SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
Computer Engineering and Intelligent Systems                                                   www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.4, 2011


                  Intelligent Agent for detection of ATM Theft
                                             Muhammad Javed
                           Institute of Computing and Information Technology
                                      Gomal University, PAKISTAN
                                         javed_gomal@yahoo.com

                                              Bashir Ahmad
                           Institute of Computing and Information Technology
                                      Gomal University, PAKISTAN
                                          bashahmad@gmail.com

                                           Muhammad Ali Abid
                           Institute of Computing and Information Technology
                                      Gomal University, PAKISTAN
                                        maliabid_awan@yahoo.com
                                           Imran Ali Khan
                   Department of Computer Science, COMSTS, Abbotabad, PAKISTAN
                                             imran@ciit.net.pk

Abstract
ATM service is considered as more profitable service of a bank. There are many pre caution have been
determined to use an ATM but still some threats are face by customer to use an ATM, such as existence of
another person with a customer will be encountered as threat for ATM. The focus of this paper is to design
the architecture of an intelligent agent which incorporates with ATM agent to detect the existence of
unknown person with customer and takes some safety steps for customer. Finally proposed intelligent can
be enhanced to detect the more theft face by customer of ATM.
Keywords: ATM, Intelligent Agent, Threats.
1. Introduction
      In artificial intelligence, an intelligent agent is anything that can be viewed as perceiving its
environment through sensors and acting upon that environment through effectors. The rational performance
of an agent is observed in terms of the performed task. In computer science intelligent agent refers to
software agent which is not a rational agent [6].
Automatic Teller Machine (ATM) is a profitable service of bank which allows the customer to access the
financial transaction in public space. A customer need a magnetic chip card to access the financial
transaction. ATM agents are used to replace the function of bank teller or clerk of bank [7]. During the use
of ATM many thefts are face by customer such as theft of couriers, theft of personal identification number,
burglary of ATMs and theft of money from ATMs by bank. Besides these, another theft is encounter for
customer which is the existence of another person in ATM room. To overcome this theft an intelligent agent
is proposed, whose objective is work with coordination of ATM agent and make the secure financial
transaction of customers. The functions of proposed software intelligent agent are formally described by
using Object Constraint Language (OCL) for further enhancement and evaluation of proposed intelligent
agent [8].


2. Intelligent Agents
         In AI, Intelligent Agent is used to observe and act upon an environment to achieve some predefine
goals. Intelligent agent may have ability to learn from its environment. In computer science, an intelligent


                                                   260
Computer Engineering and Intelligent Systems                                                     www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.4, 2011

agent is referred to as software agent while in economic it is refer as agent. A simple agent is also known as
agent function which maps every possible percept percepts sequence to a possible action. Agents are
classified as physical agent, temporal agent, spatial agents, processing agents, learning agents, decision
agents and believable agents. The environment of an agent can be define in different way such as
observable or partially observable, deterministic or stochastic, episodic or sequential, static or dynamic,
discrete or continuous and single agent or multi agents [3].
3. Automatic Teller Machine
An automated teller machine (ATM) is a computerized telecommunications device that provides the
customers of a financial institution with access to financial transactions in a public space. With the use of
an ATM, customers can access their bank accounts for cash withdrawals and check their account balances.
ATMs are normaly placed inside the premises of banks, but can also be placed in different locations such
as shopping centers/malls, airports or restaurants. Now-a-days Automated Teller Machines (ATM) is
considered as very common technology for dispensing notes to cash-holders. The ATM structure for cash
withdrawal differs across countries [2].
The first ATM was installed in the USA in 1969. ATMs have a positive effect on the nominal currency
growth, but this effect is not very robust. Among all profitable services of bank ATM is consider as more
profitable service because t attract number of non-bank customers. The structure of ATM comprise on main
components such as CPU, magnetic chip card, PIN pad, Secure crypto processor, function keys and vault.
The main theft which are relevant to ATM are [1,4].
    Theft of couriers who fill ATMs with cash
    Theft of personal identification numbers
    Theft by electronic data interception
    Theft by fraudulent electronic transactions
    Theft of money from ATMs by bank
    Burglary of ATMs
    Vandalism of ATMs
    Fraudulent use of ATM cards obtained from customers through dummy ATMs that keep their cards.
4. Object Constraint Language
  The Object Constraint Language (OCL) is a formal language used to describe expressions on UML
models. These expressions specify the invariant conditions that must hold for the system being modeled or
queries. The main features of OCL language are:
   OCL is pure specification language
   OCL is not a programming language
   OCL is a type language.
The basic constructs and its description is shown in table-1.
                               Table-1: Basic constructs of OCL
Basic Constructs          Description               Example
Context                   Define context for the               context Person
                          expression.                          context Company inv:
                                                               context c : Company inv:
                                                               context Person::income (d: Date) : Integer
Self                      Refer to the contextual            self.TotalPerson=0
                          instance.
Pre, Post                 Constraints on operations          Pre : TotalPerson=0
Initial and Derived       Represent the initial or derived        Init : Self.Totalperson=0
Values                    value of an attribute
Basic types               Boolean, Integer, String, Real                        ------------
Enumeration Types         It defines a number of             context Person inv: gender = Gender::male
                          enumeration literals
Comment                   It describe comments               -- this is a comment
Classifiers               types, classes, interfaces,                           ------------
                          associations and data types.

