SlideShare a Scribd company logo
International Journal of Power Electronics and Drive System (IJPEDS)
Vol. 10, No. 4, December 2019, pp. 2126~2129
ISSN: 2088-8694, DOI: 10.11591/ijpeds.v10.i4.pp2126-2129  2126
Journal homepage: http://iaescore.com/journals/index.php/IJPEDS
Design and implementation a security system for bank using
voice recognition
Mohammed Hasan Ali, Qasim Al Azze
Department of Electrical Power and Machines, Collage of Engineering, University of Diyala, Iraq
Article Info ABSTRACT
Article history:
Received Nov 21, 2018
Revised Mar 1, 2019
Accepted Apr 25, 2019
AIn this work, a new security system design is demonstrated based on the
sound signal for bank protection. Voice Acknowledgment Module is placed
on the gate of the safe. Voice Acknowledgment Module is set to perceive the
capable client as indicated by his sound recurrence reaction. The plan could
program to permit tow clients for greater adaptability the card location
strategy is executed utilizing individual data information to permit another
client in the framework. A delicate camera is accustomed to observing the
developments in the structure and for the reasons for wellbeing and security.
All these sensors are controlled by arduino.
Keywords:
Arduino
Bluetooth system
Security system
Sensitive camera
Smart bank
Voice recognition
Copyright © 2019 Institute of Advanced Engineering and Science.
All rights reserved.
Corresponding Author:
Mohammed Hasan Ali,
Departement of Electrical power and Machins Engineering,
Collage of Engineering, University of Diyala,
Baqubah, Diyala, Iraq.
Email: moh80ammed@gmail.com
1. INTRODUCTION
In this work at the present age, wellbeing has turns into an essential issue for the majority of the
general population for amost part in the provincial and urban territories [1]. A few people are worry about
their wellbeing for their costly thing like adornments cash and so on. So, bank locker is the most secure place
to amass them however the customary security framework isn't giving the higher security in light of the fact
that in traditional security framework a client can open the lockers utilizing keys [2, 3]. At that point the
client will apply for unique keys yet the day and age are longer to get started new keys so in its place of
utilizing this security framework I have executed. In this present age, wellbeing has turns into a vital issue for
GSM based security framework which give greater security then traditional framework [4]. The paper is
present an actualized security of cash in the bank saving, resident or working environment (treasury) by
utilizing sound sensor and GSM innovation, that is more ensured than different frameworks. In this paper,
single sound sensor module is utilized for check on or to approve people to open the different bank locker
with GSM innovation. In this paper I have planned and executed a bank locker security framework in view of
sound sensor and GSM innovation. In this framework just valid individual can be recouped cash from
building lockers with secret word insurance strategy [5]. I outlined delicate camera used to checking the
developments in the building and for the reasons for wellbeing and security; which is sending a flag to
control the electric power in the building and if there should be an occurrence of caution fire [6, 7].
2. MODEL OF BANK
The model of bank has been portrayed as the joining of advancement and organization through a
bank system for a predominant individual fulfilment appeared in Figure 1. It has been using impelled PC and
Int J Pow Elec & Dri Syst ISSN: 2088-8694 
Design and implementation a security system for bank using voice recognition … (Mohammed Hasan Ali)
2127
framework correspondences development, fused wiring advancement normally solidified with all
subsystems, Entryway Bolt structure Utilizing sound sensor development [8]. Bank has been around for quite
a while and things have been open for a broad number of years, be that as it may, nobody's strategy has
turned out to be through to the standard yet. The astute bank uses the control structures and information
advancements to diminish the prerequisite for human work in the age of stock and undertakings. A sagacious
bank consolidates distinctive sub-systems that are out and out controlled by a pro bank controller [9, 10].
Figure 1. Model of bank
3. VOICE ACKNOWLEDGMENT MODULE
Voice Recognition is a biometric innovation which is utilized to perceive a specific individual voice.
