Home / Computer Science / Design and implementation of a computerised online monetary transaction system

Design and implementation of a computerised online monetary transaction system

 

Table Of Contents


<p> </p><p>Title page &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; –<br>Certification &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; –<br>Dedication – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; –<br>Acknowledgment – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; –<br>Abstract &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>Table of contents – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –</p><p><strong>

Chapter ONE

- INTRODUCTION</strong><br>1.0 &nbsp; &nbsp; Introduction &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>1.1 &nbsp; &nbsp; Theoretical Background &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>1.2 &nbsp; &nbsp; Statement of Problem &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>1.3 &nbsp; &nbsp; Aim and Objectives of Study – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>1.4 &nbsp; &nbsp; Significance of Study &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>1.5 &nbsp; &nbsp; Scope of the Study – &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>1.6 &nbsp; &nbsp; Organization of study &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>1.7 &nbsp; &nbsp; Definition of Terms &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –</p><p><strong>

Chapter TWO

</strong><br><strong>REVIEW OF RELATED LITERATURE</strong><br>2.0 &nbsp; &nbsp; Introduction &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>2.1 &nbsp; &nbsp; Overview of Online Monetary transaction – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>2.2 &nbsp; &nbsp; Concept of Monetary Transaction &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>2.3 &nbsp; &nbsp; Features of Online Monetary Transaction – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>2.4 &nbsp; &nbsp; Security of Online Transaction &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>2.5 &nbsp; &nbsp; Attacks of Online transaction System &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>2.6 &nbsp; &nbsp; Counter Measures of Net-Banking System – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>2.7 &nbsp; &nbsp; Advantages and Disadvantages of Online Monetary<br>Transaction &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>2.7-1 Client Focus &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>2.7-2 Cost Reduction &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>2.7-3 Market Expansion &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>2.8 &nbsp; &nbsp; Risks of Online Banking &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>2.8-1 Strategic Risk &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>2.8-2 Operational Risk – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>2.8-3 Legal Risk &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>2.8-4 Reputational Risk &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –</p><p><strong>

Chapter THREE

: </strong>SYSTEM ANALYSIS AND DESIGN<br>3.0 &nbsp; &nbsp; Introduction &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>3.1 &nbsp; &nbsp; Research Methodology – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>3.2 &nbsp; &nbsp; System Analysis – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>3.2-1 Analysis of the Existing System &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>3.2-2 Problems of the Existing System &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>3.2-3 Analysis of the Proposed System &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>3.2.3-1 Advantages of Proposed System &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>3.2.3-2 Disadvantages of Proposed System &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>3.3 &nbsp; &nbsp; System Design &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>3.3.1 Input Layout &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>3.3.2 Program Flowchart &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>3.3.3 Output Layout &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –</p><p><strong>

Chapter FOUR

:</strong>&nbsp;SYSTEM IMPLEMENTATION<br>4.0 &nbsp; &nbsp; Introduction &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>4.1 &nbsp; &nbsp; System Flowchart &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>4.2 &nbsp; &nbsp; Choice of Programming language &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>4.3 &nbsp; &nbsp; Analysis of Modules &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>4.4 &nbsp; &nbsp; Programming Environment &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>4.5 &nbsp; &nbsp; System Implementation &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; — &nbsp; &nbsp; &nbsp; –</p><p><strong>

Chapter FIVE

: </strong>CONSTRAINTS OF THE STUDY, SUMMARY, CONCLUSION AND RECOMMENDATIONS<br>5.0 &nbsp; &nbsp; Introduction &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>5.1 &nbsp; &nbsp; Constraints of the Study &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>5.2 &nbsp; &nbsp; Summary &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>5.3 &nbsp; &nbsp; Conclusion – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; &nbsp;–<br>5.4 &nbsp; &nbsp; Recommendations &nbsp; &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>References – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>Appendix A: Program Flowchart &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>Appendix B: Source Code &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –<br>Appendix C: System Output &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; – &nbsp; &nbsp; &nbsp; –</p> <br><p></p>

