NormalTransaction()
 Else
     Context ATMAgent.SecureTransaction()
 End if



6. Conclusion and future work.
       Financial transactions of customer through ATM are faced by number of thefts. Among these thefts
one is related with the existence of more than person (causes robbery on gun point) in ATM room. The
focus of this research is to propose an intelligent agent, whose function is incorporated with the function of
ATM agent, to make the transaction of customer more secure. The structure of proposed intelligent Agent
is divided into two parts i.e. sensor and software modules. The functionality of software modules can be
modified to remove those thefts which are face by customer in ATM room. These thefts are proposed for
future work.
Reference
Michael S. Scott, “Robbery at Automated Teller Machines”, Guide No.8, 2001
Heli Snellman, “Automated Teller Machine network market structure and cash sage”, ISBN 952-462-
318-8, 2006
Ira Rudowsky, “Intelligent Agents” Proceedings of the Americas Conference on Information Systems, New
York, New York, August 2004
Diana L. Taylor, Superintendent of Banks , “Using An Automated Teller Machine(Atm) What You Need
To Know”, State of New York Banking Department, 25 Nov 2009
Donald G. Firesmith,” Security Use Cases”, Vol. 2, No. 3, May-June 2003
http://wikipedia/intelligent agent.htm
http://wikipedia/ Automated teller machine.htm
OMG Available Specification,” Object Constraint Language”, May 2006




                                                    264

Mais conteúdo relacionado

Mais procurados

A T M (Automated Teller Machine)
A T M (Automated Teller Machine)A T M (Automated Teller Machine)
A T M (Automated Teller Machine)Networking
 
A CASE Lab Report - Project File on "ATM - Banking System"
A CASE Lab Report - Project File on  "ATM - Banking System"A CASE Lab Report - Project File on  "ATM - Banking System"
A CASE Lab Report - Project File on "ATM - Banking System"joyousbharat
 
Working of ATM machine : For all those who wanted to know the internal workin...
Working of ATM machine : For all those who wanted to know the internal workin...Working of ATM machine : For all those who wanted to know the internal workin...
Working of ATM machine : For all those who wanted to know the internal workin...sgoldbergg
 
Computer Science Class 11 India PPT
Computer Science Class 11 India PPTComputer Science Class 11 India PPT
Computer Science Class 11 India PPTRat Devil
 
54039271 atm-project-report
54039271 atm-project-report54039271 atm-project-report
54039271 atm-project-reportKalpana Reddy
 
Presentation Slides of College Management System Report
Presentation Slides of College Management System ReportPresentation Slides of College Management System Report
Presentation Slides of College Management System ReportMuhammadHusnainRaza
 
Automated Teller Machine
Automated Teller MachineAutomated Teller Machine
Automated Teller MachineDiotima Gupta
 
Project report on (atm MAnagment system)
Project report on (atm MAnagment system)Project report on (atm MAnagment system)
Project report on (atm MAnagment system)Muhammad Umer Lari
 
Atm simulation mini project using Python programming language
Atm simulation  mini project using Python programming language Atm simulation  mini project using Python programming language
Atm simulation mini project using Python programming language Mauryasuraj98
 
documentation on bank management system
documentation on bank management systemdocumentation on bank management system
documentation on bank management systemUnsa Jawaid
 
Canteen Food Management System
Canteen Food Management SystemCanteen Food Management System
Canteen Food Management SystemShubham Dhage
 

Mais procurados (20)

Atm software ppt
Atm software pptAtm software ppt
Atm software ppt
 
The atm system
The atm systemThe atm system
The atm system
 
Atm
AtmAtm
Atm
 
A T M (Automated Teller Machine)
A T M (Automated Teller Machine)A T M (Automated Teller Machine)
A T M (Automated Teller Machine)
 
A CASE Lab Report - Project File on "ATM - Banking System"
A CASE Lab Report - Project File on  "ATM - Banking System"A CASE Lab Report - Project File on  "ATM - Banking System"
A CASE Lab Report - Project File on "ATM - Banking System"
 
Working of ATM machine : For all those who wanted to know the internal workin...
Working of ATM machine : For all those who wanted to know the internal workin...Working of ATM machine : For all those who wanted to know the internal workin...
Working of ATM machine : For all those who wanted to know the internal workin...
 