The discourse waves of specific voice structure the premise of distinguishing proof of speaker [11] shown in
Figure 2. We can utilize voice ID in numerous application territories such as phone banking, shopping
through phone, access to database data and voice message [12]. One of the ground-breaking uses of voice
acknowledgment is for security reason where an individual can enter his/her voice for verification. Each kind
of voice has its exceptional qualities called highlight and the way toward removing these highlights from the
individual voice is called highlight extraction. The voice highlights which are removed are contrasted and
right now spared voices in the database for coordinating [13, 14].
Figure 2. Voice recognition
4. RESULTS
In the private part, it has successfully controlled the dual control process with bank, lighting and
other Smartphones using mobile represented applications that have been designed for this purpose where the
control and operation/shutting off the device itself is either by a connection using Bluetooth. It is controlled
by application Bluetooth or by means of a local or internal Wi-Fi connection, or by global IP.
It is controlled by the IoT application. Where the same device is turned off or operated from any
application either by employing wifi or Bluetooth. shown in Figure 3.
 ISSN: 2088-8694
Int J Pow Elec & Dri Syst Vol. 10, No. 4, Dec 2019 : 2126 – 2129
2128
Voice Acknowledgment Module is a board that control and response according to talking
acknowledgment as shown in Figure 4. This module is a speaker-subordinate voice acknowledgment. On the
whole, the module is supported up to 80 voice charges. In meantime, a max of seven voice summonses could
be worked. Any sound can prepare as summon. Where, clients firstly have to prepare the module, after that
module can receive any voice order.
The modular is controlled from two way; general information pins (some portion of capacity) and
serial port (full capacity). On modular board, general yield sticks can produce limited sorts of waves, whereas
relating voice summon was perceived as appeared in Figure 5.
Figure 3. Bluetooth and wifi module
Figure 4. Code of voice recognition added Figure 5. Code of voice recognition operation
5. CONCLUSION
It can be reasoned that IOT Based Security System and Intelligent that Design and usage security
framework for bank utilizing sound sensor was a win. The plan of sharp control contains Arduino sheets,
sound sensor, a Bluetooth Module, touchy camera, Android application For the Bluetooth technique and
application. Moreover, the System of sound sensor Security and Access Control System includes an Arduino
board, RFID module, Servo Motor, Red LED, Blue LED and a Buzzer. Likewise, the delicate camera
includes an Arduino Uno, Ultrasonic sensor, Bluetooth module, Relay module and Android Smart phone
Smart Lighting structure involves PIR sensor and a Relay. It is anything but difficult to utilize and temperate.
Int J Pow Elec & Dri Syst ISSN: 2088-8694 
Design and implementation a security system for bank using voice recognition … (Mohammed Hasan Ali)
2129
6. FUTURE RECOMMENDATIONS
Future work recommendations may be including, the possibility of using Raspberry to develop
work. Attempt to develop the security system with using advance cameras which to connect the internet
which is sent by SMS to the security center. Possibility of adding new sensors to increase protection.
REFERENCES
[1] Hsien-Tang Lin, "Implementing Smart Homes with Open Source Solutions," International Journal of Smart Home,
vol. 7, no. 4, pp 289-295, 2013.
[2] Gowthami, Dr. Adiline macriga, "Smart Home Monitoring and Con trolling System Using Android Phone,"
International Journal of Emerg-ing Technology and Advanced Engineering, vol. 3, no. 11, 2013.
[3] Ali, Mohammed Hasan, "Design and Implementation of an Electrical Lift Controlled using PLC," International
Journal of Electrical and Computer Engineering (IJECE), vol. 8, no. 4, p. 1947, 2018.
[4] A. Z. Alkar and U. Buhur, "An internet-based wireless home automation system for multifunctional devices," IEEE
Transactions on Consumer Electronics, vol. 51, pp. 1169-1174, 2005.
[5] R. Shahriyar, E. Hoque, S. Sohan, I. Naim, M. M. Akbar, and M. K. Khan, "Remote controlling of home appliances
using mobile telephony," International Journal of Smart Home, vol. 2, pp. 37-54, 2008.
