Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 38

1CHAPTER ONE

INTRODUCTION

1.1 Background to the study

The Automated Teller Machine (ATM) is a self-service machine that dispenses cash and

performs some human teller functions like balance enquiry, bills payments, mini

statements and so on. ATM transactions are carried out through the use of a debit/credit

card which enables the card holder(s) to access and carry out banking transactions

without a teller,

Nearly every adult has used an ATM, probably without much thought about who owns

and operates it. Many ATMs belong to banks, ATMs are placed not only near or

inside the premises of banks, but also in locations such as shopping centres/malls,

airports, grocery stores, petrol/gas stations, restaurants, or anywhere frequented by large

numbers of people these people typically offer the ATM as a convenience for their

customer base and even for non-customers. This companies and firm provides afterhours

access to, host of transactions such as cash withdrawals, deposits, and transfers, but many

are placed by independent organization in order to gain profit from transaction.,

Using an ATM, customers can access their bank accounts in order to make cash

withdrawals, debit card cash advances, and check their account balances as well as

purchase pre-paid mobile phone credit. Banks have become the principal deplorers of

ATMs. Globally, Banks have become the principal deplorers of ATMs.

In this project, we describe a simulated voice aided ATM system, which is truly

accessible to blind customers. It has all the features of a real ATM machine like

withdrawal of cash, changing of default PIN number, checking of balance etc.

1
1.2 Statement of the Problem

ATM technological innovations have significant importance in Nigeria, especially in the banking

sectors (Adjei, 2015; Sahi & Gupta, 2013; Titilope, 2015). Financial services in a Nigeria 2014

Survey report by Enhancing Financial Innovation and Access (EFInA) revealed that only 7.9%

of Nigerians use ATMs, and 53% of adults who are bank customers use their ATM cards which

also include physically/visually impaired customers. But today, one significant setback of

banking ATM system adoption in Nigeria is that ATMs lack a customized user-friendly interface

for visually impaired or blind user. Visually impaired persons has to go bank for cash

withdrawal. At ATMs they need assistance to operate machine and hence they can be easily

defrauded at ATM centers. ATM centers can be difficult to locate for physically challenged

people. They cannot view ATM screens and text on keypads. It’s difficult to locate ATM card

slot, cash dispenser in the machine, due to inability to see, they face problem to insert the ATM

card which they can repeat doing wrongly, they struggle to collect their money from the

dispenser, it is difficult to them to check different transactions, such as balance check, print

statement, pin change etc. all this are problems faced by visually impaired user in Nigeria.

1.3 Aims and Objectives

This project is aimed at design and implementation of simulating a voice aided ATM system

for blind and visually impaired customers of Nigeria with the following objectives

i. To design a robust and friendly user interface voice aided ATM system that is

easy to use by blind customer to enhance the quality of service these customers get

from their banks.

2
ii. To target at breaching the barrier that prevents blind Nigerians, and persons with visual

impairments to utilize the ATM.

iii. To simulated voice aided ATM which make use of audible instructions that allow the

user to conduct transactions with a degree of security

iv. To provide solution alternatives to the operations inherent in the existing system.

1.4 Significance of the Study

This study when implemented will directly benefits both the financial institutions using ATM

and its blind customers and will also reduce queue in ATM terminals. It will rebrand the image

of Nigerian banking system as fully ICT inclined. This study will in many ways promote good

management in Nigeria banking sector.

1.5 Scope of the Study

The research work is restricted to ATM operated by financial institution and for visually

impaired/blind customer will cover among other things:

1. Changing of customer default PIN.

2. Withdrawal of fund.

3. Checking of balance.

4. Funds transfer

1.6 Definition of Terms

1. Cash Machine: A cash machine (ATM) is a computerized telecommunications device

that enables the clients of a financial institution to perform financial transactions

without the need for a cashier, human clerk, or bank teller,

2. Virtual Reality: This is the act of imitating the behaviour of a working system or

situation or real-world process over time.

3
3. Cash Card: Cash card (ATM Card) is also like magnetic strip card. It is also a data

carrier which electronically reads and writes data. ATM cards are mainly a debit card.

4. Voice Aided ATM: are automatic teller machines that provide the ability to conduct

transactions using both visual and auditory components.

5. Receiver: These are electro-acoustic transducer for converting electric signals into

sounds.

4
CHAPTER TWO

LITERATURE REVIEW

2.0 Conceptual Framework

In this section the research location and analysis of the existing knowledge related to the subject

of inquiry are explored and citied. It is also sells at the proposed research for purposes

representation and critical review of the existing literature.

2.1 Overview of Automated Teller Machine

ATMs are cash machines which enables bank customers to withdraw cash from electronic device

without any human interaction i.e. cashier. Most of the ATM's allow cash withdrawal from

machine not belonging to banks where customer does not have account through interbank

networking. When a customer swipes card in a machine, account information stored in magnetic

strip on card is read by card reader in machine.

Then machine requests for entering pin which is encrypted and send via router to base

transmission station (BTS). BTS transmits request to host processor linked with bank terminal.

Host processor verifies pin with bank information. If customer requests for cash withdrawal then

request is forwarded to host processor through networks for approval. The network demands

bank to verify customer's account for balance through private network among them. After

verification, e-fund is transferred from bank to host processor. In turn host processor sends

approval code to ATM. An electronic eye counts currency and money comes out of the cash

dispenser. Thus, ATMs are facilitating easy access to banking sector but for users with low

vision, visually impaired, people who are dyslexic, people who can't read and people not

5
speaking English are not able to use the ATM services like normal users. In India, Reserve Bank

of India (RBI) circulars and the Indian Banks’ Association (IBA) procedural guidelines on

inclusive banking have established a strong basis for Inclusive Banking for Disabled Persons,

particularly Blind and Low-Vision customers (Sam, 2013). This circular lays down standards of

what is truly accessible ATMs. It mentions accessibility for wheel-chairs, Braille keypads,

standardized user interface, IVRS-based menus, language support for Hindi and English, local

language can be extended and security by option of screen-off.