Computer Science Class 11 India PPT
Computer Science Class 11 India PPTComputer Science Class 11 India PPT
Computer Science Class 11 India PPT
 
54039271 atm-project-report
54039271 atm-project-report54039271 atm-project-report
54039271 atm-project-report
 
Presentation Slides of College Management System Report
Presentation Slides of College Management System ReportPresentation Slides of College Management System Report
Presentation Slides of College Management System Report
 
Direct Debit System
Direct Debit SystemDirect Debit System
Direct Debit System
 
Atm Simulator
Atm SimulatorAtm Simulator
Atm Simulator
 
Automated Teller Machine
Automated Teller MachineAutomated Teller Machine
Automated Teller Machine
 
Project report on (atm MAnagment system)
Project report on (atm MAnagment system)Project report on (atm MAnagment system)
Project report on (atm MAnagment system)
 
Ppt final
Ppt finalPpt final
Ppt final
 
ATM
ATMATM
ATM
 
Atm simulation mini project using Python programming language
Atm simulation  mini project using Python programming language Atm simulation  mini project using Python programming language
Atm simulation mini project using Python programming language
 
Student information system
Student information systemStudent information system
Student information system
 
Atm system_project
Atm system_projectAtm system_project
Atm system_project
 
documentation on bank management system
documentation on bank management systemdocumentation on bank management system
documentation on bank management system
 
Canteen Food Management System
Canteen Food Management SystemCanteen Food Management System
Canteen Food Management System
 

Destaque

Counseling anxiety disorders brochure
Counseling anxiety disorders brochureCounseling anxiety disorders brochure
Counseling anxiety disorders brochureBeloit Health System
 
Ppt revisedffff
Ppt revisedffffPpt revisedffff
Ppt revisedffffpeterccw
 
Bizcipleship slide share 1.5 - www.bizcipleship.com
Bizcipleship slide share 1.5 - www.bizcipleship.comBizcipleship slide share 1.5 - www.bizcipleship.com
Bizcipleship slide share 1.5 - www.bizcipleship.comBrett Johnson
 
Power of Visual Storytelling: A Picture or Twitvid is Worth a Thousand Words
Power of Visual Storytelling: A Picture or Twitvid is Worth a Thousand WordsPower of Visual Storytelling: A Picture or Twitvid is Worth a Thousand Words
Power of Visual Storytelling: A Picture or Twitvid is Worth a Thousand WordsJacki Halas
 

Destaque (6)

Socialmedia
SocialmediaSocialmedia
Socialmedia
 
Employers Need 3 Things
Employers Need 3 Things Employers Need 3 Things
Employers Need 3 Things
 
Counseling anxiety disorders brochure
Counseling anxiety disorders brochureCounseling anxiety disorders brochure
Counseling anxiety disorders brochure
 
Ppt revisedffff
Ppt revisedffffPpt revisedffff
Ppt revisedffff
 
Bizcipleship slide share 1.5 - www.bizcipleship.com
Bizcipleship slide share 1.5 - www.bizcipleship.comBizcipleship slide share 1.5 - www.bizcipleship.com
Bizcipleship slide share 1.5 - www.bizcipleship.com
 
Power of Visual Storytelling: A Picture or Twitvid is Worth a Thousand Words
Power of Visual Storytelling: A Picture or Twitvid is Worth a Thousand WordsPower of Visual Storytelling: A Picture or Twitvid is Worth a Thousand Words
Power of Visual Storytelling: A Picture or Twitvid is Worth a Thousand Words
 

Semelhante a 28 javed intelligent agent for 260-264

Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...IJRTEMJOURNAL
 
IRJET-Artificial Intelligence and its Applications Goal
IRJET-Artificial Intelligence and its Applications GoalIRJET-Artificial Intelligence and its Applications Goal
IRJET-Artificial Intelligence and its Applications GoalIRJET Journal
 
