Download the complete computer science project topic and material (chapter 1-5) titled Design and Implementation of a Card Based Security System (A Case Study of Eco Bank) here on PROJECTS.ng. See below for the abstract, table of contents, list of figures, list of tables, list of appendices, list of abbreviations and chapter one. Click the DOWNLOAD NOW button to get the complete project work instantly.
PROJECT TOPIC AND MATERIAL ON Design and Implementation of a Card Based Security System
The File Details
- Name: Design and Implementation of a Card Based Security System
- Type: PDF and MS Word (DOC)
- Size: 123KB
- Length: 33 Pages
This project was centered on card based security system. The current process of security is being operated manually and due to this procedure numerous problem are been encountered. A design was taken to computerized the manual process in order to check this problem. The problems were identified after series of interviews and examination of documents after which analysis was made and a computerized procedure recommended. This project will also suggest how to successfully implement the computerized procedure and to overcome the obstacle that would hinder the successful implementation of the system. The new system was designed using Microsoft visual basic 6.0 programming language. This language was chosen because of its easy syntax and features for developing windows based applications.
TABLE OF CONTENTS
Title page i
Approval page ii
Table of content v
1.0 Introduction historical background
1.1 Objective of the study
1.2 Statement of the problem
1.3 Significance of the researchers study
1.4 Scope of study
1.5 Limitation of study
1.6 Brief history of case study
1.7 Definition of terms
- Review of related literature
3.0 System investigation analysis and design
3.1 System investigation
3.2 Fact finding
3.3 Analysis of finding
3.3.1 Problem of formal system
3.3.2 Reason for new system
3.4 System specification
3.5 Input and output forms and design
4.0 System programming and implementation
4.1 Choice of implementation
4.2 Program flow chart and algorithm
4.3 Source code and debugging
4.4 Testing and documentation
4.5 Staff training
4.6 Hardware and software requirement
4.7 Implementation (handover)
- Summary, Recommendation and Conclusion
1.0 INTRODUCTION AND HISTORICAL BACKGROUND
The idea of self-service in retail banking developed through independent and simultaneous effort in Japan, Sweden, the United States and the United Kingdom. In the USA, Luther George Sunsjan has been wrongly credited with developing and building the first cash dispenser machine.
There is no evidence to suggest that Sunsjan worked in this device before 1959 while his 132nd patent was first filled in June 30, 1960 (and granted 26 February, 1963).
The roll out of the machine, called bank graph, was delayed a couple of years. This was particularly due to Sunjlan’s reflection electronics being acquired by universal match cooperation. An experimental Bank graph was installed in New York City in 1961 by the bank of New York, but removed after 6 months due to the lack of customer’s acceptance. The bank graph, however embodied the pre-occupation by its banking in finding alternative means to capture deposits, while the concern of the European and Asian Bank was cash distribution.
The first cash dispensing device used in Tokoyo in 1966. Although little known of this first device, it seems to have been activated with a credit and rather accessing current account balances. This technology has no immediate consequences in the international market 1972. In the UK, IBM (international business machine) 2984 was designed at the required of bank. The 2984 CIT (cash issuing terminal was the first cash poibt, similar in function till today’s machines; cash point is still registered trademark of TSB in the UK. All are online and issued a variable amount which was immediately deducted from the account. A small number of 2984’s were supplied to a US bank. Notable historical model of ATM’s include 10xx and TSB 900 series and NOR 50xx series.
1.1 OBJECTIVE OF THE STUDY
To total aim of this project work is to implement a card – based security for customer’s withdrawer using Eco Bank as a case study.
This project involves the running of the card based machine (ATM) and also explain the reason for the proposed project.
Generally, this project work should be test effectively the system (card–based security) can be compared with the manual based security.
1.2 STATEMENT OF PROBLEM
One of the major problems in banking industry is account fraud. Appreciation of card based security which is significant different from other security based system as going to reduce the rate of fraud in banking sector.
1.3 SIGNIFICANCE OF THE STUDY
This project work will enhance the security of the customer’s account and transaction. It makes customer to access their bank account in order to make cash withdrawals and check their account balances as well as purchase cell phone prepaid credit without entering into their banking hall.
1.4 SCOPE OF STUDY
The range at which the research work will go will not exceed Eco Bank in Owerri considering the security based system.
1.5 LIMITATION OF STUDY
These are the point that limit the range of this study
- Effective bank security
- Lack of fund
- Limited time
- Unable to leave the school premises for further research.
1.6 BRIEF HISTORY OF THE CASE OF STUDY
Eco Bank international Plc commonly referred to Eco bank. The bank was incorporated on March 26, 1990 as a private limited liability company with 100% equity ownership by Nigerian citizens.
As of May 2009, Eco Bank has subsidiaries in the following countries, Cameroon, Gambia and Nigeria.
1.7 DEFINITION OF TERMS
ATM: Automated teller machine
ALGORITHM: An algorithm is a set of instruction that shows the step to follow in order to solve a problem.
DATA: These are raw facts that are to be processed.
FLOWCHART: is the diagrammatic representation of sequence of events to be followed in solving problem.
FILES: Is a collect of related data record.
FIELD NAME: This contains items about every record.
PROGRAM: Is a set of instructions of given for the computer to carryout a specific task.
INTEGER: Is referred to as a whole number.
STRING: Is referred to as a finite sequence of 3-ero or more character.
PERIPHERALS: is the physical component of the computer system.