[6] Sagar S. Palsodkar, Prof S.B Patil, "Biometric and GSM Based Security for lockers," International Journal of
Engineering Research and Application, vol. 4, 2014.
[7] Christian Reinisch, Mario J. Kofler, Wolfgang Kastner, "ThinkHome: A Smart Home as Digital Ecosystem," 4th
IEEE International Confe-rence on Digital Ecosystems and Technologies (IEEE DEST 2010), 2010.
[8] Ali, Mohammed H., "Mathematical Driving Model of Three Phase, Two Level Inverter by (Method of
Interconnected Subsystem)," Iraqi Journal for Electrical and Electronic Engineering, vol.13, no.1, pp. 73-82, 2017.
[9] R. Piyare and M. Tazil, "Bluetooth based home automation system using cell phone," in Consumer Electronics
(ISCE), 2011 IEEE 15th International Symposium, pp. 192-195, 2011.
[10] A. Aditya Shankar, P.R.K. Sastry, A.L. Vishnu ram.A. Vamsidhar, "Fingerprint Based Door Locking System,"
International Journal of Engineering and Computer Sciences, vol. 4, no. 3, 2015.
[11] M. Gayathri, P. Selvakumari, R. Brindha, "Fingerprint and GSM based Security System," International Journal of
Engineering Sciences Research Technology, vol. 3(4), 2014.
[12] Benyahia, Ismahane, Mohammed Beladgham, and Abdesselam Bassou, "Evaluation of the Medical Image
Compression using Wavelet Packet Transform and SPIHT Coding," International Journal of Electrical and
Computer Engineering (IJECE), vol. 8, no. 4, p. 2139, 2018.
[13] Bhuyan, Sujit Kumar, Prakash Kumar Hota, and Bhagabat Panda, "Modeling, Control and Power Management
Strategy of a Grid connected Hybrid Energy System," International Journal of Electrical and Computer
Engineering (IJECE), vol. 8, no. 3, p. 1345, 2018.
[14] Mengistu, Abrham Debasu, "The Effects of Segmentation Techniques in Digital Image Based Identification of
Ethiopian Coffee Variety," TELKOMNIKA (Telecommunication, Computing, Electronics and Control), vol. 16,
no. 2, pp. 713-717, 2018.
BIBLIOGRAPHY OF AUTHORS
Mohammed Hasan Ali was born in Diyala, Iraq, in 1980, received his B.Sc. from University
Diyala / Iraq in 2006, M. Sc. from University of Belgorod, Russia ,2013 .He is currently assistant
lecturer at the Department of Electrical Power Engineering, College of Engineering, University
of Diyala Iraq. Professional Strength and Skills: His current research interests are power system
modeling, power quality, renewable energy and power electronics. He has 10 years experience in
practice of Electrical engineering. He is teaching several basic subjects of the Electrical
Engineering, University of Diyala Iraq. He has 4 published papers.
Master Degree of Electrical Engineering from Southern Illinois University Edwardsville (SIUE)
from United States of America, in 2014, in area of Electrical Power and Control Machines
Engineering. Bachelor Degree of Electrical Power and Machines Engineering from University of
Diyala, College of Engineering, Iraq, in 2005.
 Currently, instructing Electrical Machines and Drives Course in Dep. of Electrical Power
and Machines, As well Electrical Engineering course in Mechanical Engineering
Department. Previously, Instructing some courses and graduated projects in Dep. of
Electrical Power and Machines
 Skills; Using Text Maker, MatLab, MS Offices, programing some type of Microcontroller
in order to build power electronic deriver like converter two directions.
 Area of Interesting; Power System, Power Electronics, Automatic Control, Electrical
Machines and Drives, Renewable Energy, Smart Grid, and HVDC, Hybrid Vehicles and
Electric Vehicles.

More Related Content

PDF
IRJET - Android based Secure and Smart Home Application using IoT
PDF
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...
PDF
IRJET- Design and Implementation of Smart Home Security System based on IoT
PDF
IoT based facial recognition door access control home security system using r...