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...IRJET Journal
 
Bluetooth Based Automatic Hotel Service System Using Python
Bluetooth Based Automatic Hotel Service System Using PythonBluetooth Based Automatic Hotel Service System Using Python
Bluetooth Based Automatic Hotel Service System Using PythonIOSR Journals
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoTDesign and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoTIJRTEMJOURNAL
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT	Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT journal ijrtem
 
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatforms
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatformsA Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatforms
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatformsIRJET Journal
 
IRJET- A Survey on Cardless Automated Teller Machine(ATM)
IRJET- A Survey on Cardless Automated Teller Machine(ATM)IRJET- A Survey on Cardless Automated Teller Machine(ATM)
IRJET- A Survey on Cardless Automated Teller Machine(ATM)IRJET Journal
 
An AI Based ATM Intelligent Security System using Open CV and YOLO
An AI Based ATM Intelligent Security System using Open CV and YOLOAn AI Based ATM Intelligent Security System using Open CV and YOLO
An AI Based ATM Intelligent Security System using Open CV and YOLOYogeshIJTSRD
 
Camouflage Surveillance Robot In Defense Using Artificial Intelligence
Camouflage Surveillance Robot In Defense Using Artificial IntelligenceCamouflage Surveillance Robot In Defense Using Artificial Intelligence
Camouflage Surveillance Robot In Defense Using Artificial IntelligenceIRJET Journal
 
ADVANCE ATM SECURITY SYSTEM
ADVANCE ATM SECURITY SYSTEMADVANCE ATM SECURITY SYSTEM
ADVANCE ATM SECURITY SYSTEMIRJET Journal
 
How The Bank Organization Affect The Implementation Of...
How The Bank Organization Affect The Implementation Of...How The Bank Organization Affect The Implementation Of...
How The Bank Organization Affect The Implementation Of...Jana Clark
 
A Modern Technique for Unauthorized Human Detection and Intimation
A Modern Technique for Unauthorized Human Detection and IntimationA Modern Technique for Unauthorized Human Detection and Intimation
A Modern Technique for Unauthorized Human Detection and Intimationijtsrd
 
Third Generation Automatic Teller Machine
Third Generation Automatic Teller MachineThird Generation Automatic Teller Machine
Third Generation Automatic Teller Machineijsrd.com
 
IRJET - Identification and Classification of IoT Devices in Various Appli...
IRJET -  	  Identification and Classification of IoT Devices in Various Appli...IRJET -  	  Identification and Classification of IoT Devices in Various Appli...
IRJET - Identification and Classification of IoT Devices in Various Appli...IRJET Journal
 
Internet of Things Based Central Monitoring System for ATM’s
Internet of Things Based Central Monitoring System for ATM’sInternet of Things Based Central Monitoring System for ATM’s
Internet of Things Based Central Monitoring System for ATM’sIRJET Journal
 
IRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATMIRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATMIJTET Journal
 
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN AlgorithmIRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN AlgorithmIRJET Journal
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligenceguest45deb89
 

Semelhante a 28 javed intelligent agent for 260-264 (20)

Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
 
IRJET-Artificial Intelligence and its Applications Goal
IRJET-Artificial Intelligence and its Applications GoalIRJET-Artificial Intelligence and its Applications Goal
IRJET-Artificial Intelligence and its Applications Goal
 
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
 
Bluetooth Based Automatic Hotel Service System Using Python
Bluetooth Based Automatic Hotel Service System Using PythonBluetooth Based Automatic Hotel Service System Using Python
Bluetooth Based Automatic Hotel Service System Using Python
 
Egypt Economy
Egypt EconomyEgypt Economy
Egypt Economy
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoTDesign and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT	Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT
 
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatforms
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatformsA Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatforms
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatforms
 
IRJET- A Survey on Cardless Automated Teller Machine(ATM)
IRJET- A Survey on Cardless Automated Teller Machine(ATM)IRJET- A Survey on Cardless Automated Teller Machine(ATM)
IRJET- A Survey on Cardless Automated Teller Machine(ATM)
 