Thesis Abstract

Thesis Overview

<p> <strong>Introduction</strong><br>Thousands of banks perform millions of monetary transactions every day and thousands of users follow almost the same banking system. the number of users increases more banks and more staff; are needed it means more money has to be put this system. If advanced computerized based banking system is developed, so there is no need to open new branches in remote areas or same branch provides services to other banking system example ATM system.<br>Banking system requires authenticity and validity if a system provides these basic logic that mean we can developed a new system that authenticate and validate the user and user can do any type of virtual or monetary transaction any time any where in minimum amount of time. One of the most authentic codes for recognition of any person is signature. It always appear on almost all types of documents, such as property documents, bank cheques, and credit slips, thus signature has a great importance in our daily life, therefore automatic signature verification is important in the field of document analysis and processing for which a lot of work has been done in the past.<br>Online monetary transaction system allows customers of financial institutions to conduct financial transactions on secure website operated by the institution, which can be a retail or virtual book, credit union or building society. To access a financial institution’s online banking facility; a customer having personal internet access must register with the institution for the services, and setup some password (under various names) for customer verification.<br>Financial institutions new routinely allocate customers number (also under various names), whether or not customers intend to access their online monetary transaction system facility. Customer numbers are normally not the same as account numbers, because more than one account numbers can be linked to one customer number. The customer will link to the customer number.<br>To access online banking, the customer would go to the financial institution’s website, and enter the online banking facility using the customer number and password. Some financial institutions have setup additional security steps for access, but there is no consistency to the approach adopted.<br>Net banking offers an inexpensive alternative to banking to expand a bank’s customer base and many banks are using online banking to increase the quality of services to their customers. Many banks have opened websites on the internet and many plan to offer banking services over the internet. <br></p>

Blazingprojects Mobile App

📚 Over 50,000 Project Materials
📱 100% Offline: No internet needed
📝 Over 98 Departments
🔍 Project Journal Publishing
🎓 Undergraduate/Postgraduate
📥 Instant Whatsapp/Email Delivery

Blazingprojects App

Related Research

Computer Science. 4 min read

Anomaly Detection in IoT Networks Using Machine Learning Algorithms...

The project titled "Anomaly Detection in IoT Networks Using Machine Learning Algorithms" focuses on addressing the critical challenge of detecting ano...

BP
Blazingprojects
Read more →
Computer Science. 4 min read

Applying Machine Learning Algorithms for Predicting Stock Market Trends...

The project titled "Applying Machine Learning Algorithms for Predicting Stock Market Trends" aims to explore the application of machine learning algor...

BP
Blazingprojects
Read more →
Computer Science. 2 min read

Applying Machine Learning Algorithms for Sentiment Analysis in Social Media Data...

The project titled "Applying Machine Learning Algorithms for Sentiment Analysis in Social Media Data" focuses on utilizing machine learning algorithms...

BP
Blazingprojects
Read more →
Computer Science. 3 min read

Applying Machine Learning for Predictive Maintenance in Industrial IoT Systems...

The project titled "Applying Machine Learning for Predictive Maintenance in Industrial IoT Systems" focuses on leveraging machine learning techniques ...

BP
Blazingprojects
Read more →
Computer Science. 4 min read

Implementation of a Machine Learning Algorithm for Predicting Stock Prices...

The project, "Implementation of a Machine Learning Algorithm for Predicting Stock Prices," aims to leverage the power of machine learning techniques t...

BP
Blazingprojects
Read more →
Computer Science. 4 min read

Development of an Intelligent Traffic Management System using Machine Learning Algor...

The project titled "Development of an Intelligent Traffic Management System using Machine Learning Algorithms" aims to revolutionize the traditional t...

BP
Blazingprojects
Read more →
Computer Science. 2 min read

Anomaly Detection in Network Traffic Using Machine Learning Algorithms...

No response received....

BP
Blazingprojects
Read more →
Computer Science. 2 min read

Applying Machine Learning for Intrusion Detection in IoT Networks...

The project titled "Applying Machine Learning for Intrusion Detection in IoT Networks" aims to address the increasing cybersecurity threats targeting ...

BP
Blazingprojects
Read more →
Computer Science. 4 min read

Developing a Machine Learning-based System for Predicting Stock Market Trends...

The project titled "Developing a Machine Learning-based System for Predicting Stock Market Trends" aims to create an innovative system that utilizes m...

BP
Blazingprojects
Read more →
WhatsApp Click here to chat with us