PDF
Design and implement a smart system to detect intruders and firing using IoT
PDF
Integrated smart door system in apartment room based on internet
PDF
IRJET - Home Appliance Controlling and Monitoring by Mobile Application based...
PDF
Development of wireless and intelligent home automation system
IRJET - Android based Secure and Smart Home Application using IoT
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...
IRJET- Design and Implementation of Smart Home Security System based on IoT
IoT based facial recognition door access control home security system using r...
Design and implement a smart system to detect intruders and firing using IoT
Integrated smart door system in apartment room based on internet
IRJET - Home Appliance Controlling and Monitoring by Mobile Application based...
Development of wireless and intelligent home automation system

What's hot (20)

PDF
IRJET- Smart Door Security System using Raspberry Pi with Telegram
PDF
Controlling Home Appliances by using Universal Remote Control System (IoT and...
PDF
IRJET-Smart Home Automation System using Mobile Application
PDF
IRJET - Cyber Security Threats and Vulnerabilities in IoT
PDF
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
PDF
IRJET- Home Automation using IoT: Review
PDF
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...
PDF
IRJET- Identification of Location of Laptop Devices using Raspberry Pi Mo...
PDF
A Smart Switch to Connect and Disconnect Electrical Devices at Home by using ...
PDF
IRJET- IoT based Smart Voting System
PDF
Security Protocols for USB Mass Storage Devices
PDF
DEDA: An algorithm for early detection of topology attacks in the internet of...
PDF
IRJET - A Study on Smart Way for Securing IoT Devices
PDF
Growing internet of things solution in industries and mobile
PDF
IRJET- IoT based Home Automation and Smart Security System
PDF
Secure Dual-mode Robotic Intrusion Detection System for Remote Surveillance
PDF
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
PDF
Sniffer Technology Complete Report
PDF
KAFA: A novel interoperability open framework to utilize Indonesian electroni...
PDF
Security Application for Smart Phones and other Mobile Devices
IRJET- Smart Door Security System using Raspberry Pi with Telegram
Controlling Home Appliances by using Universal Remote Control System (IoT and...
IRJET-Smart Home Automation System using Mobile Application
IRJET - Cyber Security Threats and Vulnerabilities in IoT
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Home Automation using IoT: Review
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...
IRJET- Identification of Location of Laptop Devices using Raspberry Pi Mo...
A Smart Switch to Connect and Disconnect Electrical Devices at Home by using ...
IRJET- IoT based Smart Voting System
Security Protocols for USB Mass Storage Devices
DEDA: An algorithm for early detection of topology attacks in the internet of...
IRJET - A Study on Smart Way for Securing IoT Devices
Growing internet of things solution in industries and mobile
IRJET- IoT based Home Automation and Smart Security System
Secure Dual-mode Robotic Intrusion Detection System for Remote Surveillance
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
Sniffer Technology Complete Report
KAFA: A novel interoperability open framework to utilize Indonesian electroni...