Fig. 2.1: Network Diagram of ATM

The world’s first talking ATM for the visually challenged people was an NCR machine unveiled

by the Royal Bank of Canada on dated October 22, 1997 (Umar, Sangeetha, Elango and Riyaz,

2015). In dated 6 June 2012 public sector bank Union Bank of India unveiled India's first ever

Talking ATM in Vastrapur, Ahmadabad and Gujarat, (2014). Today there are nearly 6000

bilingual accessible ATMs across the country by various banks.

Talking ATM is advancement of existing ATMs providing audio facility to assist users having

reading disorders, visually impaired people, and illiterate. Audio facility in Talking ATM can be

provided using recordings as well as integrating text to speech system. Okebiro (2013), discusses

6
about assistive technologies to be provided to visually impaired people for better services. We

are targeting one of them as audio assistance using text to speech. Umar Dahiru (2015), suggests

to interview bank management for data collection. This is needed as introducing speech as

assistive technology in existing ATMs for visually impaired people should maintain consistent

interface for visuals as well as for audio. Hence, data collection should consider existing ATMs

visual screen messages. Moreover, requirements in perspective of need of visually impaired

people must be considered. Hence, discussion with real time users need to be carried out before

finalization of audio messages. The paper proposes text to speech for audio generation and

instead of developing new application, it can be plugged into existing applications.

Understanding of operating system of ATM is required for porting of text to speech. Even,

voices used in text to speech should be platform compatible.

Itunuoluwa (2014), discusses briefly different synthesis technologies and NLP, DSP module. We

are used domain specific synthesis module. In this module we used domain specific sentences,

syllables, words and language barakhadi for creating database. V.Manoj (2016), discusses

Personal Identification Number (PIN) to access user account. The paper proposes voice

conversion technique which is based on cloud storage. Delivery of balance statement is based on

voice response by using text to speech. We used audio component based on text to speech

system. Hence even though message change audio can be generated using TTS system.

2.2 ATM usage Challenges for Visually impaired persons

Visually impaired persons has to go bank for cash withdrawal. At ATMs they need assistance to

operate machine and hence they can be easily defrauded at ATM centers (Batiz-Lazo, 2009).

ATM centers difficult to locate for physically challenged people. Assistive technologies can

empower visually challenged people to access ATMs. Challenge they face are (Okebiro, 2013):

7
 They cannot easily locate ATM and cannot reach it.

 They cannot view ATM screens and text on keypads.

 It’s difficult to locate ATM card slot, cash dispenser in the machine.

 Due to inability to see, they face problem to insert the ATM card which they can repeat

doing wrongly.

 They struggle to collect their money from the dispenser.

 It is difficult to them to check different transactions, such as balance check, print

statement, pin change etc.

 Voice messages should be natural, clear, and with proper speed.

 Speech system should be able to utter all ATM domain words and generic words as well.

 System should able to speak out currency, date, time, phone numbers.

 Currency conversion should be in standard format.

 Able to speak out new messages.

To reach ATM centre ramp should be given for wheel chairs. Assistive technologies that can

help set of peoples to access ATMs can be braille notations on keypads, near ATM card slot,

cash dispenser. Also, for people having low vision screen magnifiers for zoom in zoom out can

be given. Speech technologies have to be used for easy access without any human assistance. So,

here we are targeting speech prompts i.e. voice aided ATM systems. Thus, speech enabled

talking ATM will bring assistance, comfort and security to blind users.

2.3 Proposed talking ATM solution to digitally include visually impaired people

Many ATMs provide visual component as well audio component. Audio component is employed

by headphone jack and set of recorded messages. The paper focuses on providing audio

8
component using concatenated based text to speech system. Use of text to speech will benefit

even though messages change, add and delete, as audio can be generated using TTS at any time.

In India ATMs are used by multilingual people. So installing ATM in three languages are

considered one local language, Hindi and English. When user will insert headphone in audio jack

first of all he/she will be asked to select language preference. Accordingly, screen will be

displayed and audio will be played (). Integrating audio component using text to speech engine in

existing ATMs involves designing and implementing audio component, providing interfaces to

existing system which will not alter existing services. On text data collection and speech corpus

generation for text to speech system, necessary things are identified as –

2.4 Enabling Speech

Enabling deployed ATMs with talking feature should have no extra overhead of changing

complete software. If user inserts headphone jack in ATM, voice messages should get enabled in

ATM. Synchronization of text on screen and audio has to be handled.

2.4.1 Speech Application Interface

9
The aim of implementing speech application interface is enabling existing ATMs for speech i.e.

integrating audio support without changing present functionality of ATM. There are standard

speech interfaces to add speech support to applications. We have implemented Microsoft Speech

API (SAPI) 5.1 enabled text to speech. SAPI contains many interfaces and classes for speech

recognition and speech synthesis. For Text To Speech, we have overridden following methods:

Get Voices (Batiz-Lazo, 2009): Populates SAPI compliant voices. Here, we have our own SAPI

complaint voice for different languages.

Speak (): Returns the audio on output stream. Audio is played using this function.

Pause (): pauses audio output.

Resume (): resumes audio output (Batiz-Lazo, 2009).

To give speech enabling feature to application, application has to connect to speech interface. So,

standard speech interfaces need to be implemented for accessing voice and TTS engine. Speech

interface allows easy integration in application. We have implemented Microsoft Speech API

(SAPI) 5.1 enabled text to speech engine and voice. SAPI enables easy integration.

2.4.2 Text To Speech (TTS)

Text to Speech takes input text messages and outputs speech signal. Hybrid TTS in financial

domain is developed based on concatenation approach for Talking ATM. As TTS engine will be

deployed in ATM machine, it should have low memory footprint and high response time. TTS

development has taken account of numbers in currency, date format in input text. Audio quality

of TTS output is measured by two parameters naturalness and intelligibility. Recording has been

done by voice artist in professional studio. Text data for recording is collected from various

banking domain sites (Batiz-Lazo, 2009), cleaned and applied optimization algorithms for

minimal recording. Engine is developed in 'C' language to port on any platform.

10
ATM domain is limited financial domain. Development of TTS for ATM domain should

consider low footprint engine, high response time, naturalness and accuracy (Kisshore, Kishore

and Praiad, 2013). TTS takes input text and do processing on it. Input text is cleaned, segmented

to introduce prosody in audio output. Numbers in currency, date format are normalized and

converted into phonetic string. These phonetic strings are mapped into array of speech units and

speech units are concatenated, normalized to produce speech output.