                                                    261
Computer Engineering and Intelligent Systems                                                   www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.4, 2011

Basic Constructs          Description                      Example
Selection                 Comparison of values             If condition then
                                                             statements
                                                           end if

5. Architecture of proposed Intelligent agent
          The function of proposed intelligent agent is incorporated with the function of ATM Agent. This
is revealed as informally through use case diagram of UML for security purpose and shown figure-1 [5].




            Figure-1. Use case diagram of Proposed intelligent with ATM agent

The structure of proposed intelligent agent with ATM agent is shown in figure-2. The architecture of
proposed intelligent agent is divided into two parts. The first part comprise on sensor of intelligent agent
which detect the existence of more than one person in room of ATM and send information to first software
module of second part of intelligent agent. The second part comprise on two software modules. The
function of first module is to interact with sensor of first part and retrieve information, process the
information and send to second module.




                     Figure-2. Structure of Proposed intelligent agent with ATM agent
          The second software module interact with ATM agent and display information for customer about
the existence of another person, and it also prompt to customer for continuation of transaction in normal or
secure form. If customer wants to continue transaction in secure form then second software module makes
the integrated processing with ATM agent and process the transaction of customer in secure form. The
processing of both software modules based on the algorithms which allow the communication among
customers, ATM agent and sensor. The function of proposed intelligent agent with ATM agent is shown in
figure-3.




                                                   262
Computer Engineering and Intelligent Systems                                                                          www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.4, 2011


                                                                    Customer enter to the ATM
                                                                    room




                                                                    Sensor of intelligent agent
                                                                    detect the existence of more
                                                                    than one persons




                                                                            Are more
                                                                            than one
                                                                            person


                               First module takes information from                              Normal ATM process and no
                               sensor, process it and send to second                            further work of Agent
                               module




                               Work of second module will be integrated
                               with ATM agent, it display prompt for
                               customer to allow the existence of another
                               person




                                          Customer
                                          Response to
                                          allow person




        Agent will not interpret the                             Agent will enforce and
        normal transaction                                       instruct the ATM agent to do
                                                                 transaction in secure form


Figure-3. Flowchart for function of proposed intelligent agent with ATM agent
         For formal specification of the working of proposed intelligent agent three context are defined
which are Sensor, Customer, ATM Agent, Module1 and Module2. The OCL expressions for formal
specification of sensor’s work are:

 -- Expression to define Sensor context
 Context Person
 Context Person: Response=boolean
 Context Sensor::TotalPerson : Integer
 Init : Self.Totalperson=0
 Derive : Self.TotalPerson=Person.size();
 If Self.TotalPerson>=2 then
     Context Module1::Observe(Self.TotalPerson)
 End if



 Context Module1
 Context Module1::Observe(TP : integer)
   Self.Process();                                                263
Computer Engineering and Intelligent Systems                                                     www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.4, 2011




 Context Module2
 Context ATMAgent.Info: String
 Self.Info=Module2.Process()
 Context ATMAgent:Display(Info)
 If Person.Response=True then
     Context ATMAgent.NormalTransaction()
 Else
     Context ATMAgent.SecureTransaction()
 End if