Security Application for Smart Phones and other Mobile Devices
Ad

Similar to Design and implementation a security system for bank using voice recognition (20)

PDF
Implementation of vision based intelligent home security system using ARM7
PDF
Automatic Control of Instruments Using Efficient Speech Recognition Algorithm
PDF
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
DOC
Thesis - Voice Control Home Automation
PDF
IRJET- Theft Control using IoT
PDF
2013 eee & ece embedded project titles
PDF
Raspberry Pi Based Surveillance Robot for Home Security
PDF
Voice Assistance Based Remote Surveillance System
PDF
EMBEDDED BASED REMOTE ACCESS AND CONTROL SYSTEM THROUGH 3G COMMUNICATION
PDF
IRJET- RFID Based Security Guard System using GSM
PDF
IRJET- RFID Based Security Guard System using GSM
PDF
Security based home surveillance system using android application
PDF
IRJET- Low Cost Personal Digital Assistant with IoT and WSN Capabilities
PDF
Voice Controlled Home Automation System
PDF
IRJET - IoT based Advanced Home Automation
PPTX
Zeroth_Review[1].pptx venkatesh yugander
PDF
IRJET - Smart Doorbell System
PDF
Iot based low cost smart locker security system
PDF
IRJET- High Security System for Money Carrying VAN to ATM’S
DOCX
Smart door project report shivnaresh likhar
Implementation of vision based intelligent home security system using ARM7
Automatic Control of Instruments Using Efficient Speech Recognition Algorithm
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
Thesis - Voice Control Home Automation
IRJET- Theft Control using IoT
2013 eee & ece embedded project titles
Raspberry Pi Based Surveillance Robot for Home Security
Voice Assistance Based Remote Surveillance System
EMBEDDED BASED REMOTE ACCESS AND CONTROL SYSTEM THROUGH 3G COMMUNICATION
IRJET- RFID Based Security Guard System using GSM
IRJET- RFID Based Security Guard System using GSM
Security based home surveillance system using android application
IRJET- Low Cost Personal Digital Assistant with IoT and WSN Capabilities
Voice Controlled Home Automation System
IRJET - IoT based Advanced Home Automation
Zeroth_Review[1].pptx venkatesh yugander
IRJET - Smart Doorbell System
Iot based low cost smart locker security system
IRJET- High Security System for Money Carrying VAN to ATM’S
Smart door project report shivnaresh likhar
Ad

More from International Journal of Power Electronics and Drive Systems (20)

PDF
Adaptive backstepping controller design based on neural network for PMSM spee...
PDF
Classification and direction discrimination of faults in transmission lines u...
PDF
Integration of artificial neural networks for multi-source energy management ...
PDF
Rotating blade faults classification of a rotor-disk-blade system using artif...
PDF
Artificial bee colony algorithm applied to optimal power flow solution incorp...
PDF
Soft computing and IoT based solar tracker
PDF
Comparison of roughness index for Kitka and Koznica wind farms
PDF
Primary frequency control of large-scale PV-connected multi-machine power sys...
PDF
Performance of solar modules integrated with reflector
PDF
Generator and grid side converter control for wind energy conversion system
PDF
Wind speed modeling based on measurement data to predict future wind speed wi...
PDF
Comparison of PV panels MPPT techniques applied to solar water pumping system
PDF
Prospect of renewable energy resources in Bangladesh
PDF
A novel optimization of the particle swarm based maximum power point tracking...
PDF
Voltage stability enhancement for large scale squirrel cage induction generat...
PDF
Electrical and environmental parameters of the performance of polymer solar c...
PDF
Short and open circuit faults study in the PV system inverter
PDF
A modified bridge-type nonsuperconducting fault current limiter for distribut...
PDF
The new approach minimizes harmonics in a single-phase three-level NPC 400 Hz...
PDF
Comparison of electronic load using linear regulator and boost converter
Adaptive backstepping controller design based on neural network for PMSM spee...
Classification and direction discrimination of faults in transmission lines u...
Integration of artificial neural networks for multi-source energy management ...
Rotating blade faults classification of a rotor-disk-blade system using artif...
Artificial bee colony algorithm applied to optimal power flow solution incorp...
Soft computing and IoT based solar tracker
Comparison of roughness index for Kitka and Koznica wind farms
Primary frequency control of large-scale PV-connected multi-machine power sys...
Performance of solar modules integrated with reflector
Generator and grid side converter control for wind energy conversion system
Wind speed modeling based on measurement data to predict future wind speed wi...
Comparison of PV panels MPPT techniques applied to solar water pumping system
Prospect of renewable energy resources in Bangladesh
A novel optimization of the particle swarm based maximum power point tracking...
Voltage stability enhancement for large scale squirrel cage induction generat...
Electrical and environmental parameters of the performance of polymer solar c...
Short and open circuit faults study in the PV system inverter
A modified bridge-type nonsuperconducting fault current limiter for distribut...
The new approach minimizes harmonics in a single-phase three-level NPC 400 Hz...