2.5 Existing Strategies for Enhancing Banking ATM Interface Systems Security

Securing the ATM system interface is important to impact its usability because technology alone

is not sufficient to ensure information security. Information security has been defined from

multiple perspectives and with a holistic approach that expands beyond the technical security, to

comprise the environment, the interface technology, and the people (Narain, Gupta, & Ojha,

2014; Perez, Branch, & Kuofie, 2014; Coronado, 2013; Taylor & Robinson, 2015). According to

Kim (2014), information systems have six components:

• Software,

• Hardware,

• Data,

• People (users),

• Procedures, and

• Networks.

Among these six components, users and procedures are often neglected in information security

and interface design considerations (Sommestad, Hallberg, Lundholm, & Bengtsson, 2014;

Taylor & Robinson, 2015). This results from inability to handle the differences in behavior

regarding the intent to implement security measures or administrative errors (Komatsu, Takagi,

11
& Takemura, 2013). End-users should be made aware of information security, the information

security techniques and procedures to avoid being misused or misinterpreted (Komatsu et al.,

2013). To protect user’s information and systems, not only is proper banking ATM technology

required, the human side of security must be incorporated. Usability interfaces should be well

managed because technology alone is not sufficient to ensure information security (Carolan,

2016). Some researchers attest to the fact that humans appear to be the most important links to

the information security of any organization and invariably constitute the highest risk to the

information security measures and information integrity of any organization (Narain et al., 2014;

Perez et al., 2014; Coronado, 2013). What contributes to information insecurity has proven to be

complex, dynamic and more of psychological in nature (Cottrell, 2016). Security measures

required to handle threats to the organizations’ data confidentiality, integrity, and availability are

complex, dynamic and psychological (Thompson, 2013). Perimeter defenses, control over

devices, employees adherence to policies, control over policy enforcement, and enterprise

definitions are no longer reliable as there are no perimeter boundaries and all security platforms

are complex, dynamic and psychological (Thompson, 2013; Fenz, Heurix, Neubauer, &

Pechstein, 2014). Attackers are personalizing their attacks, but defenses have not been

personalized (Thompson, 2013).

Therefore, strategies for enhancing banking ATM interface systems security should adequately

incorporate the users and procedures. This is because technology alone cannot solve banking

ATM security problems until users understand technology and the problems (Kim, 2014;

Carolan, 2016; Shahpasand, Shajari, Hashemi-Golpaygani, & Ghavamipoor, 2015). Users failing

to understand technology and the problems can lead to lack of trust which can undermine even

the strongest security countermeasures (Bertino et al., 2014; Pfleeger, 2014; Taylor & Robinson,

12
2015). Poor banking ATM interface designs affect trust, while lack of trust can lead to security

breaches because banking ATM system users are driven to use the system based on their

perceived trust level, which determines their perceived usefulness of the system (Kaushik &

Rahman, 2015; Kazi & Mannan, 2013; Patsiotis, et al., 2013; Safeena et al., 2013).

Three external variables that are determinants of TAM’s PEOU and PU: perceived risk, social

influence, and facilitating conditions have been found to have strong positive correlation with the

intention to adopt technology services (Kazi & Mannan, 2013; Martinsa et al., 2014; Yang et al.,

2014; AlKailani, 2016). Perceived risk was found to have significant negative impact on the

customers’ intention to adopt technology services (Kazi & Mannan, 2013). Martinsa et al. (2014)

found that among the three variables: perceived risk, social influence, and facilitating conditions,

perceived risk was the most important in explaining users’ intentions, while facilitating

conditions was not deemed important to explain usage. Yang et al. (2014) considered two types

of perceived risk: system dependent and transactional related risk. Findings from their study

claimed that system dependent risk was likely ignored by consumers pursuing convenience and

usefulness of banking online payment, which points to the fact that e-banking or third-party

payment platform designs should focus more on reducing transactional risk (Astakhova, 2015).

Social influence also was a significant factor in the intention to adopt mobile banking (Kazi &

Mannan, 2013).

Technology alone is not sufficient to ensure information security (Coronado, 2013). Human

vulnerabilities that lead to poorly designed interfaces are increasingly exploiting information

systems. This is because interface developers cannot plausibly anticipate all user needs and

requirements in detail, while users keep changing their behavior towards the system or change

what they want after they started using the system (Thimbleby, 2015). Poorly designed banking

13
ATM interface can affect users’ trust, which in turn, can lead to security breaches (Kaushik &

Rahman, 2015). This is because banking ATM system users are driven to use the system based

on their perceived trust level, which determines their perceived usefulness of the system

(Patsiotis, et al., 2013).

Therefore, easy-to-use banking ATM system interface that will answer to literacy levels and

cultural differences of users should adequately incorporate human aspect of security, and that is,

the users and procedures. Banking ATM system interface developers should therefore be

informed that, as part of implementing ATM security function, ATM system interfaces should

incorporate facilities that guarantees customers’ perceived trust (Kaushik & Rahman, 2015; Kazi

& Mannan, 2013; Patsiotis, et al., 2013). Perceived trust, mobility and attitudes positively affect

the acceptance of information system, while perceived reputation and environmental risk were

found to be positively related to perceived trust, and negatively related to perceived trust

respectively (Dastan & Gürler, 2016). Perceived trust, perceived mobility and attitude factors

have a positive effect on acceptance of technology (Dastan & Gürler, 2016). Environmental risk

negatively influenced adoption of technology (Kaushik & Rahman, 2015; Kazi & Mannan,

2013), while perceived trust was observed to be a strong factor predicting the technology

adoption intention, because customers pay considerable attention to the aspects related to trust to

support their decision to use such sensitive services (Kaushik & Rahman, 2015; Kazi & Mannan,

2013). Teoh, et al. (2013), however, found trust and security not significantly associated with

consumers’ perception toward banking facilities. Trust was found marginally or not related to the

intention to use (Teoh, et al., 2013).