6. Conclusion and future work.
       Financial transactions of customer through ATM are faced by number of thefts. Among these thefts
one is related with the existence of more than person (causes robbery on gun point) in ATM room. The
focus of this research is to propose an intelligent agent, whose function is incorporated with the function of
ATM agent, to make the transaction of customer more secure. The structure of proposed intelligent Agent
is divided into two parts i.e. sensor and software modules. The functionality of software modules can be
modified to remove those thefts which are face by customer in ATM room. These thefts are proposed for
future work.
Reference
Michael S. Scott, “Robbery at Automated Teller Machines”, Guide No.8, 2001
Heli Snellman, “Automated Teller Machine network market structure and cash sage”, ISBN 952-462-
318-8, 2006
Ira Rudowsky, “Intelligent Agents” Proceedings of the Americas Conference on Information Systems, New
York, New York, August 2004
Diana L. Taylor, Superintendent of Banks , “Using An Automated Teller Machine(Atm) What You Need
To Know”, State of New York Banking Department, 25 Nov 2009
Donald G. Firesmith,” Security Use Cases”, Vol. 2, No. 3, May-June 2003
http://wikipedia/intelligent agent.htm
http://wikipedia/ Automated teller machine.htm
OMG Available Specification,” Object Constraint Language”, May 2006




                                                    264

Contenu connexe

Tendances

HOSPITAL MANAGEMENT SYSTEM ANDROID
HOSPITAL MANAGEMENT SYSTEM ANDROIDHOSPITAL MANAGEMENT SYSTEM ANDROID
HOSPITAL MANAGEMENT SYSTEM ANDROIDFoysal Mahamud Elias
 
Event management system
Event management systemEvent management system
Event management systemD Yogendra Rao
 
Hostel management system
Hostel management systemHostel management system
Hostel management systemYOGESH SHARMA
 
restaurant billing system
restaurant billing system restaurant billing system
restaurant billing system GangapuramRohith
 
Movie Ticket Booking Website Project Presentation
Movie Ticket Booking Website Project PresentationMovie Ticket Booking Website Project Presentation
Movie Ticket Booking Website Project PresentationAvinandan Ganguly
 
Dead Code Elimination
Dead Code EliminationDead Code Elimination
Dead Code EliminationSamiul Ehsan
 
Online Movie Ticket Booking
Online Movie Ticket BookingOnline Movie Ticket Booking
Online Movie Ticket BookingSuman Bose
 
Harsh Mathur Final Year Project Report on Restaurant Billing System
Harsh  Mathur Final Year Project Report on Restaurant Billing SystemHarsh  Mathur Final Year Project Report on Restaurant Billing System
Harsh Mathur Final Year Project Report on Restaurant Billing SystemHarsh Mathur
 
Asymptotic Notation and Complexity
Asymptotic Notation and ComplexityAsymptotic Notation and Complexity
Asymptotic Notation and ComplexityRajandeep Gill
 
Online Hostel Management System Proposal
Online Hostel Management System Proposal Online Hostel Management System Proposal
Online Hostel Management System Proposal farhanamusthafa
 
Floyd warshall-algorithm
Floyd warshall-algorithmFloyd warshall-algorithm
Floyd warshall-algorithmMalinga Perera
 
Canteen automation system (updated) revised
Canteen automation system (updated) revisedCanteen automation system (updated) revised
Canteen automation system (updated) revisedrinshi jain
 
Online Movie or theater ticket booking system Details Requirement.
Online Movie or theater ticket booking system Details Requirement.Online Movie or theater ticket booking system Details Requirement.
Online Movie or theater ticket booking system Details Requirement.Niloy Biswas
 
Time Table Reminder Andorid App SRS
Time Table Reminder Andorid App SRSTime Table Reminder Andorid App SRS
Time Table Reminder Andorid App SRSAnjali Agrawal
 
Online movie tickets
Online movie ticketsOnline movie tickets
Online movie ticketsJAI BAMORIYA
 