Comparison of electronic load using linear regulator and boost converter

Recently uploaded (20)

PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PDF
Digital Logic Computer Design lecture notes
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
Lecture Notes Electrical Wiring System Components
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
bas. eng. economics group 4 presentation 1.pptx
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
Construction Project Organization Group 2.pptx
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
Digital Logic Computer Design lecture notes
UNIT 4 Total Quality Management .pptx
Lecture Notes Electrical Wiring System Components
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Model Code of Practice - Construction Work - 21102022 .pdf
bas. eng. economics group 4 presentation 1.pptx
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Automation-in-Manufacturing-Chapter-Introduction.pdf
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Construction Project Organization Group 2.pptx
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk

Design and implementation a security system for bank using voice recognition

  • 1. International Journal of Power Electronics and Drive System (IJPEDS) Vol. 10, No. 4, December 2019, pp. 2126~2129 ISSN: 2088-8694, DOI: 10.11591/ijpeds.v10.i4.pp2126-2129  2126 Journal homepage: http://iaescore.com/journals/index.php/IJPEDS Design and implementation a security system for bank using voice recognition Mohammed Hasan Ali, Qasim Al Azze Department of Electrical Power and Machines, Collage of Engineering, University of Diyala, Iraq Article Info ABSTRACT Article history: Received Nov 21, 2018 Revised Mar 1, 2019 Accepted Apr 25, 2019 AIn this work, a new security system design is demonstrated based on the sound signal for bank protection. Voice Acknowledgment Module is placed on the gate of the safe. Voice Acknowledgment Module is set to perceive the capable client as indicated by his sound recurrence reaction. The plan could program to permit tow clients for greater adaptability the card location strategy is executed utilizing individual data information to permit another client in the framework. A delicate camera is accustomed to observing the developments in the structure and for the reasons for wellbeing and security. All these sensors are controlled by arduino. Keywords: Arduino Bluetooth system Security system Sensitive camera Smart bank Voice recognition Copyright © 2019 Institute of Advanced Engineering and Science. All rights reserved. Corresponding Author: Mohammed Hasan Ali, Departement of Electrical power and Machins Engineering, Collage of Engineering, University of Diyala, Baqubah, Diyala, Iraq. Email: moh80ammed@gmail.com 1. INTRODUCTION In this work at the present age, wellbeing has turns into an essential issue for the majority of the general population for amost part in the provincial and urban territories [1]. A few people are worry about their wellbeing for their costly thing like adornments cash and so on. So, bank locker is the most secure place to amass them however the customary security framework isn't giving the higher security in light of the fact that in traditional security framework a client can open the lockers utilizing keys [2, 3]. At that point the client will apply for unique keys yet the day and age are longer to get started new keys so in its place of utilizing this security framework I have executed. In this present age, wellbeing has turns into a vital issue for GSM based security framework which give greater security then traditional framework [4]. The paper is present an actualized security of cash in the bank saving, resident or working environment (treasury) by utilizing sound sensor and GSM innovation, that is more ensured than different frameworks. In this paper, single sound sensor module is utilized for check on or to approve people to open the different bank locker with GSM innovation. In this paper I have planned and executed a bank locker security framework in view of sound sensor and GSM innovation. In this framework just valid individual can be recouped cash from building lockers with secret word insurance strategy [5]. I outlined delicate camera used to checking the developments in the building and for the reasons for wellbeing and security; which is sending a flag to control the electric power in the building and if there should be an occurrence of caution fire [6, 7]. 2. MODEL OF BANK The model of bank has been portrayed as the joining of advancement and organization through a bank system for a predominant individual fulfilment appeared in Figure 1. It has been using impelled PC and
