SlideShare a Scribd company logo
1 of 23
Slideshow presentation
on
“Hostel Girls’ Security System”
Contents
• Introduction
• Review of literature
• Problem definition
• Objectives
• Flow chart
• Architecture
• Hardware software requirement
• Advantages
• Future scope
• Conclusion
• Reference
Introduction
 It is a security system for hostel-girls. The technology used in the
system is based on the finger print, GPS modem.
 Whenever the girl wants to leave the hostel, she will enter her in-
time and she will have a mobile app with her.
 When the girl is in danger, she will press the key on the mobile and
message will be sent to the warden’s PC and parents and immediate
help will be provided to her.
Review of literature
 Automation of Attendance System using RFID, Biometrics, GSM
Modem with .Net Framework.
 Real time Security Management using RFID, Biometric and Smart
Messages.
 Hostel In Out Management and Monitoring System Using RFID,
Face and Thumb Recognition.
 Implementation of Student Safety System Using RFID.
Problem definition
 Currently, for leaving the hostel girls have to write their names and in
time out information in record book manually. But sometimes they
make proxy entries with the help of friends.
 Hostel warden is not able to keep record of girls who entered or left
the hostel.
 Existing system uses RFID card which may be misused if stolen.
Objectives
 Proxy entries will be avoided because everyone has different
fingerprint.
 The desktop application will help warden to maintain record of
girls who entered or left the hostel.
 We are going to use fingerprint detection hardware module.
start
Finger
scanne
d
Save time
and
destination
Alert
message to
girl
If late
Send message
to warden and
parents
stop
N
Y
Y
N
Before 10 min
Fig.1: Working of software
Flowchart
Fig.2: Working of mobile application
start
Button
pressed
Location send to
warden and parents
Action will be taken
stop
y
N
Architecture
Fig.3: Working of software
User
Registration
Thumb
scanner
Desktop
Input
Thumb
scanner
Database
Architecture
Fig.4: Working of Mobile Application
Click
button
Mobile
GPS
Warden
PC
Parents
mobile
User
Database
Registration
Hardware requirements
 Processor
Intel(R) core(TM) i3-4005 CPU @1.70GHz
 RAM 512MB
 Microcontroller 16F887
 Thumb module
 GlassFish server 4.1
 Net Beans 7.0.1
 Gateway Textlocal
 Android studio
Software requirements
Front-end
 Java-JSP
Back-end
 SQL Server
Advantages
 Reduce paper work.
 Easier for warden to keep daily record.
 Alert message will be sent to girl before in-time.
 Fingerprint authentication.
 Girls cannot make proxy entries.
Future scope
 Parents can get to know about her by using the mobile application.
 We can replace fingerprint module by face recognition on the gate.
Output
Fig1. Homepage
Fig2. Registration form
Fig3. Out-time entry
Fig4. In-time entry
Fig5. Homepage of Application
Fig6. Registration form
Conclusion
This system provides the security for the girls in the hostel. It uses
the GPS which enables efficient and easy way of security
monitoring in big organization. It provides an easy way of
monitoring security. Also alert messaging is an advantage of this
project.
References
[1] G. C. Harikiran, K. Menasinkai and S. Shiorl,” smart security solution for
women based on internet of things(IOT),” 2016 international conference on
electrical, electronic and optimization techniques(ICEEOT), chennai, 2016,
pp.3551-3554.
[2] C. Deenadayalan, M. Murali and L. R. Baanupriya ,” implementing
prototype model for school security system(SSC)using RFID,” computing
communication &networking technologies(ICCCNT),2012 third international
conference on ,coimbatore ,2012,pp.1-6
[3] Geetha Govindan, Suresh Kumar Balakrishnan, Rejith Lalitha
Ratheendran, Saji Koyippurathu Sivadasa, Real time Security Management
using RFID, Biometric and Smart Messages.
[4] www.tomsguide.com/us/fingerprint-scanners,news-17678.html
Thank you..