There have been all forms of breaches and fraudulent activities that may be perpetrated against

banking ATMs, such as skimming attacks, card trapping, pin cracking, phishing/vishing attack,

14
ATM malware, hacking, and physical attack (Nana, & Nana, 2013). Proposed systems to

increase the ATM security found in literature were based on various biometric technologies such

as hand geometry, fingerprint, voice, and signature verification, retinal and iris scanning, facial

recognition, vascular patterns, keystroke recognition, vein pattern achievable with smart camera

devices and LED array used to capture these digital images, and applicable with credit card and

smart card security, ATM security, etc. (Go, Lee, & Kwak, 2014; Mandot, & Verma, 2015).

Fingerprint images and iris images, were often recommended as strong security measures

because of their unique physiological traits, convenience, reduction of cash theft, and estimated

passwords administrator cost. (Betab & Sandhu, 2014; Kassem, Mekky, & Elawady, 2014; Mike

& Momodu, 2015). However biometric fingerprint authentication is challenged with difficulty of

detecting artificial finger print, required fingerprint image processing resources and time before

it can be successfully processed (Mike & Momodu, 2015). Since the ATM service validates a

customer at the time of service, it was possible to send all entry of an ATM customer such as his

pin and any other required biometrics to the bank for validation as part of each transaction to

make the developed ATM software more secure as compared to the PIN or password

authentication software (Betab & Sandhu, 2014).

One disadvantage of a general iris recognition system, as a means of enhancing reliable user

authentication at Automated Teller Machines (ATMs) is its vulnerability to a number of threats

because templates are typically stored in a database or a smart card in a general iris recognition

system, as a means of enhancing reliable user authentication at Automated Teller Machines

(ATMs), but a biometric system is vulnerable to a number of threats as a result (Bose, 2013).

However, a couple of biometric systems such as fingerprint mechanism and iris recognition

technology, can be combined with cryptography (biometric cryptosystems) because of their

15
variability, stability and security advantages to effectively improve the security and privacy of

biometric systems in banking ATMs (Bose, 2013). Combined multimodal biometric systems

with and without using thresholds have been found to give an accuracy of 96.67% (Ciampa,

2013; Kassem et al., 2014). According to Reno (2013), multifactor authentication factors coupled

with the use of risk analysis during authentication can mitigate against ATM skimming and

frauds. However, a combination of several factors including universality, measurability,

performance, usability and circumvention during the selection of a biometric for use in a specific

application, make it difficult for the trait to be easily imitated using an artifact or substitute

(Kumar, et al., 2014). Through facial recognition authentication, each individual at the ATM

center has access to an easy panic button and a sound sensor-cum alarm that provides

autonomous, continuous and secured surveillance system to alert all the security dimensions

available (Kumar, et al., 2014).Thus facial identification for authentication provides sufficient

data in the event of any discrepancies and mitigates the problems faced in the conventional

security system because it identifies the uniqueness and safety of the costumer and machine

(Kumar, et al., 2014). Better personal identification number (PIN) authentication can be realized

with the use of multi-touch allowed secret input operation into a PIN authentication that allows

more than one number at a time input without lowering usability and acceptability (Bakpo &

Ezugwu, 2014; Takada, & Kokubun, 2014).

Over the years there have been enormous advances in the field of technical information security

controls with complex and matured technical controls such as antivirus, client-based firewalls,

and real-time patching (Baranwal, Nandi, & Singh, 2017). Some socio-technical trends that are

likely to shape the cybersecurity environment in the next decade have been identified (Dupont,

2013), and their possibility to produce great effect in the information security technical controls

16
was suggested (Hinduja & Kooi, 2013). In the last decades, the Institute of Electrical and

Electronics Engineers (IEEE) Security& Privacy standards has focused on a wide variety of

important policies that has not only contributed to the understanding of security, but also to the

innovative and effective solutions to information technical security problems (Kalaimannan &

Gupta, 2017). Much prior research has also focused on individual fraud types such as identity

theft, intellectual property fraud or insurance fraud (Rawlings & Lowry, 2017; Warren, 2015).

Despite the implementation of advanced security technical controls, information systems have

remained vulnerable. This is because there are evidences that suggest that human vulnerabilities

resulting from poorly designed interfaces are increasingly exploiting information systems

(Temizkan, Park, & Saydam, 2017). Some researchers have noted many reasons for this, ranging

from problems with the usability of information systems (Cristian & Volkamer, 2013; Okesola &

Grobler, 2014), compromised decisions by users (Greavu-Serban & Serban, 2014) and limited

ability to comply with Knowledge Management Systems or instructions (de Albuquerque & dos

Santos, 2015; Shehata, 2015). However, Dwivedi, et al., (2015) summarized and categorized

these mistakes into four categories: process (management process and technical project

management methodologies), people involved in a project, product (project size and urgency,

including its goals, performance, robustness, and reliability), and technology (IS failures

resulting from the poor interface, use and misuse of modern technology). Nevertheless, a study

by Ho, Hsu, and Yen (2015) proposed three major control items of the Information Security

Management System (ISMS): security policy, access control, and secure human interface

resources that provides improved strategies for a secure system.

2.6 Historical Overview of ATMs in Nigeria

17
This section provides a brief historical description of ATM in Nigeria. Nigeria is one of the West

African countries with an estimated population of over 160 million inhabitants and is known as

the most populous country in Africa (Afaha, 2013). Nigeria became a British protectorate in

1891 and became independent in 1960 (Afaha, 2013). Nigeria has more than 250 different ethnic

or linguistic groups, with three major ethnic groups: Igbo (southeast), Yoruba (southwest), and

the Hausa Fulani (north). Two religious groups are predominant: Muslim in the north and

Christians in the south. Nigeria is a Federal Republic, with the 36 states (Afaha, 2013). Abuja,

proclaimed the nation’s capital in 1976, is in the Federal capital territory state. Other major cities

are Enugu and Owerri in the southeast, Lagos and Ibadan in the southwest, Kano in the north,

and Port Harcourt in the southeast (Afaha, 2013). The Central Bank of Nigeria (CBN) introduced

ATM into the Nigerian economy in 1989 (Olowookere & Olowookere, 2014; Oyewo, 2014;

Sowunmi, Amoo, Olaleye, & Salako, 2014). The first commercial bank in Nigeria to install

ATM in Nigeria was the defunct Societe Generale Bank Nigeria (SGBN) in 1989, and it was

installed by National Cash Registers (NCR) (Akomolafe, 2015). Hence Societe Generale Bank

Nigeria was the first to introduced ATM in Nigeria in 1989, popularly known as “cash point 24”

(Oyewo, 2014). This was followed later in 1991 by First Bank of Nigeria Plc with the name

known then as “First Cash” (Olowookere & Olowookere, 2014).