An AI Based ATM Intelligent Security System using Open CV and YOLO
An AI Based ATM Intelligent Security System using Open CV and YOLOAn AI Based ATM Intelligent Security System using Open CV and YOLO
An AI Based ATM Intelligent Security System using Open CV and YOLO
 
Camouflage Surveillance Robot In Defense Using Artificial Intelligence
Camouflage Surveillance Robot In Defense Using Artificial IntelligenceCamouflage Surveillance Robot In Defense Using Artificial Intelligence
Camouflage Surveillance Robot In Defense Using Artificial Intelligence
 
ADVANCE ATM SECURITY SYSTEM
ADVANCE ATM SECURITY SYSTEMADVANCE ATM SECURITY SYSTEM
ADVANCE ATM SECURITY SYSTEM
 
How The Bank Organization Affect The Implementation Of...
How The Bank Organization Affect The Implementation Of...How The Bank Organization Affect The Implementation Of...
How The Bank Organization Affect The Implementation Of...
 
A Modern Technique for Unauthorized Human Detection and Intimation
A Modern Technique for Unauthorized Human Detection and IntimationA Modern Technique for Unauthorized Human Detection and Intimation
A Modern Technique for Unauthorized Human Detection and Intimation
 
Third Generation Automatic Teller Machine
Third Generation Automatic Teller MachineThird Generation Automatic Teller Machine
Third Generation Automatic Teller Machine
 
IRJET - Identification and Classification of IoT Devices in Various Appli...
IRJET -  	  Identification and Classification of IoT Devices in Various Appli...IRJET -  	  Identification and Classification of IoT Devices in Various Appli...
IRJET - Identification and Classification of IoT Devices in Various Appli...
 
Internet of Things Based Central Monitoring System for ATM’s
Internet of Things Based Central Monitoring System for ATM’sInternet of Things Based Central Monitoring System for ATM’s
Internet of Things Based Central Monitoring System for ATM’s
 
IRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATMIRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATM
 
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN AlgorithmIRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligence
 

Mais de Alexander Decker

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inAlexander Decker
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksAlexander Decker
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dAlexander Decker
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceAlexander Decker
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifhamAlexander Decker
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaAlexander Decker
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenAlexander Decker
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget forAlexander Decker
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabAlexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalAlexander Decker
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesAlexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloudAlexander Decker
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveragedAlexander Decker
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenyaAlexander Decker
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health ofAlexander Decker
 

Mais de Alexander Decker (20)

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
 

Último

RAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIRAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIUdaiappa Ramachandran
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
GenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncGenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncObject Automation
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
Digital magic. A small project for controlling smart light bulbs.
Digital magic. A small project for controlling smart light bulbs.Digital magic. A small project for controlling smart light bulbs.
Digital magic. A small project for controlling smart light bulbs.francesco barbera
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum ComputingGDSC PJATK
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 

Último (20)

RAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIRAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AI
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
GenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncGenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation Inc
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
Digital magic. A small project for controlling smart light bulbs.
Digital magic. A small project for controlling smart light bulbs.Digital magic. A small project for controlling smart light bulbs.
Digital magic. A small project for controlling smart light bulbs.
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum Computing
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 