More Related Content

What's hot

Classification of embedded systems
Classification of embedded systemsClassification of embedded systems
Classification of embedded systemsVikas Dongre
 
Digital Notice Board
Digital Notice BoardDigital Notice Board
Digital Notice BoardRaaki Gadde
 
IOT BASED AIR POLLUTION MONITORING
IOT BASED AIR POLLUTION MONITORINGIOT BASED AIR POLLUTION MONITORING
IOT BASED AIR POLLUTION MONITORINGkantkamal2291
 
Embedded systems and their applications in our daily routine
Embedded systems and their applications in our daily routineEmbedded systems and their applications in our daily routine
Embedded systems and their applications in our daily routineAsad Qayyum Babar
 
IOT Based Smart Ambulance Monitoring System with Traffic Light Control
IOT Based Smart Ambulance Monitoring System with Traffic Light ControlIOT Based Smart Ambulance Monitoring System with Traffic Light Control
IOT Based Smart Ambulance Monitoring System with Traffic Light ControlIRJET Journal
 
Arduino-Workshop-4.pptx
Arduino-Workshop-4.pptxArduino-Workshop-4.pptx
Arduino-Workshop-4.pptxHebaEng
 
Chapter-2 Internet of Things.pptx
Chapter-2 Internet of Things.pptxChapter-2 Internet of Things.pptx
Chapter-2 Internet of Things.pptx40NehaPagariya
 
Interfacing the Raspberry Pi to the World
Interfacing the Raspberry Pi to the WorldInterfacing the Raspberry Pi to the World
Interfacing the Raspberry Pi to the WorldOmer Kilic
 
Java ring ppt
Java ring pptJava ring ppt
Java ring pptTbSk121
 
5G WIRELESS TECHNOLOGY.ppt
5G WIRELESS TECHNOLOGY.ppt5G WIRELESS TECHNOLOGY.ppt
5G WIRELESS TECHNOLOGY.pptR.Karthick
 
Trends in Embedded system Design
Trends in Embedded system DesignTrends in Embedded system Design
Trends in Embedded system DesignRaman Deep
 
Seminar report of ewt
Seminar report of ewtSeminar report of ewt
Seminar report of ewtRanol R C
 
VLSI subsystem design processes
VLSI  subsystem design processes VLSI  subsystem design processes
VLSI subsystem design processes Vishal kakade
 
Introduction to arduino
Introduction to arduinoIntroduction to arduino
Introduction to arduinoAhmed Sakr
 
Design challenges in embedded systems
Design challenges in embedded systemsDesign challenges in embedded systems
Design challenges in embedded systemsmahalakshmimalini
 
ESP32 IoT presentation @ dev.bg
ESP32 IoT presentation @ dev.bgESP32 IoT presentation @ dev.bg
ESP32 IoT presentation @ dev.bgMartin Harizanov
 

What's hot (20)

Classification of embedded systems
Classification of embedded systemsClassification of embedded systems
Classification of embedded systems
 
Digital Notice Board
Digital Notice BoardDigital Notice Board
Digital Notice Board
 
IOT BASED AIR POLLUTION MONITORING
IOT BASED AIR POLLUTION MONITORINGIOT BASED AIR POLLUTION MONITORING
IOT BASED AIR POLLUTION MONITORING
 
Embedded systems and their applications in our daily routine
Embedded systems and their applications in our daily routineEmbedded systems and their applications in our daily routine
Embedded systems and their applications in our daily routine
 
PPT ON Arduino
PPT ON Arduino PPT ON Arduino
PPT ON Arduino
 
IOT Based Smart Ambulance Monitoring System with Traffic Light Control
IOT Based Smart Ambulance Monitoring System with Traffic Light ControlIOT Based Smart Ambulance Monitoring System with Traffic Light Control
IOT Based Smart Ambulance Monitoring System with Traffic Light Control
 
Arduino-Workshop-4.pptx
Arduino-Workshop-4.pptxArduino-Workshop-4.pptx
Arduino-Workshop-4.pptx
 
Chapter-2 Internet of Things.pptx
Chapter-2 Internet of Things.pptxChapter-2 Internet of Things.pptx
Chapter-2 Internet of Things.pptx
 
Interfacing the Raspberry Pi to the World
Interfacing the Raspberry Pi to the WorldInterfacing the Raspberry Pi to the World
Interfacing the Raspberry Pi to the World
 
Clockless chips
Clockless chipsClockless chips
Clockless chips
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eye
 