2.7 Existing Banking ATM Interface System in Nigeria

Some existing banking ATM user interfaces in Nigeria lack simple and easily understandable

design and contents, which rendered them not easy-to-use by all users with varying abilities and

literacy levels. Only 7.9% of Nigerians use ATMs and 53% of adults who are bank customers

use their ATM cards (EFInA, 2014). Context-aware user interface (UI) plays an important role in

human-computer interaction tasks in location based services such as bank ATMs. One significant

18
setback of banking ATM system adoption in Nigeria is that ATMs lack customized user-friendly

interfaces. This makes the ATMs appear complex and difficult to use by users. To the ATM user,

the interface is the product, not necessarily the ATM machine (Zhang, et al., 2013) and the most

critical component of the ATM system that determines ATM acceptability (Darejeh & Singh,

2014a).

A relationship exists between concepts of “software non-usability” with complexity arising from

user-unfriendly interface designs. ATM interface screen designs differ among the banks

depending on the software developer organization engaged by the bank. Generally, there are

menu options such as “Withdraw”, “Current”, “Savings”, “Account number of beneficiary” etc.,

which are not well understood by all people with varying abilities and literacy levels (Darejeh &

Singh, 2014a; Jimoh & Babatunde, 2014). Most existing ATM systems do not have interface

facilities that are easy-to-use by users with varying abilities and literacy levels, such as

(a) the ability of zoom in the software;

(b) provision of speech recognition for interacting with software, and

(c) customized abilities in software for tailoring font size and color

(d). applying the principles that will reduce the complexity of the interface such as use of easily

understandable words;

(e) use of larger icons in preference to small icons;

(f) use of attractive avatars (Cruz-Zapata, Hernández-Niñirola, Idri, Fernández-alemán, & Toval,

2014; SathishKumar & Kamalraj, 2014).

These deficiencies made some existing interfaces not easy-to-use by all users with varying

abilities and literacy levels. Some existing banking ATM user interfaces in Nigeria lack simple

and easily understandable design and contents such as the use of graphical metaphor to

19
encourage those that are weak in vocabularies (Jegede, 2014). Some are not very visible, because

they just have a black background screen with illuminated text, which is quite dull and not very

visible. This does not go well for the elderly users whether literate, or not. Poorly designed UI is

not easy-to-use or usable, no matter how well the machine performs (Alshameri & Karim-

Bangura, 2014). According to SathishKumar and Kamalraj (2014), a combination of text and

graphical metaphor may be the best UI in this case.

2.5 Related Literature Review


1. A study by Alfimtsev, Basarab, Devyatkov, and Levanov (2015), analyzed the values of

human brainwaves when dealing with UI, and claimed that the brainwaves indicate

“calm” when working with a friendly interface and “exited” or “nervous” or “agitated”

when dealing with inconvenient UI. According to the study, the average values of

brainwaves in calm and excited states depend on the interface usability (Alfimtsev, et al.,

2015). When users are agitated because the UI is not easy-to-use, more time is wasted on

the ATM machine, resulting in long queue or much crowd at the ATM center (Zhang, et

al., 2013). Figure 1 shows a picture of people in Nigeria accessing an ATM. In Nigeria,

some ATM user interfaces have remained notoriously user-unfriendly. This is because

the developers of these ATM user interfaces have assumed that ATMs are the province of

the specialized or literate users (Darejeh & Singh, 2014b). In this case that assumption

fails because the ATMs are not easy-to-use by all people of varying abilities and literacy

levels who must not be denied of the use of ATMs (Omari & Zachary, 2013). Hence this

study aims at identifying strategies software developers of banking ATM systems use to

create easy-to-use ATM system interfaces for a variety of people with varying abilities

and literacy levels.

20
2. According (Michael, 1986) entitled an introduction to archival automation, said that the

steps involved in planning an automation project for record and archives management. It

begins with a discussion of the concept of automating and the reasons for automating and

the reason for automation, it then discusses the possible uses of automation in record and

archives contents. Automation refer to a variety of application using computer technology

in this module, a number of different application will be discussion. These will include

application using generic software such as word processing management and database

application, or specially written record management application. Computer can stand

alone, or linked using networks (LANs, WANs, intranets, or the internet) and cause a

wide range of peripherical devices.

3. According to (Al-Najjar, 2010) entitled management information system managerial

perspective said that the management information system is one of the most important

tools in any organization, which aims to provide reliable, complete , accessible and

understandable information in a timely manner to the user of the system. Management

system assist in automating a task. Automation can save time, money, sores and reduce

employees staff and enhance organizational workflow. In addition assist in increased

organization productivity, effectiveness, increase in customer satisfaction and efficiency

of the work

4. According to (Hardcastle, 2011) entitled Business information system said that

management information system is basically concerned with the processing, collecting,

storing and transmitting relevant information to support the management operation of any

organization.

21
CHAPTER THREE

SYSTEM ANALYSIS AND RESEARCH METHODOLOGY

3.1 Research Methodology

Within the qualitative research, there are different research approaches that can be used; in this

case, the approach used was case study research. A case study is a research strategy which

focuses on a single organization, institution, event, decision, policy, etc. This is because a case

study provides the research an opportunity for one aspect of a problem to be studied in some

depth. It also identifies organizational features which identify the processes at work and these

show how such features affect the implementation of systems and how they influence the way an

organization functions. In this case the study will focus on designing and implementation of

simulating a voice aided ATM system for blind and visually impaired customers of Nigeria. For

the purpose of this work, the Structured System Analysis and Design Methodology (SSADM)

were used to analyze the system. In this, the Top-Down Design approach was used, where the

entire system was broken into several subsystems and each subsystem also broken into different

modules. SSADM is waterfall method for the analysis and design of information system.

