Abstract
This project solves the problems of hacking bank vaults. Through a programmed security system integrated with weight sensors, and through specific programming, this system operates the alarm system or not. It measures the weight of the safe every second and checks whether the value of the weight taken matches the stored value. As for entering the safe, there are 3 stages that the user goes through to be able to enter the door of the safe. When the user wants to log in, there are several requirements for entry that must be completed and matched for the user to be able to log in, which are: pressing the activation button for the system to prepare to receive the user’s information, after which the user enters his password, and the system matches it and if it matches the system asks the user to enter his fingerprint and when it matches the door is opened. From activating the user information reception system to opening the door. A magnetic lock will be used in this safe that works on a voltage of 12 V and consists of two pieces to ensure more protection for the safe.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Monk, S.: Programming Arduino: Getting Started with Sketches, 2nd edn. McGraw Hill TAB (2016)
Bill, P.: The Complete Book of Locks and Locksmithing, 4th edn. McGraw Hill Inc. (1995)
Random Nerd Tutorials Homepage. https://randomnerdtutorials.com/esp32-relay-module-ac-web-server. Last accessed 21 Nov 2022
Arduino Homepage. https://www.arduino.cc/reference/en/. Last accessed 5 Dec 2022
Tutorialspoint Homepage. https://www.tutorialspoint.com/arduino/index.htm. Last accessed 12 Dec 2022
Java T point Homepage. https://www.javatpoint.com/arduino-coding-basics. Last accessed 27 Nov 2022
Microcontrollerslab Homepage. https://microcontrollerslab.com/. Last accessed 29 Nov 2022
Nassar, Y.F., Alsadi, S.Y.: Assessment of solar energy potential in Gaza Strip-Palestine. Sustain. Energy Technol. Assess. 31, 318–328 (2019)
Foqha, T., Alsadi, S., Refaat, S.S., Abdulmawjood, K.: Experimental validation of a mitigation method of Ferranti effect in transmission line. IEEE Access 11, 15878–15895 (2023)
Nassar, Y.F., Alsadi, S.Y., Miskeen, G.M., El-Khozondar, H.J., Abuhamoud,N.M.: Mapping of PV solar module technologies across Libyan Territory. In: 2022 Iraqi International Conference on Communication and Information Technologies (IICCIT), pp. 227–232 (2022)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Al-Fandi, A. et al. (2024). Security System for Bank Cash Safe. In: Khoury, R.E., Nasrallah, N. (eds) Intelligent Systems, Business, and Innovation Research. Studies in Systems, Decision and Control, vol 489. Springer, Cham. https://doi.org/10.1007/978-3-031-36895-0_57
Download citation
DOI: https://doi.org/10.1007/978-3-031-36895-0_57
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-36894-3
Online ISBN: 978-3-031-36895-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)