Report for DIGITAL CLOCK 12011042 Manoj.pdf
Report for DIGITAL  CLOCK 12011042 Manoj.pdfReport for DIGITAL  CLOCK 12011042 Manoj.pdf
Report for DIGITAL CLOCK 12011042 Manoj.pdfManojKumar533913
 

Tendances (20)

Restaurant Management System
Restaurant Management SystemRestaurant Management System
Restaurant Management System
 
HOSPITAL MANAGEMENT SYSTEM ANDROID
HOSPITAL MANAGEMENT SYSTEM ANDROIDHOSPITAL MANAGEMENT SYSTEM ANDROID
HOSPITAL MANAGEMENT SYSTEM ANDROID
 
Event management system
Event management systemEvent management system
Event management system
 
Hostel management system
Hostel management systemHostel management system
Hostel management system
 
Digital Logic
Digital LogicDigital Logic
Digital Logic
 
restaurant billing system
restaurant billing system restaurant billing system
restaurant billing system
 
Movie Ticket Booking Website Project Presentation
Movie Ticket Booking Website Project PresentationMovie Ticket Booking Website Project Presentation
Movie Ticket Booking Website Project Presentation
 
Dead Code Elimination
Dead Code EliminationDead Code Elimination
Dead Code Elimination
 
Online Movie Ticket Booking
Online Movie Ticket BookingOnline Movie Ticket Booking
Online Movie Ticket Booking
 
Harsh Mathur Final Year Project Report on Restaurant Billing System
Harsh  Mathur Final Year Project Report on Restaurant Billing SystemHarsh  Mathur Final Year Project Report on Restaurant Billing System
Harsh Mathur Final Year Project Report on Restaurant Billing System
 
Asymptotic Notation and Complexity
Asymptotic Notation and ComplexityAsymptotic Notation and Complexity
Asymptotic Notation and Complexity
 
Online Hostel Management System Proposal
Online Hostel Management System Proposal Online Hostel Management System Proposal
Online Hostel Management System Proposal
 
Unit 1(stld)
Unit 1(stld) Unit 1(stld)
Unit 1(stld)
 
Floyd warshall-algorithm
Floyd warshall-algorithmFloyd warshall-algorithm
Floyd warshall-algorithm
 
Canteen automation system (updated) revised
Canteen automation system (updated) revisedCanteen automation system (updated) revised
Canteen automation system (updated) revised
 
Online tour and travel PPT
Online tour and travel PPTOnline tour and travel PPT
Online tour and travel PPT
 
Online Movie or theater ticket booking system Details Requirement.
Online Movie or theater ticket booking system Details Requirement.Online Movie or theater ticket booking system Details Requirement.
Online Movie or theater ticket booking system Details Requirement.
 
Time Table Reminder Andorid App SRS
Time Table Reminder Andorid App SRSTime Table Reminder Andorid App SRS
Time Table Reminder Andorid App SRS
 
Online movie tickets
Online movie ticketsOnline movie tickets
Online movie tickets
 
Report for DIGITAL CLOCK 12011042 Manoj.pdf
Report for DIGITAL  CLOCK 12011042 Manoj.pdfReport for DIGITAL  CLOCK 12011042 Manoj.pdf
Report for DIGITAL CLOCK 12011042 Manoj.pdf
 

En vedette

Counseling anxiety disorders brochure
Counseling anxiety disorders brochureCounseling anxiety disorders brochure
Counseling anxiety disorders brochureBeloit Health System
 
Ppt revisedffff
Ppt revisedffffPpt revisedffff
Ppt revisedffffpeterccw
 
Bizcipleship slide share 1.5 - www.bizcipleship.com
Bizcipleship slide share 1.5 - www.bizcipleship.comBizcipleship slide share 1.5 - www.bizcipleship.com
Bizcipleship slide share 1.5 - www.bizcipleship.comBrett Johnson
 
Power of Visual Storytelling: A Picture or Twitvid is Worth a Thousand Words
Power of Visual Storytelling: A Picture or Twitvid is Worth a Thousand WordsPower of Visual Storytelling: A Picture or Twitvid is Worth a Thousand Words
Power of Visual Storytelling: A Picture or Twitvid is Worth a Thousand WordsJacki Halas
 

En vedette (6)