SSADM can be thought to represent a pinnacle of the rigorous document-led approach to system

design, and contrasts.

22
3.1.1 Waterfall Model design

Waterfall approach was first SDLC Model to be used widely in Software Engineering to ensure

success of the project. In "The Waterfall" approach, the whole process of software development

is divided into separate phases. In Waterfall model, typically, the outcome of one phase acts as

the input for the next phase sequentially.

Following is a diagrammatic representation of different phases of waterfall model.

Figure 3.1: waterfall model

The sequential phases in Waterfall model are:

23
 Requirement Gathering and analysis: All possible requirements of the system to be

developed are captured in this phase and documented in a requirement specification doc.

 System Design: The requirement specifications from first phase are studied in this phase

and system design is prepared. System Design helps in specifying hardware and system

requirements and also helps in defining overall system architecture.

 Implementation: With inputs from system design, the system is first developed in small

programs called units, which are integrated in the next phase. Each unit is developed and

tested for its functionality which is referred to as Unit Testing.

 Integration and Testing: All the units developed in the implementation phase are

integrated into a system after testing of each unit. Post integration the entire system is

tested for any faults and failures.

 Deployment of system: Once the functional and nonfunctional testing is done, the

product is deployed in the customer environment or released into the market.

 Maintenance: There are some issues which come up in the client environment. To fix

those issues patches are released. Also to enhance the product some better versions are

released. Maintenance is done to deliver these changes in the customer environment.

All these phases are cascaded to each other in which progress is seen as flowing steadily

downwards (like a waterfall) through the phases. The next phase is started only after the defined

set of goals are achieved for previous phase and it is signed off, so the name "Waterfall Model".

In this model phases do not overlap.

24
Waterfall Model Application: Every software developed is different and requires a suitable

SDLC approach to be followed based on the internal and external factors. Some situations where

the use of Waterfall model is most appropriate are:

 Requirements are very well documented, clear and fixed.

 Product definition is stable.

 Technology is understood and is not dynamic.

 There are no ambiguous requirements.

 Ample resources with required expertise are available to support the product.

 The project is short.

Waterfall Model Pros & Cons: The advantage of waterfall development is that it allows for

departmentalization and control. A schedule can be set with deadlines for each stage of

development and a product can proceed through the development process model phases one by

one.

Development moves from concept, through design, implementation, testing, installation,

troubleshooting, and ends up at operation and maintenance. Each phase of development proceeds

in strict order.

25
Disadvantage The disadvantage of waterfall development is that it does not allow for much

reflection or revision. Once an application is in the testing stage, it is very difficult to go back

and change something that was not well-documented or thought upon in the concept stage. The

following table lists out the pros and cons of Waterfall model:

Pros

 Simple and easy to understand and use

 Easy to manage due to the rigidity of the model. Each phase has specific deliverables and

a review process.

 Phases are processed and completed one at a time.

 Works well for smaller projects where requirements are very well understood.

 Clearly defined stages.

 Well understood milestones.

 Easy to arrange tasks.

Process and results are well documented.

Cons

 No working software is produced until late during the life cycle.

 High amounts of risk and uncertainty.

26
 Not a good model for complex and object-oriented projects.

 Poor model for long and ongoing projects.

 Not suitable for the projects where requirements are at a moderate to high risk of

changing. So risk and uncertainty is high with this process model.

It is difficult to measure progress within stages.

3.1.2 Benefits of system development life cycle

Timeliness: Theoretically SSADM allows one to plan, manage and control a project well which

are essential to deliver the project on time.

Usability: Within SSADM, special emphasis is put on the analysis of user needs.

Simultaneously, the system model is developed and a comprehensive demand analysis is carried

out. Both are tried to see if they are well suited to each other.

Better quality: SSADM reduces the error rate of information system by defining a certain

quality level in the beginning and constantly checking the system.

Improvement of productivity: By encouraging on-time delivery, meeting business

requirements, ensuring better quality, using human resources effectively as well as trying to

avoid bureaucracy. It improves the overall productivity of the specific project and the company.

Cuts cost: SSADM separates the logical and the physical system design so the system does not

have to be implemented again with new hardware.

3.2 Method of Data Collection

27
The following methods are used in getting data for the research. Some of the following methods

include;

a. Interview method

b. Observation method

a. Interview Method:

The researcher will interview various visually impaired customers who patronize ATM galleries

so as to seek information on the form of services they prefer from an online system, he will also

interviewed some staffs of the banks where these ATM galkleries are located so as to obtain

information on the working principles of such sites.

b. Observation Method

The research team during the course of the research will seek for first-hand information by

visiting the several ATM galleries several times to observe the workings of the Automated Teller

machines as well as their principles of operations.

3.3 Analysis of the Existing System

System analysis is the procedure by which activities in an organization are studied with the aim

of determining how to resolve the ugly ill mate in most efficiently way. It is essential for a

thorough analysis of the present system. However the level of success achieved in carrying out a

work of this dimension depends on the methodology adopted.

From the analysis of the current system the following conclusions are drawn:

i. Visually Impaired users cannot view ATM screens and text on keypads.
ii. It’s difficult to locate ATM card slot, cash dispenser in the machine, due to inability to
see, They face problem to insert the ATM card which they can repeat doing wrongly,
iii. They struggle to collect their money from the dispenser,

28
iv. It is difficult to them to check different transactions, such as balance check, print
statement, pin change

Advantages of the System

i. Blind and partially sighted people can check on their accounts on their own.

ii. As the transactions is through voice commands, it is very helpful to the uneducated

people as well as aged ones

3.3.1 System Design

A system design is a conceptual model that defines the structure, behaviour, and more views of a

system (Batiz-Lazo, 2009). An architecture description is a formal description and representation

of a system, organized in a way that describes the structures and behaviours of the system.