  • 2. Int J Pow Elec & Dri Syst ISSN: 2088-8694  Design and implementation a security system for bank using voice recognition … (Mohammed Hasan Ali) 2127 framework correspondences development, fused wiring advancement normally solidified with all subsystems, Entryway Bolt structure Utilizing sound sensor development [8]. Bank has been around for quite a while and things have been open for a broad number of years, be that as it may, nobody's strategy has turned out to be through to the standard yet. The astute bank uses the control structures and information advancements to diminish the prerequisite for human work in the age of stock and undertakings. A sagacious bank consolidates distinctive sub-systems that are out and out controlled by a pro bank controller [9, 10]. Figure 1. Model of bank 3. VOICE ACKNOWLEDGMENT MODULE Voice Recognition is a biometric innovation which is utilized to perceive a specific individual voice. The discourse waves of specific voice structure the premise of distinguishing proof of speaker [11] shown in Figure 2. We can utilize voice ID in numerous application territories such as phone banking, shopping through phone, access to database data and voice message [12]. One of the ground-breaking uses of voice acknowledgment is for security reason where an individual can enter his/her voice for verification. Each kind of voice has its exceptional qualities called highlight and the way toward removing these highlights from the individual voice is called highlight extraction. The voice highlights which are removed are contrasted and right now spared voices in the database for coordinating [13, 14]. Figure 2. Voice recognition 4. RESULTS In the private part, it has successfully controlled the dual control process with bank, lighting and other Smartphones using mobile represented applications that have been designed for this purpose where the control and operation/shutting off the device itself is either by a connection using Bluetooth. It is controlled by application Bluetooth or by means of a local or internal Wi-Fi connection, or by global IP. It is controlled by the IoT application. Where the same device is turned off or operated from any application either by employing wifi or Bluetooth. shown in Figure 3.
  • 3.  ISSN: 2088-8694 Int J Pow Elec & Dri Syst Vol. 10, No. 4, Dec 2019 : 2126 – 2129 2128 Voice Acknowledgment Module is a board that control and response according to talking acknowledgment as shown in Figure 4. This module is a speaker-subordinate voice acknowledgment. On the whole, the module is supported up to 80 voice charges. In meantime, a max of seven voice summonses could be worked. Any sound can prepare as summon. Where, clients firstly have to prepare the module, after that module can receive any voice order. The modular is controlled from two way; general information pins (some portion of capacity) and serial port (full capacity). On modular board, general yield sticks can produce limited sorts of waves, whereas relating voice summon was perceived as appeared in Figure 5. Figure 3. Bluetooth and wifi module Figure 4. Code of voice recognition added Figure 5. Code of voice recognition operation 5. CONCLUSION It can be reasoned that IOT Based Security System and Intelligent that Design and usage security framework for bank utilizing sound sensor was a win. The plan of sharp control contains Arduino sheets, sound sensor, a Bluetooth Module, touchy camera, Android application For the Bluetooth technique and application. Moreover, the System of sound sensor Security and Access Control System includes an Arduino board, RFID module, Servo Motor, Red LED, Blue LED and a Buzzer. Likewise, the delicate camera includes an Arduino Uno, Ultrasonic sensor, Bluetooth module, Relay module and Android Smart phone Smart Lighting structure involves PIR sensor and a Relay. It is anything but difficult to utilize and temperate.