Socialmedia
SocialmediaSocialmedia
Socialmedia
 
Employers Need 3 Things
Employers Need 3 Things Employers Need 3 Things
Employers Need 3 Things
 
Counseling anxiety disorders brochure
Counseling anxiety disorders brochureCounseling anxiety disorders brochure
Counseling anxiety disorders brochure
 
Ppt revisedffff
Ppt revisedffffPpt revisedffff
Ppt revisedffff
 
Bizcipleship slide share 1.5 - www.bizcipleship.com
Bizcipleship slide share 1.5 - www.bizcipleship.comBizcipleship slide share 1.5 - www.bizcipleship.com
Bizcipleship slide share 1.5 - www.bizcipleship.com
 
Power of Visual Storytelling: A Picture or Twitvid is Worth a Thousand Words
Power of Visual Storytelling: A Picture or Twitvid is Worth a Thousand WordsPower of Visual Storytelling: A Picture or Twitvid is Worth a Thousand Words
Power of Visual Storytelling: A Picture or Twitvid is Worth a Thousand Words
 

Similaire à 28 javed intelligent agent for 260-264

Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...IJRTEMJOURNAL
 
IRJET-Artificial Intelligence and its Applications Goal
IRJET-Artificial Intelligence and its Applications GoalIRJET-Artificial Intelligence and its Applications Goal
IRJET-Artificial Intelligence and its Applications GoalIRJET Journal
 
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...IRJET Journal
 
Bluetooth Based Automatic Hotel Service System Using Python
Bluetooth Based Automatic Hotel Service System Using PythonBluetooth Based Automatic Hotel Service System Using Python
Bluetooth Based Automatic Hotel Service System Using PythonIOSR Journals
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoTDesign and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoTIJRTEMJOURNAL
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT	Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT journal ijrtem
 
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatforms
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatformsA Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatforms
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatformsIRJET Journal
 
IRJET- A Survey on Cardless Automated Teller Machine(ATM)
IRJET- A Survey on Cardless Automated Teller Machine(ATM)IRJET- A Survey on Cardless Automated Teller Machine(ATM)
IRJET- A Survey on Cardless Automated Teller Machine(ATM)IRJET Journal
 
An AI Based ATM Intelligent Security System using Open CV and YOLO
An AI Based ATM Intelligent Security System using Open CV and YOLOAn AI Based ATM Intelligent Security System using Open CV and YOLO
An AI Based ATM Intelligent Security System using Open CV and YOLOYogeshIJTSRD
 
Camouflage Surveillance Robot In Defense Using Artificial Intelligence
Camouflage Surveillance Robot In Defense Using Artificial IntelligenceCamouflage Surveillance Robot In Defense Using Artificial Intelligence
Camouflage Surveillance Robot In Defense Using Artificial IntelligenceIRJET Journal
 
ADVANCE ATM SECURITY SYSTEM
ADVANCE ATM SECURITY SYSTEMADVANCE ATM SECURITY SYSTEM
ADVANCE ATM SECURITY SYSTEMIRJET Journal
 
A Modern Technique for Unauthorized Human Detection and Intimation
A Modern Technique for Unauthorized Human Detection and IntimationA Modern Technique for Unauthorized Human Detection and Intimation
A Modern Technique for Unauthorized Human Detection and Intimationijtsrd
 
Third Generation Automatic Teller Machine
Third Generation Automatic Teller MachineThird Generation Automatic Teller Machine
Third Generation Automatic Teller Machineijsrd.com
 
IRJET - Identification and Classification of IoT Devices in Various Appli...
IRJET -  	  Identification and Classification of IoT Devices in Various Appli...IRJET -  	  Identification and Classification of IoT Devices in Various Appli...
IRJET - Identification and Classification of IoT Devices in Various Appli...IRJET Journal
 
Internet of Things Based Central Monitoring System for ATM’s
Internet of Things Based Central Monitoring System for ATM’sInternet of Things Based Central Monitoring System for ATM’s
Internet of Things Based Central Monitoring System for ATM’sIRJET Journal
 
IRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATMIRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATMIJTET Journal
 
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN AlgorithmIRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN AlgorithmIRJET Journal
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligenceguest45deb89
 
