Neural Networks and Rules-based Systems used to Find Rational and Scientific Correlations between being Here and Now with Afterlife Conditions
Neural Networks and Rules-based Systems used to Find Rational and
Article Fingerprint
ReserarchID
CSTIT0NSQ5
The advancement in banking transaction system over the years has been enormous, and the needs for identifications of customer’s authentication, validation and confirmation are of utmost priority and should be dealt with judiciously. Mobile banking has emerged as one of the main division in digital world of financial transactions and consists of information inquiry, notifications and alerts, applications and payment transfer. Mobile based application is used for connecting customer handset with bank server for all such services in the banking industry. The current trend of Mobile banking as gone beyond the use of One Time Password (OTP) applications used by banks. The problem with current banking applications is that they send data directly to customer in plain text form compromising with security recognised as OTP in most of the online transaction. An online banking customer logging in to the bank’s website with username and password triggers a request to send an OTP to his or her registered mobile phone or the OTP may not be necessary after one or two transaction. There is every likely hold of Mobile phone been stealing, access by unauthorised person or being hacked. Upon receipt of a text message with the OTP, the customer enters it with an additional field on the banking site’s login page to complete the login process since your details are already on your phone. It could have been fine if the mobile network can act immediately but blocking of network provider involves the presentation of National Identification Number (NIN), which is a chain reaction.
Ebole Alpha Friday. 2026. \u201cInernet of Everything: A Solution to Mobile Banking using Voice Recognition\u201d. Global Journal of Computer Science and Technology - H: Information & Technology GJCST-H Volume 22 (GJCST Volume 22 Issue H1): .
Crossref Journal DOI 10.17406/gjcst
Print ISSN 0975-4350
e-ISSN 0975-4172
The methods for personal identification and authentication are no exception.
The methods for personal identification and authentication are no exception.
Total Score: 103
Country: Nigeria
Subject: Global Journal of Computer Science and Technology - H: Information & Technology
Authors: Ebole Alpha Friday, Shomope Adewale Abduirasaq, Amusu Mary (PhD/Dr. count: 0)
View Count (all-time): 281
Total Views (Real + Logic): 2866
Total Downloads (simulated): 27
Publish Date: 2026 01, Fri
Monthly Totals (Real + Logic):
Neural Networks and Rules-based Systems used to Find Rational and
A Comparative Study of the Effeect of Promotion on Employee
The Problem Managing Bicycling Mobility in Latin American Cities: Ciclovias
Impact of Capillarity-Induced Rising Damp on the Energy Performance of
The advancement in banking transaction system over the years has been enormous, and the needs for identifications of customer’s authentication, validation and confirmation are of utmost priority and should be dealt with judiciously. Mobile banking has emerged as one of the main division in digital world of financial transactions and consists of information inquiry, notifications and alerts, applications and payment transfer. Mobile based application is used for connecting customer handset with bank server for all such services in the banking industry. The current trend of Mobile banking as gone beyond the use of One Time Password (OTP) applications used by banks. The problem with current banking applications is that they send data directly to customer in plain text form compromising with security recognised as OTP in most of the online transaction. An online banking customer logging in to the bank’s website with username and password triggers a request to send an OTP to his or her registered mobile phone or the OTP may not be necessary after one or two transaction. There is every likely hold of Mobile phone been stealing, access by unauthorised person or being hacked. Upon receipt of a text message with the OTP, the customer enters it with an additional field on the banking site’s login page to complete the login process since your details are already on your phone. It could have been fine if the mobile network can act immediately but blocking of network provider involves the presentation of National Identification Number (NIN), which is a chain reaction.
We are currently updating this article page for a better experience.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.