Mobile Banking Services on Data Protection Analysis In Networking
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 4
Abstract
Mobile banking operations is one of the popular business application areas. Several applications are developed to support bank focused application such as internet banking and mobile banking applications. In this project it is proposed to develop a mobile banking application using J2ME (Java 2 micro-edition) technology such that java enabled devices can use standalone mobile banking application developed for the bank. Accessing to customer accounts, making transactions and accessing direct debit accounts are takes as important features of the mobile bank application developed. This application also discusses about various other mobile banking technologies other than standalone applications such as IVR (Interactive voice response) technologies and SMS (Short message service) technologies.
Authors and Affiliations
P. Selvapriyavadhana
Analog To Digital Converter Architectural And Characterstic Based Comparative Analysis
Selecting the proper ADC for a particular application appears to be a formidable task, considering the thousands of converters currently in the market. A direct approach is to go right to the selection guides and par...
VISION SYSTEM FOR HUMAN LEVELOF INTELLIGENCE
In this competitive world both industrial and academic organizations have been using different learning techniques to improve their knowledge capabilities. However the dynamic change in modern knowledge makes learners...
An Effective Cost Optimization for Thickness Measurement of Metallic Plates
A sensor is a device which receives and responds to a signal when touched. A sensor's sensitivity indicates how much the sensor's output changes when the measured quantity changes. It measures a physical quantity and...
An Effective Scheme for Countering Distributed Denial of Service Attacks on Mobile Ad-hoc Networks
Mobile ad hoc networks play a key role in the private and public communication, yet their application is being hampered by network attacks. One of the most dangerous attacks that pose a serious threat to the mobile a...
Extended Public Key Cryptosystem and Aggregate Key for Secure data Sharing In Cloud
Information sharing is a basic usefulness in cloud storage. We exhibit how to immovably, powerfully, and straight forwardly impart information to others in cloud storage. Cryptographic frameworks are more versatile a...