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...IRJET Journal
 
Simulation, modelling and packet sniffing facilities for IoT: A systematic an...
Simulation, modelling and packet sniffing facilities for IoT: A systematic an...Simulation, modelling and packet sniffing facilities for IoT: A systematic an...
Simulation, modelling and packet sniffing facilities for IoT: A systematic an...IJECEIAES
 

Similaire à 28 javed intelligent agent for 260-264 (20)

Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
 
IRJET-Artificial Intelligence and its Applications Goal
IRJET-Artificial Intelligence and its Applications GoalIRJET-Artificial Intelligence and its Applications Goal
IRJET-Artificial Intelligence and its Applications Goal
 
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
 
Bluetooth Based Automatic Hotel Service System Using Python
Bluetooth Based Automatic Hotel Service System Using PythonBluetooth Based Automatic Hotel Service System Using Python
Bluetooth Based Automatic Hotel Service System Using Python
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoTDesign and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT	Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT
 
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatforms
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatformsA Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatforms
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatforms
 
IRJET- A Survey on Cardless Automated Teller Machine(ATM)
IRJET- A Survey on Cardless Automated Teller Machine(ATM)IRJET- A Survey on Cardless Automated Teller Machine(ATM)
IRJET- A Survey on Cardless Automated Teller Machine(ATM)
 
An AI Based ATM Intelligent Security System using Open CV and YOLO
An AI Based ATM Intelligent Security System using Open CV and YOLOAn AI Based ATM Intelligent Security System using Open CV and YOLO
An AI Based ATM Intelligent Security System using Open CV and YOLO
 
Camouflage Surveillance Robot In Defense Using Artificial Intelligence
Camouflage Surveillance Robot In Defense Using Artificial IntelligenceCamouflage Surveillance Robot In Defense Using Artificial Intelligence
Camouflage Surveillance Robot In Defense Using Artificial Intelligence
 
ADVANCE ATM SECURITY SYSTEM
ADVANCE ATM SECURITY SYSTEMADVANCE ATM SECURITY SYSTEM
ADVANCE ATM SECURITY SYSTEM
 
A Modern Technique for Unauthorized Human Detection and Intimation
A Modern Technique for Unauthorized Human Detection and IntimationA Modern Technique for Unauthorized Human Detection and Intimation
A Modern Technique for Unauthorized Human Detection and Intimation
 
Third Generation Automatic Teller Machine
Third Generation Automatic Teller MachineThird Generation Automatic Teller Machine
Third Generation Automatic Teller Machine
 
IRJET - Identification and Classification of IoT Devices in Various Appli...
IRJET -  	  Identification and Classification of IoT Devices in Various Appli...IRJET -  	  Identification and Classification of IoT Devices in Various Appli...
IRJET - Identification and Classification of IoT Devices in Various Appli...
 
Internet of Things Based Central Monitoring System for ATM’s
Internet of Things Based Central Monitoring System for ATM’sInternet of Things Based Central Monitoring System for ATM’s
Internet of Things Based Central Monitoring System for ATM’s
 
IRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATMIRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATM
 
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN AlgorithmIRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligence
 
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
 
Simulation, modelling and packet sniffing facilities for IoT: A systematic an...
Simulation, modelling and packet sniffing facilities for IoT: A systematic an...Simulation, modelling and packet sniffing facilities for IoT: A systematic an...
Simulation, modelling and packet sniffing facilities for IoT: A systematic an...
 

Plus de Alexander Decker

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inAlexander Decker
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksAlexander Decker
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dAlexander Decker
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceAlexander Decker
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifhamAlexander Decker
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaAlexander Decker
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenAlexander Decker
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget forAlexander Decker
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabAlexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalAlexander Decker
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesAlexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloudAlexander Decker
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveragedAlexander Decker
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenyaAlexander Decker
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health ofAlexander Decker
 

Plus de Alexander Decker (20)