  • 4. Int J Pow Elec & Dri Syst ISSN: 2088-8694  Design and implementation a security system for bank using voice recognition … (Mohammed Hasan Ali) 2129 6. FUTURE RECOMMENDATIONS Future work recommendations may be including, the possibility of using Raspberry to develop work. Attempt to develop the security system with using advance cameras which to connect the internet which is sent by SMS to the security center. Possibility of adding new sensors to increase protection. REFERENCES [1] Hsien-Tang Lin, "Implementing Smart Homes with Open Source Solutions," International Journal of Smart Home, vol. 7, no. 4, pp 289-295, 2013. [2] Gowthami, Dr. Adiline macriga, "Smart Home Monitoring and Con trolling System Using Android Phone," International Journal of Emerg-ing Technology and Advanced Engineering, vol. 3, no. 11, 2013. [3] Ali, Mohammed Hasan, "Design and Implementation of an Electrical Lift Controlled using PLC," International Journal of Electrical and Computer Engineering (IJECE), vol. 8, no. 4, p. 1947, 2018. [4] A. Z. Alkar and U. Buhur, "An internet-based wireless home automation system for multifunctional devices," IEEE Transactions on Consumer Electronics, vol. 51, pp. 1169-1174, 2005. [5] R. Shahriyar, E. Hoque, S. Sohan, I. Naim, M. M. Akbar, and M. K. Khan, "Remote controlling of home appliances using mobile telephony," International Journal of Smart Home, vol. 2, pp. 37-54, 2008. [6] Sagar S. Palsodkar, Prof S.B Patil, "Biometric and GSM Based Security for lockers," International Journal of Engineering Research and Application, vol. 4, 2014. [7] Christian Reinisch, Mario J. Kofler, Wolfgang Kastner, "ThinkHome: A Smart Home as Digital Ecosystem," 4th IEEE International Confe-rence on Digital Ecosystems and Technologies (IEEE DEST 2010), 2010. [8] Ali, Mohammed H., "Mathematical Driving Model of Three Phase, Two Level Inverter by (Method of Interconnected Subsystem)," Iraqi Journal for Electrical and Electronic Engineering, vol.13, no.1, pp. 73-82, 2017. [9] R. Piyare and M. Tazil, "Bluetooth based home automation system using cell phone," in Consumer Electronics (ISCE), 2011 IEEE 15th International Symposium, pp. 192-195, 2011. [10] A. Aditya Shankar, P.R.K. Sastry, A.L. Vishnu ram.A. Vamsidhar, "Fingerprint Based Door Locking System," International Journal of Engineering and Computer Sciences, vol. 4, no. 3, 2015. [11] M. Gayathri, P. Selvakumari, R. Brindha, "Fingerprint and GSM based Security System," International Journal of Engineering Sciences Research Technology, vol. 3(4), 2014. [12] Benyahia, Ismahane, Mohammed Beladgham, and Abdesselam Bassou, "Evaluation of the Medical Image Compression using Wavelet Packet Transform and SPIHT Coding," International Journal of Electrical and Computer Engineering (IJECE), vol. 8, no. 4, p. 2139, 2018. [13] Bhuyan, Sujit Kumar, Prakash Kumar Hota, and Bhagabat Panda, "Modeling, Control and Power Management Strategy of a Grid connected Hybrid Energy System," International Journal of Electrical and Computer Engineering (IJECE), vol. 8, no. 3, p. 1345, 2018. [14] Mengistu, Abrham Debasu, "The Effects of Segmentation Techniques in Digital Image Based Identification of Ethiopian Coffee Variety," TELKOMNIKA (Telecommunication, Computing, Electronics and Control), vol. 16, no. 2, pp. 713-717, 2018. BIBLIOGRAPHY OF AUTHORS Mohammed Hasan Ali was born in Diyala, Iraq, in 1980, received his B.Sc. from University Diyala / Iraq in 2006, M. Sc. from University of Belgorod, Russia ,2013 .He is currently assistant lecturer at the Department of Electrical Power Engineering, College of Engineering, University of Diyala Iraq. Professional Strength and Skills: His current research interests are power system modeling, power quality, renewable energy and power electronics. He has 10 years experience in practice of Electrical engineering. He is teaching several basic subjects of the Electrical Engineering, University of Diyala Iraq. He has 4 published papers. Master Degree of Electrical Engineering from Southern Illinois University Edwardsville (SIUE) from United States of America, in 2014, in area of Electrical Power and Control Machines Engineering. Bachelor Degree of Electrical Power and Machines Engineering from University of Diyala, College of Engineering, Iraq, in 2005.  Currently, instructing Electrical Machines and Drives Course in Dep. of Electrical Power and Machines, As well Electrical Engineering course in Mechanical Engineering Department. Previously, Instructing some courses and graduated projects in Dep. of Electrical Power and Machines  Skills; Using Text Maker, MatLab, MS Offices, programing some type of Microcontroller in order to build power electronic deriver like converter two directions.  Area of Interesting; Power System, Power Electronics, Automatic Control, Electrical Machines and Drives, Renewable Energy, Smart Grid, and HVDC, Hybrid Vehicles and Electric Vehicles.