System design gives an idea about the content of the elements comprising a system, the

relationships among those elements, and the rules governing those relationships. The

architectural components and set of relationships between these components that an architecture

description may consist of hardware, software, documentation, facilities, manual procedures, or

roles played by organizations or people. A system design can comprise system components and

the expand system. So that will work together to implement the overall system. There have been

efforts to formalize languages to describe system architecture, collectively these are called

architecture description languages Normal or Body Text

3.3.1.1 Easy V R

Easy V R 3 is a multi-purpose speech recognition module designed to easily add versatile, robust

and cost effective speech recognition capabilities to almost any application (Marketa, and Daniel,

2014). The Easy V R 3 module can be used with any host with an UART interface powered at

3.3V, 5V, such as PIC and Arduino boards. Some application examples include home

automation, such as voice controlled light switches, locks, curtains or kitchen appliances, to the

29
most popular robots on the market. It can be easily plugged into a solder-less breadboard or

standard prototyping board, and it is compatible with the microbus specifications.

The Easy V R 3 communicates via an asynchronous serial interface (commonly known as

UART interface), with the following features:

Baud Rate: 9600 (default), 19200, 38700, 57600, 115200

Frame: 8 Data bits, No parity, 1 Stop bit

20 X 4

4 X 3 KEYPAD LEVELSHIFTER PC SPEAKER

BUZZER1 (DOOR)
EASY VR

ATMEGA2560 BUZZER 2 ( CARD )


SMART CARD

R305

R305

BUZZER3 (CASH)

IR 1 ENTRY

SOLENOID

IR2 EXIT

PIR

Fig. 3.1: Architecture diagram


3.3.1.2 R305

This is a finger print sensor module with TTL UART interface for direct connections to

microcontroller UART or to PC through MAX232 / USB Serial adapter. The user can store

the finger print data in the module and can configure it in 1:1 or 1: N mode for identifying the

30
person. The FP module can directly interface with 3v or 5v Microcontroller. A level

converter is required for interfacing with PC serial port.

Optical biometric fingerprint reader with great features and can be embedded into a variety of

end products, such as: access control, safety deposit box, car door locks.

3.3.1.3 Level Shifter

MAX232 IC is used to convert the TTL/CMOS logic levels to RS232 logic levels during serial

communication of microcontrollers with PC. The controller operates at TTL logic level (0-5V)

and the serial communication in PC works on RS232 standards (-25 V to + 25V). This makes it

difficult to establish a direct link between them to communicate with each other.

3.3.1.4 IR Sensor

IR Sensors work by using a specific light sensor to detect a select light wavelength in the Infra-

Red spectrum. By using an LED which produces light at the same wavelength as what the sensor

is looking for. By keeping an object close to the sensor, the light from the LED bounces off the

object and into the light sensor

3.3.1.5 Buzzer

A buzzer or beeper is an audio signaling device; it may be mechanical, electromechanical, or

piezoelectric. Typical uses of buzzers and beepers include alarm devices, timers and

confirmation of user input such as a mouse click or keystroke.

3.3.1.6 Keypad

The 12 keys keypad is widely used in many applications, some of those are telephones and ATM

machines. There are many different types of keypads and the keypad which would be explained

here would a matrix method in order to find which key is pushed.

31
3.3.1.7 LCD

LCD (Liquid Crystal Display) screen is an electronic display module and find a wide range of

applications. These modules are preferred over seven segments and other multi segment LEDs.

The reasons being: LCDs are economical; easily programmable.

Features of the System

• More economical as finger print scanner is much easier to set up.

• Fingerprint biometric scheme is much user friendly as it is unique and cannot be copied

• Finger-print authentication is accurate

• Emphasis the idea of self-dependence to blind as well as poorly educated people.

• Much safer scheme, as there is no fear of losing the secret PIN by any means

• Confusions regarding memorizing and maintaining PINs can be avoided

32
FLOW CHART

33
34
System Requirements & Specification

Here we are including the softwares and hardwares used for developing the project and

implementing the project

SOFTWARE REQUIREMENTS

Operating system: windows 7/8.1

Coding language: python

Python Visual studio (2008 version)

Proteus (simulation software)

Circuit wizard

35
REFERENCES

Bátiz-Lazo, B. (2009). Emergence and Evolution of ATM Networks in the Uk, 1967−2000.
Business History 51(1), 1–27 (2009).

Bátiz-Lazo, B. and Reid, R. (2008). Evidence from the Patent Record on the Development of
Cash Dispensers and Atm Technology. In: Ieee History Of Telecommunications
Conference, Paris (2008).

Charles T. H., John, J. G., George R. and Doddington, R. (2015). "The Atis Spoken Language
Systems Pilot Corpus" Texas Instruments Incorporated.

Https://En.Wikipedia.Org/Wiki/Talking_Atm.

Https://Msdn.Microsoft.Com/En-Us/Library/Ee125663(V=Vs.85).Aspx.

Https://Www.Sbi.Co.In/Index-Hindi_Latest.Htm.

Itunuoluwa, I., Jelili O. and Olufunke O. (2014)."Design and Implementation of Text To Speech
Conversion for Visually Impaired People" International Journal of Applied Information
Systems (Ijais), Foundation of Computer Science Fcs, New York, Usa Volume 7 No. 2,
April 2014.

Karthik, G.V.S., Fathima, S.Y., Rahman, M.Z.U., Ahamed, S.R. and Lay-Ekuakille, A., (2013).
Efficient Signal Conditioning Techniques for Brain Activity in Remote Health Monitoring
Network. Ieee Sensors Journal, 13(9), Pp. 3273-3283.

Kishore, P.V.V., Kishore, S.R.C. and Prasad, M.V.D., (2013). Conglomeration Of Hand Shapes
And Texture Information For Recognizing Gestures Of Indian Sign Language Using Feed
Forward Neural Networks. International Journal of Engineering and Technology, 5(5), Pp.
3742-3756.

Kishore, P.V.V., Prasad, M.V.D., Prasad, C.R. and Rahul, R., (2015). 4-Camera Model For Sign
Language Recognition Using Elliptical Fourier Descriptors And Ann, International
Conference On Signal Processing And Communication Engineering Systems - Proceedings
Of Spaces 2015, In Association With Ieee 2015, Pp. 34-38.

Manoj Kumar, V., Prathap, S., Gowthamn, B. and Sriram, G. (2016). "Speaking Atm Using
Speech Synthesis" International Journal Of Contemporary Research In Computer Science
And Technology (Ijcrcst) Volume 2, Issue 3. March 2016.