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
 

Dernier

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 

Dernier (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

28 javed intelligent agent for 260-264

  • 1. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.4, 2011 Intelligent Agent for detection of ATM Theft Muhammad Javed Institute of Computing and Information Technology Gomal University, PAKISTAN javed_gomal@yahoo.com Bashir Ahmad Institute of Computing and Information Technology Gomal University, PAKISTAN bashahmad@gmail.com Muhammad Ali Abid Institute of Computing and Information Technology Gomal University, PAKISTAN maliabid_awan@yahoo.com Imran Ali Khan Department of Computer Science, COMSTS, Abbotabad, PAKISTAN imran@ciit.net.pk Abstract ATM service is considered as more profitable service of a bank. There are many pre caution have been determined to use an ATM but still some threats are face by customer to use an ATM, such as existence of another person with a customer will be encountered as threat for ATM. The focus of this paper is to design the architecture of an intelligent agent which incorporates with ATM agent to detect the existence of unknown person with customer and takes some safety steps for customer. Finally proposed intelligent can be enhanced to detect the more theft face by customer of ATM. Keywords: ATM, Intelligent Agent, Threats. 1. Introduction In artificial intelligence, an intelligent agent is anything that can be viewed as perceiving its environment through sensors and acting upon that environment through effectors. The rational performance of an agent is observed in terms of the performed task. In computer science intelligent agent refers to software agent which is not a rational agent [6]. Automatic Teller Machine (ATM) is a profitable service of bank which allows the customer to access the financial transaction in public space. A customer need a magnetic chip card to access the financial transaction. ATM agents are used to replace the function of bank teller or clerk of bank [7]. During the use of ATM many thefts are face by customer such as theft of couriers, theft of personal identification number, burglary of ATMs and theft of money from ATMs by bank. Besides these, another theft is encounter for customer which is the existence of another person in ATM room. To overcome this theft an intelligent agent is proposed, whose objective is work with coordination of ATM agent and make the secure financial transaction of customers. The functions of proposed software intelligent agent are formally described by using Object Constraint Language (OCL) for further enhancement and evaluation of proposed intelligent agent [8]. 2. Intelligent Agents In AI, Intelligent Agent is used to observe and act upon an environment to achieve some predefine goals. Intelligent agent may have ability to learn from its environment. In computer science, an intelligent 260
  • 2. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.4, 2011 agent is referred to as software agent while in economic it is refer as agent. A simple agent is also known as agent function which maps every possible percept percepts sequence to a possible action. Agents are classified as physical agent, temporal agent, spatial agents, processing agents, learning agents, decision agents and believable agents. The environment of an agent can be define in different way such as observable or partially observable, deterministic or stochastic, episodic or sequential, static or dynamic, discrete or continuous and single agent or multi agents [3]. 3. Automatic Teller Machine An automated teller machine (ATM) is a computerized telecommunications device that provides the customers of a financial institution with access to financial transactions in a public space. With the use of an ATM, customers can access their bank accounts for cash withdrawals and check their account balances. ATMs are normaly placed inside the premises of banks, but can also be placed in different locations such as shopping centers/malls, airports or restaurants. Now-a-days Automated Teller Machines (ATM) is considered as very common technology for dispensing notes to cash-holders. The ATM structure for cash withdrawal differs across countries [2]. The first ATM was installed in the USA in 1969. ATMs have a positive effect on the nominal currency growth, but this effect is not very robust. Among all profitable services of bank ATM is consider as more profitable service because t attract number of non-bank customers. The structure of ATM comprise on main components such as CPU, magnetic chip card, PIN pad, Secure crypto processor, function keys and vault. The main theft which are relevant to ATM are [1,4].  Theft of couriers who fill ATMs with cash  Theft of personal identification numbers  Theft by electronic data interception  Theft by fraudulent electronic transactions  Theft of money from ATMs by bank  Burglary of ATMs  Vandalism of ATMs  Fraudulent use of ATM cards obtained from customers through dummy ATMs that keep their cards. 4. Object Constraint Language The Object Constraint Language (OCL) is a formal language used to describe expressions on UML models. These expressions specify the invariant conditions that must hold for the system being modeled or queries. The main features of OCL language are:  OCL is pure specification language  OCL is not a programming language  OCL is a type language. The basic constructs and its description is shown in table-1. Table-1: Basic constructs of OCL Basic Constructs Description Example Context Define context for the  context Person expression.  context Company inv:  context c : Company inv:  context Person::income (d: Date) : Integer Self Refer to the contextual self.TotalPerson=0 instance. Pre, Post Constraints on operations Pre : TotalPerson=0 Initial and Derived Represent the initial or derived Init : Self.Totalperson=0 Values value of an attribute Basic types Boolean, Integer, String, Real ------------ Enumeration Types It defines a number of context Person inv: gender = Gender::male enumeration literals Comment It describe comments -- this is a comment Classifiers types, classes, interfaces, ------------ associations and data types. 261