Java ring ppt
Java ring pptJava ring ppt
Java ring ppt
 
5G WIRELESS TECHNOLOGY.ppt
5G WIRELESS TECHNOLOGY.ppt5G WIRELESS TECHNOLOGY.ppt
5G WIRELESS TECHNOLOGY.ppt
 
Trends in Embedded system Design
Trends in Embedded system DesignTrends in Embedded system Design
Trends in Embedded system Design
 
Seminar report of ewt
Seminar report of ewtSeminar report of ewt
Seminar report of ewt
 
VLSI subsystem design processes
VLSI  subsystem design processes VLSI  subsystem design processes
VLSI subsystem design processes
 
Introduction to arduino
Introduction to arduinoIntroduction to arduino
Introduction to arduino
 
Design challenges in embedded systems
Design challenges in embedded systemsDesign challenges in embedded systems
Design challenges in embedded systems
 
ESP32 IoT presentation @ dev.bg
ESP32 IoT presentation @ dev.bgESP32 IoT presentation @ dev.bg
ESP32 IoT presentation @ dev.bg
 
Abstract of raspberry pi
Abstract of raspberry piAbstract of raspberry pi
Abstract of raspberry pi
 

Similar to Hostel girls security ppt

Smart Door Monitoring and Locking system
Smart Door Monitoring and Locking systemSmart Door Monitoring and Locking system
Smart Door Monitoring and Locking systemIRJET Journal
 
Bank Locker System Using Fingerprint Authentication & Image Processing
Bank Locker System Using Fingerprint Authentication & Image ProcessingBank Locker System Using Fingerprint Authentication & Image Processing
Bank Locker System Using Fingerprint Authentication & Image ProcessingIRJET Journal
 
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)IRJET Journal
 
Introduction Many institutes like and universities always.pdf
Introduction Many institutes like and universities always.pdfIntroduction Many institutes like and universities always.pdf
Introduction Many institutes like and universities always.pdfbkbk37
 
EEEN10034 Electronics Project.docx
EEEN10034 Electronics Project.docxEEEN10034 Electronics Project.docx
EEEN10034 Electronics Project.docx4934bk
 
womansaftyapppresentation-211102173043.pdf
womansaftyapppresentation-211102173043.pdfwomansaftyapppresentation-211102173043.pdf
womansaftyapppresentation-211102173043.pdfshubhamkendre9
 
Palmvein authentication
Palmvein authenticationPalmvein authentication
Palmvein authenticationSufiyan Arab
 
Face Recognition based Smart Attendance System Using IoT
Face Recognition based Smart Attendance System Using IoTFace Recognition based Smart Attendance System Using IoT
Face Recognition based Smart Attendance System Using IoTIRJET Journal
 
IRJET- Deployment of Nanosat at Low Altitude for Atmospheric Parameter Analysis
IRJET- Deployment of Nanosat at Low Altitude for Atmospheric Parameter AnalysisIRJET- Deployment of Nanosat at Low Altitude for Atmospheric Parameter Analysis
IRJET- Deployment of Nanosat at Low Altitude for Atmospheric Parameter AnalysisIRJET Journal
 
IRJET- Smart Tracking System for School Buses for Ensuring Child Security...
IRJET-  	  Smart Tracking System for School Buses for Ensuring Child Security...IRJET-  	  Smart Tracking System for School Buses for Ensuring Child Security...
IRJET- Smart Tracking System for School Buses for Ensuring Child Security...IRJET Journal
 
A Survey on Security for Server Using Spontaneous Face Detection
A Survey on Security for Server Using Spontaneous Face DetectionA Survey on Security for Server Using Spontaneous Face Detection
A Survey on Security for Server Using Spontaneous Face DetectionIJERA Editor
 
RFID Based Smart Class Attendance System with Absentees using Face verification
RFID Based Smart Class Attendance System with Absentees using Face verificationRFID Based Smart Class Attendance System with Absentees using Face verification
RFID Based Smart Class Attendance System with Absentees using Face verificationAssociate Professor in VSB Coimbatore
 
IRJET - Smart Doorbell System
 IRJET - Smart Doorbell System IRJET - Smart Doorbell System
IRJET - Smart Doorbell SystemIRJET Journal
 
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoTIRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoTIRJET Journal
 
Smart Surveillance System through Computer Vision
Smart Surveillance System through Computer VisionSmart Surveillance System through Computer Vision
Smart Surveillance System through Computer VisionIRJET Journal
 