28 javed intelligent agent for 260-264

  • 1. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.4, 2011 Intelligent Agent for detection of ATM Theft Muhammad Javed Institute of Computing and Information Technology Gomal University, PAKISTAN javed_gomal@yahoo.com Bashir Ahmad Institute of Computing and Information Technology Gomal University, PAKISTAN bashahmad@gmail.com Muhammad Ali Abid Institute of Computing and Information Technology Gomal University, PAKISTAN maliabid_awan@yahoo.com Imran Ali Khan Department of Computer Science, COMSTS, Abbotabad, PAKISTAN imran@ciit.net.pk Abstract ATM service is considered as more profitable service of a bank. There are many pre caution have been determined to use an ATM but still some threats are face by customer to use an ATM, such as existence of another person with a customer will be encountered as threat for ATM. The focus of this paper is to design the architecture of an intelligent agent which incorporates with ATM agent to detect the existence of unknown person with customer and takes some safety steps for customer. Finally proposed intelligent can be enhanced to detect the more theft face by customer of ATM. Keywords: ATM, Intelligent Agent, Threats. 1. Introduction In artificial intelligence, an intelligent agent is anything that can be viewed as perceiving its environment through sensors and acting upon that environment through effectors. The rational performance of an agent is observed in terms of the performed task. In computer science intelligent agent refers to software agent which is not a rational agent [6]. Automatic Teller Machine (ATM) is a profitable service of bank which allows the customer to access the financial transaction in public space. A customer need a magnetic chip card to access the financial transaction. ATM agents are used to replace the function of bank teller or clerk of bank [7]. During the use of ATM many thefts are face by customer such as theft of couriers, theft of personal identification number, burglary of ATMs and theft of money from ATMs by bank. Besides these, another theft is encounter for customer which is the existence of another person in ATM room. To overcome this theft an intelligent agent is proposed, whose objective is work with coordination of ATM agent and make the secure financial transaction of customers. The functions of proposed software intelligent agent are formally described by using Object Constraint Language (OCL) for further enhancement and evaluation of proposed intelligent agent [8]. 2. Intelligent Agents In AI, Intelligent Agent is used to observe and act upon an environment to achieve some predefine goals. Intelligent agent may have ability to learn from its environment. In computer science, an intelligent 260
  • 2. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.4, 2011 agent is referred to as software agent while in economic it is refer as agent. A simple agent is also known as agent function which maps every possible percept percepts sequence to a possible action. Agents are classified as physical agent, temporal agent, spatial agents, processing agents, learning agents, decision agents and believable agents. The environment of an agent can be define in different way such as observable or partially observable, deterministic or stochastic, episodic or sequential, static or dynamic, discrete or continuous and single agent or multi agents [3]. 3. Automatic Teller Machine An automated teller machine (ATM) is a computerized telecommunications device that provides the customers of a financial institution with access to financial transactions in a public space. With the use of an ATM, customers can access their bank accounts for cash withdrawals and check their account balances. ATMs are normaly placed inside the premises of banks, but can also be placed in different locations such as shopping centers/malls, airports or restaurants. Now-a-days Automated Teller Machines (ATM) is considered as very common technology for dispensing notes to cash-holders. The ATM structure for cash withdrawal differs across countries [2]. The first ATM was installed in the USA in 1969. ATMs have a positive effect on the nominal currency growth, but this effect is not very robust. Among all profitable services of bank ATM is consider as more profitable service because t attract number of non-bank customers. The structure of ATM comprise on main components such as CPU, magnetic chip card, PIN pad, Secure crypto processor, function keys and vault. The main theft which are relevant to ATM are [1,4].  Theft of couriers who fill ATMs with cash  Theft of personal identification numbers  Theft by electronic data interception  Theft by fraudulent electronic transactions  Theft of money from ATMs by bank  Burglary of ATMs  Vandalism of ATMs  Fraudulent use of ATM cards obtained from customers through dummy ATMs that keep their cards. 4. Object Constraint Language The Object Constraint Language (OCL) is a formal language used to describe expressions on UML models. These expressions specify the invariant conditions that must hold for the system being modeled or queries. The main features of OCL language are:  OCL is pure specification language  OCL is not a programming language  OCL is a type language. The basic constructs and its description is shown in table-1. Table-1: Basic constructs of OCL Basic Constructs Description Example Context Define context for the  context Person expression.  context Company inv:  context c : Company inv:  context Person::income (d: Date) : Integer Self Refer to the contextual self.TotalPerson=0 instance. Pre, Post Constraints on operations Pre : TotalPerson=0 Initial and Derived Represent the initial or derived Init : Self.Totalperson=0 Values value of an attribute Basic types Boolean, Integer, String, Real ------------ Enumeration Types It defines a number of context Person inv: gender = Gender::male enumeration literals Comment It describe comments -- this is a comment Classifiers types, classes, interfaces, ------------ associations and data types. 261
