References
[2]. Gyamfi, N. K., Mohammed, M. A., Nuamah- Gyambra, K., Katsriku, F., & Abdulah, J. D. (2016). Enhancing the security features of automated teller machines (ATMs): A Ghanaian perspective. International Journal of Applied Science and Technology, 6(1), 102- 111.
[3]. Hiremath, V., Jalihal, N., Gavade, N., & Hannurkar, N. (2020). Enhanced security for ATMs using digital image processing. International Research Journal of Engineering and Technology, 7(8), 958- 963.
[5]. Mishra, S., Jain, A., Kumar, S., & Goyal, A. (2017). Enhanced ATM security system using GSM, GPS and biometrics. International Journal of Engineering and Technical Research, 7(8), 33-37.
[6]. More, A. S., Kamble, S. A., Bharambe, P. K., Satpute, K. V., & Gajbhare, P. N. (2023). Enhancement in ATM machine facility using face recognition security and OTP with shuffle keyboard. International Journal for Research in Applied Science and Engineering Technology, 11(5).
[7].
Murugesan, M., Santhosh, M., Sasiwarman, M., Kumar, T. S., & Valanarasu, I. (2020). Securing ATM transactions using face recognition. International Journal of Advances in Engineering and Emerging Technology, 11(2), 52-59.
[8]. Oko, S., & Oruh, J. (2012). Enhanced ATM security system using biometrics. International Journal of Computer Science (IJCSI), 9(5), 352-357.
[9].
Patil, H., Wankhede, S., Raut, M., Chimote, E., Thakare, H., Tote, J., & Kundal, A. (2024). IoT-based collision detection system. International Research Journal on Advanced Engineering and Management (IRJAEM), 2(2), 20-26.
[10].
Patil, H., Wankhede, S., Thakur, S., Pathak, S., Tiwaskar, P., Tembhurne, S., & Sheikh, A. (2023). Object detection models from classical methods to the latest deep learning-based approaches. Mukt Shabd Journal, 8(8), 1182-1187.
[11].
Peter, K. J., Glory, G. G. S., Arguman, S., Nagarajan, G., Devi, V. S., & Kannan, K. S. (2011, April). Improving ATM security via face recognition. In 2011 3rd International Conference on Electronics Computer Technology, 6, 373-376. IEEE.
[14]. Vaidya, C., Khobragade, P., & Golghate, A. (2016). Data leakage detection and security in cloud computing. GRD Journals Global Research Development Journal for Engineering, 1(12), 137-140.
[15]. Vaidya, C., Nampalliwar, A., Nampalliwar, K., Thakkar, R., & Bhagat, S. (2018). Statistical approach for load distribution in decentralized cloud computing. Helix, 8(5), 3884-3887.
[16].
Vaidya, C., Takalkar, K., Ghosekar, A., Nimgade, S., & Ghode, V. (2023, February). Decentralized file sharing. In 2023 IEEE International Students' Conference on Electrical, Electronics and Computer Science (SCEECS) (pp. 1-6). IEEE.