CREDIT CARD FRAUD DETECTION USING ARTIFICIAL NEURAL NETWORK (ANN) ALGORITHM
CREDIT CARD FRAUD DETECTION USING ARTIFICIAL NEURAL NETWORK (ANN) ALGORITHMCREDIT CARD FRAUD DETECTION USING ARTIFICIAL NEURAL NETWORK (ANN) ALGORITHM
CREDIT CARD FRAUD DETECTION USING ARTIFICIAL NEURAL NETWORK (ANN) ALGORITHMIRJET Journal
 
IRJET- Closed Loop Students Monitoring and Tracking System using Raspberr...
IRJET-  	  Closed Loop Students Monitoring and Tracking System using Raspberr...IRJET-  	  Closed Loop Students Monitoring and Tracking System using Raspberr...
IRJET- Closed Loop Students Monitoring and Tracking System using Raspberr...IRJET Journal
 
facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdfPoooi2
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPTSiddharth Modi
 

Similar to Hostel girls security ppt (20)

Smart Door Monitoring and Locking system
Smart Door Monitoring and Locking systemSmart Door Monitoring and Locking system
Smart Door Monitoring and Locking system
 
Bank Locker System Using Fingerprint Authentication & Image Processing
Bank Locker System Using Fingerprint Authentication & Image ProcessingBank Locker System Using Fingerprint Authentication & Image Processing
Bank Locker System Using Fingerprint Authentication & Image Processing
 
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
 
Introduction Many institutes like and universities always.pdf
Introduction Many institutes like and universities always.pdfIntroduction Many institutes like and universities always.pdf
Introduction Many institutes like and universities always.pdf
 
EEEN10034 Electronics Project.docx
EEEN10034 Electronics Project.docxEEEN10034 Electronics Project.docx
EEEN10034 Electronics Project.docx
 
womansaftyapppresentation-211102173043.pdf
womansaftyapppresentation-211102173043.pdfwomansaftyapppresentation-211102173043.pdf
womansaftyapppresentation-211102173043.pdf
 
Safety app for woman
Safety app for womanSafety app for woman
Safety app for woman
 
Palmvein authentication
Palmvein authenticationPalmvein authentication
Palmvein authentication
 
Face Recognition based Smart Attendance System Using IoT
Face Recognition based Smart Attendance System Using IoTFace Recognition based Smart Attendance System Using IoT
Face Recognition based Smart Attendance System Using IoT
 
IRJET- Deployment of Nanosat at Low Altitude for Atmospheric Parameter Analysis
IRJET- Deployment of Nanosat at Low Altitude for Atmospheric Parameter AnalysisIRJET- Deployment of Nanosat at Low Altitude for Atmospheric Parameter Analysis
IRJET- Deployment of Nanosat at Low Altitude for Atmospheric Parameter Analysis
 
IRJET- Smart Tracking System for School Buses for Ensuring Child Security...
IRJET-  	  Smart Tracking System for School Buses for Ensuring Child Security...IRJET-  	  Smart Tracking System for School Buses for Ensuring Child Security...
IRJET- Smart Tracking System for School Buses for Ensuring Child Security...
 
A Survey on Security for Server Using Spontaneous Face Detection
A Survey on Security for Server Using Spontaneous Face DetectionA Survey on Security for Server Using Spontaneous Face Detection
A Survey on Security for Server Using Spontaneous Face Detection
 
RFID Based Smart Class Attendance System with Absentees using Face verification
RFID Based Smart Class Attendance System with Absentees using Face verificationRFID Based Smart Class Attendance System with Absentees using Face verification
RFID Based Smart Class Attendance System with Absentees using Face verification
 
IRJET - Smart Doorbell System
 IRJET - Smart Doorbell System IRJET - Smart Doorbell System
IRJET - Smart Doorbell System
 
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoTIRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
 
Smart Surveillance System through Computer Vision
Smart Surveillance System through Computer VisionSmart Surveillance System through Computer Vision
Smart Surveillance System through Computer Vision
 