  • 3. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.4, 2011 Basic Constructs Description Example Selection Comparison of values If condition then statements end if 5. Architecture of proposed Intelligent agent The function of proposed intelligent agent is incorporated with the function of ATM Agent. This is revealed as informally through use case diagram of UML for security purpose and shown figure-1 [5]. Figure-1. Use case diagram of Proposed intelligent with ATM agent The structure of proposed intelligent agent with ATM agent is shown in figure-2. The architecture of proposed intelligent agent is divided into two parts. The first part comprise on sensor of intelligent agent which detect the existence of more than one person in room of ATM and send information to first software module of second part of intelligent agent. The second part comprise on two software modules. The function of first module is to interact with sensor of first part and retrieve information, process the information and send to second module. Figure-2. Structure of Proposed intelligent agent with ATM agent The second software module interact with ATM agent and display information for customer about the existence of another person, and it also prompt to customer for continuation of transaction in normal or secure form. If customer wants to continue transaction in secure form then second software module makes the integrated processing with ATM agent and process the transaction of customer in secure form. The processing of both software modules based on the algorithms which allow the communication among customers, ATM agent and sensor. The function of proposed intelligent agent with ATM agent is shown in figure-3. 262
  • 4. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.4, 2011 Customer enter to the ATM room Sensor of intelligent agent detect the existence of more than one persons Are more than one person First module takes information from Normal ATM process and no sensor, process it and send to second further work of Agent module Work of second module will be integrated with ATM agent, it display prompt for customer to allow the existence of another person Customer Response to allow person Agent will not interpret the Agent will enforce and normal transaction instruct the ATM agent to do transaction in secure form Figure-3. Flowchart for function of proposed intelligent agent with ATM agent For formal specification of the working of proposed intelligent agent three context are defined which are Sensor, Customer, ATM Agent, Module1 and Module2. The OCL expressions for formal specification of sensor’s work are: -- Expression to define Sensor context Context Person Context Person: Response=boolean Context Sensor::TotalPerson : Integer Init : Self.Totalperson=0 Derive : Self.TotalPerson=Person.size(); If Self.TotalPerson>=2 then Context Module1::Observe(Self.TotalPerson) End if Context Module1 Context Module1::Observe(TP : integer) Self.Process(); 263
  • 5. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.4, 2011 Context Module2 Context ATMAgent.Info: String Self.Info=Module2.Process() Context ATMAgent:Display(Info) If Person.Response=True then Context ATMAgent.NormalTransaction() Else Context ATMAgent.SecureTransaction() End if 6. Conclusion and future work. Financial transactions of customer through ATM are faced by number of thefts. Among these thefts one is related with the existence of more than person (causes robbery on gun point) in ATM room. The focus of this research is to propose an intelligent agent, whose function is incorporated with the function of ATM agent, to make the transaction of customer more secure. The structure of proposed intelligent Agent is divided into two parts i.e. sensor and software modules. The functionality of software modules can be modified to remove those thefts which are face by customer in ATM room. These thefts are proposed for future work. Reference Michael S. Scott, “Robbery at Automated Teller Machines”, Guide No.8, 2001 Heli Snellman, “Automated Teller Machine network market structure and cash sage”, ISBN 952-462- 318-8, 2006 Ira Rudowsky, “Intelligent Agents” Proceedings of the Americas Conference on Information Systems, New York, New York, August 2004 Diana L. Taylor, Superintendent of Banks , “Using An Automated Teller Machine(Atm) What You Need To Know”, State of New York Banking Department, 25 Nov 2009 Donald G. Firesmith,” Security Use Cases”, Vol. 2, No. 3, May-June 2003 http://wikipedia/intelligent agent.htm http://wikipedia/ Automated teller machine.htm OMG Available Specification,” Object Constraint Language”, May 2006 264