Markéta, J. and Daniel, T. (2014). "Minimum Text Corpus Selection For Limited Domain
Speech Synthesis". International Conference On Text, Speech, And Dialogue, Pp 398-407.

Okebiro, J. O. and Omariba B. Z. (2013). "Investigating ATM System Accessibility for People
with Visual Impairments". Iosr Journal of Computer Engineering Volume 15, Issue 5 (Nov.
- Dec. 2013).

36
Oluwaseun, B. R., Muyiwa, O., Olanrewaju, B. A., Omolaran, B. B., & Iyabo, B. S. (2017). E-
Attendance System using Waterfall Software Development Life Cycle Simulation. Journal
of Computer Science and Control Systems, 10(2), 10-15.
Omari, O. J., & Zachary, O. B. (2013). Investigating ATM system accessibility for people with
visual impairments. Journal of Computer Engineering, 15(5), 13-18.
Omotayo, F. O., & Adebayo, A. K. (2015). Factors Influencing Intention to Adopt Internet
Banking by Postgraduate Students of the University of Ibadan, Nigeria. Journal of Internet
Banking and Commerce, 20(3), 1-29. doi:10.4172/1204-5357.1000123
Orange, A. (2016). Encouraging Reflexive Practices in Doctoral Students through Research
Journals. The Qualitative Report, 21(12), 2176-2190; 226.
Oyewo, B. M. (2014). Strategic management analysis of a Nigerian firm: Evidences from the
First Bank of Nigeria (FBN) group. Journal of Accounting, Finance & Management
Strategy, 9(1), 51-74.
Padgett, J., Gossett, K., Mayer, R., Chien, W., Turner, F. (2017). Improving Patient Safety
through High Reliability Organizations. The Qualitative Report, 22(2), 410-425.
Palinkas, L. A., Horwitz, S. M., Green, C. A., Wisdom, J. P., Duan, N., & Hoagwood, K. (2015).
Purposeful Sampling for Qualitative Data Collection and Analysis in Mixed Method
Implementation Research. Adm Policy Ment Health, 42(15), 533-544. doi:10.1007/s10488-
013-0528-y
Park, E., & Kim, K. J. (2014). Driver acceptance of car navigation systems: integration of
locational accuracy, processing speed, and service and display quality with technology
acceptance model. Personal and Ubiquitous Computing, 18(3), 503-513.
doi:10.1007/s00779-013-0670-2
Park, H., & Song, H. D. (2015). Make e-learning effortless! impact of a redesigned User
Interface on usability through the application of an affordance design approach. Journal of
Educational Technology & Society, 18(3) 185-196.
Park, N., Rhoads, M., Hou, J., & Lee, K. M. (2014). Understanding the acceptance of
teleconferencing systems among employees: An extension of the technology acceptance
model. Computers in Human Behavior, 39, 118-127. doi;10.1016/j.chb.2014.05.048; 227.
Patsiotis, A. G., Hughes, T., & Webber, D. J. (2013). An examination of consumers' resistance to
computer-based technologies. The Journal of Services Marketing, 27(4), 294-311.
doi:10.1108/08876041311330771
Patton, M. Q. (2015). Qualitative research & evaluation methods: Integrating theory and
practice (4th ed.). Thousand Oaks, CA: Sage.
Paul, P. K., Bhuimali, A., & Chatterjee, D. (2017). Human Centered Computing: Healthy Gift of
Social Engineering for Promoting Digital Humanities: A Short Communication.
International Journal of Applied Science and Engineering 5(1),13-18. doi:10.5958/2322-
0465.2017.00002.8

37
Peiris, P. M., Kulkarni, D., & Mawatha, C. (2015). Implications of trust and usability on e-
commerce adoption. International Journal of Business and Information, 10(4), 519-556.
Perez, R. G., Branch, R., & Kuofie, M. (2014). EOFISI Model as a Predictive Tool to Favor
Smaller Gaps on the Information Security Implementations. Journal of Information
Technology and Economic Development, 5(1), 1-20.
Peters, K., & Halcomb, E. (2015) Interviews in qualitative research. A consideration of two very
different issues in the use of interviews to collect research data. Nurse Researcher. 22(4),
6-7. doi:10.7748/nr.22.4.6.s2
Pfeiler-W, A., Buffington, M. L., Rao, S., & Sutters, J. (2017). Research Is... Results: From a
National Survey. Art Education, 70(2), 8-15.
Pfleeger, S. L. (2014). Technology, Transparency, and Trust. IEEE Security & Privacy, 12(6), 3-
5. doi:10.1109/msp.2014.128
Piña, A. A., & Sanford, B. K. (2017). The ID Database: Managing the Instructional Development
Process. Information. TechTrends; Washington, 61(4), 331-340. doi:10.1007/s11528-017-
0162-8
Pinegger, A., Hiebel, H., Wriessnegger, S. C., & Müller-Putz, G. R. (2017). Composing only by
thought: Novel application of the P300 brain-computer interface. PLoS ONE 12(9), 1-19.
doi:10.1371/journal.pone.0181584
Ponelis, S. R. (2015). Using interpretive qualitative case studies for exploratory research in
doctoral studies: A case of Information Systems research in small and medium enterprises.
International Journal of Doctoral Studies, 10, 535-550.

Ramkiran, D.S., Madhav, B.T.P., Prasanth, A.M., Harsha, N.S., Vardhan, V., Avinash, K.,
Chaitanya, M.N. and Nagasai, U.S., (2015). Novel Compact Asymmetrical Fractal
Aperture Notch Band Antenna. Leonardo Electronic Journal of Practices and Technologies,
14(27), Pp. 1-12.

Sam, T. (2013). "Rbi Circular on Accessible ATMs 5 Years On, A Retrospect And Prospect".
Author, “Title Of The Paper”, Proceedings Of The Conference Name, 10 (200); Pp: 20-30,
Http://Dx.Doi.Org/10.1109/Mmm.2013.2248651

Umar, D., Sangeetha, E. and Riyaz, A.H. (2015). "System Design for Talking ATM for the Blind
Users". International Journal of Information System And Engineering, 1 (1): 90-7.

38

You might also like