  • 3. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.4, 2011 Basic Constructs Description Example Selection Comparison of values If condition then statements end if 5. Architecture of proposed Intelligent agent The function of proposed intelligent agent is incorporated with the function of ATM Agent. This is revealed as informally through use case diagram of UML for security purpose and shown figure-1 [5]. Figure-1. Use case diagram of Proposed intelligent with ATM agent The structure of proposed intelligent agent with ATM agent is shown in figure-2. The architecture of proposed intelligent agent is divided into two parts. The first part comprise on sensor of intelligent agent which detect the existence of more than one person in room of ATM and send information to first software module of second part of intelligent agent. The second part comprise on two software modules. The function of first module is to interact with sensor of first part and retrieve information, process the information and send to second module. Figure-2. Structure of Proposed intelligent agent with ATM agent The second software module interact with ATM agent and display information for customer about the existence of another person, and it also prompt to customer for continuation of transaction in normal or secure form. If customer wants to continue transaction in secure form then second software module makes the integrated processing with ATM agent and process the transaction of customer in secure form. The processing of both software modules based on the algorithms which allow the communication among customers, ATM agent and sensor. The function of proposed intelligent agent with ATM agent is shown in figure-3. 262
  • 4. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.4, 2011 Customer enter to the ATM room Sensor of intelligent agent detect the existence of more than one persons Are more than one person First module takes information from Normal ATM process and no sensor, process it and send to second further work of Agent module Work of second module will be integrated with ATM agent, it display prompt for customer to allow the existence of another person Customer Response to allow person Agent will not interpret the Agent will enforce and normal transaction instruct the ATM agent to do transaction in secure form Figure-3. Flowchart for function of proposed intelligent agent with ATM agent For formal specification of the working of proposed intelligent agent three context are defined which are Sensor, Customer, ATM Agent, Module1 and Module2. The OCL expressions for formal specification of sensor’s work are: -- Expression to define Sensor context Context Person Context Person: Response=boolean Context Sensor::TotalPerson : Integer Init : Self.Totalperson=0 Derive : Self.TotalPerson=Person.size(); If Self.TotalPerson>=2 then Context Module1::Observe(Self.TotalPerson) End if Context Module1 Context Module1::Observe(TP : integer) Self.Process(); 263
  • 5. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.4, 2011 Context Module2 Context ATMAgent.Info: String Self.Info=Module2.Process() Context ATMAgent:Display(Info) If Person.Response=True then Context ATMAgent.NormalTransaction() Else Context ATMAgent.SecureTransaction() End if 6. Conclusion and future work. Financial transactions of customer through ATM are faced by number of thefts. Among these thefts one is related with the existence of more than person (causes robbery on gun point) in ATM room. The focus of this research is to propose an intelligent agent, whose function is incorporated with the function of ATM agent, to make the transaction of customer more secure. The structure of proposed intelligent Agent is divided into two parts i.e. sensor and software modules. The functionality of software modules can be modified to remove those thefts which are face by customer in ATM room. These thefts are proposed for future work. Reference Michael S. Scott, “Robbery at Automated Teller Machines”, Guide No.8, 2001 Heli Snellman, “Automated Teller Machine network market structure and cash sage”, ISBN 952-462- 318-8, 2006 Ira Rudowsky, “Intelligent Agents” Proceedings of the Americas Conference on Information Systems, New York, New York, August 2004 Diana L. Taylor, Superintendent of Banks , “Using An Automated Teller Machine(Atm) What You Need To Know”, State of New York Banking Department, 25 Nov 2009 Donald G. Firesmith,” Security Use Cases”, Vol. 2, No. 3, May-June 2003 http://wikipedia/intelligent agent.htm http://wikipedia/ Automated teller machine.htm OMG Available Specification,” Object Constraint Language”, May 2006 264