CREDIT CARD FRAUD DETECTION USING ARTIFICIAL NEURAL NETWORK (ANN) ALGORITHM
CREDIT CARD FRAUD DETECTION USING ARTIFICIAL NEURAL NETWORK (ANN) ALGORITHMCREDIT CARD FRAUD DETECTION USING ARTIFICIAL NEURAL NETWORK (ANN) ALGORITHM
CREDIT CARD FRAUD DETECTION USING ARTIFICIAL NEURAL NETWORK (ANN) ALGORITHM
 
IRJET- Closed Loop Students Monitoring and Tracking System using Raspberr...
IRJET-  	  Closed Loop Students Monitoring and Tracking System using Raspberr...IRJET-  	  Closed Loop Students Monitoring and Tracking System using Raspberr...
IRJET- Closed Loop Students Monitoring and Tracking System using Raspberr...
 
facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdf
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 

Recently uploaded

Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...Call girls in Ahmedabad High profile
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 

Recently uploaded (20)

Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 

Hostel girls security ppt

  • 2. Contents • Introduction • Review of literature • Problem definition • Objectives • Flow chart • Architecture • Hardware software requirement • Advantages • Future scope • Conclusion • Reference
  • 3. Introduction  It is a security system for hostel-girls. The technology used in the system is based on the finger print, GPS modem.  Whenever the girl wants to leave the hostel, she will enter her in- time and she will have a mobile app with her.  When the girl is in danger, she will press the key on the mobile and message will be sent to the warden’s PC and parents and immediate help will be provided to her.
  • 4. Review of literature  Automation of Attendance System using RFID, Biometrics, GSM Modem with .Net Framework.  Real time Security Management using RFID, Biometric and Smart Messages.  Hostel In Out Management and Monitoring System Using RFID, Face and Thumb Recognition.  Implementation of Student Safety System Using RFID.
  • 5. Problem definition  Currently, for leaving the hostel girls have to write their names and in time out information in record book manually. But sometimes they make proxy entries with the help of friends.  Hostel warden is not able to keep record of girls who entered or left the hostel.  Existing system uses RFID card which may be misused if stolen.
  • 6. Objectives  Proxy entries will be avoided because everyone has different fingerprint.  The desktop application will help warden to maintain record of girls who entered or left the hostel.  We are going to use fingerprint detection hardware module.
  • 7. start Finger scanne d Save time and destination Alert message to girl If late Send message to warden and parents stop N Y Y N Before 10 min Fig.1: Working of software Flowchart
  • 8. Fig.2: Working of mobile application start Button pressed Location send to warden and parents Action will be taken stop y N
  • 9. Architecture Fig.3: Working of software User Registration Thumb scanner Desktop Input Thumb scanner Database
  • 10. Architecture Fig.4: Working of Mobile Application Click button Mobile GPS Warden PC Parents mobile User Database Registration
  • 11. Hardware requirements  Processor Intel(R) core(TM) i3-4005 CPU @1.70GHz  RAM 512MB  Microcontroller 16F887  Thumb module  GlassFish server 4.1  Net Beans 7.0.1  Gateway Textlocal  Android studio Software requirements
  • 13. Advantages  Reduce paper work.  Easier for warden to keep daily record.  Alert message will be sent to girl before in-time.  Fingerprint authentication.  Girls cannot make proxy entries.
  • 14. Future scope  Parents can get to know about her by using the mobile application.  We can replace fingerprint module by face recognition on the gate.
  • 19. Fig5. Homepage of Application
  • 21. Conclusion This system provides the security for the girls in the hostel. It uses the GPS which enables efficient and easy way of security monitoring in big organization. It provides an easy way of monitoring security. Also alert messaging is an advantage of this project.
  • 22. References [1] G. C. Harikiran, K. Menasinkai and S. Shiorl,” smart security solution for women based on internet of things(IOT),” 2016 international conference on electrical, electronic and optimization techniques(ICEEOT), chennai, 2016, pp.3551-3554. [2] C. Deenadayalan, M. Murali and L. R. Baanupriya ,” implementing prototype model for school security system(SSC)using RFID,” computing communication &networking technologies(ICCCNT),2012 third international conference on ,coimbatore ,2012,pp.1-6 [3] Geetha Govindan, Suresh Kumar Balakrishnan, Rejith Lalitha Ratheendran, Saji Koyippurathu Sivadasa, Real time Security Management using RFID, Biometric and Smart Messages. [4] www.tomsguide.com/us/fingerprint-scanners,news-17678.html