Safety is an integral part of girls today when crime rates are rising. Therefore, this proposed system is "Hostel Girl Security. " which helps to ensure security. This proposed work highlights technological advances in the field of security. The concept of Hostle's bo
Girls Hostle security
Safety is an integral part of girls today when crime rates are rising. Therefore, this proposed system is "Hostel Girl Security.
" which helps to ensure security. This proposed work highlights technological advances in the field of
security. The concept of Hostle's boundary based security.
Whenever a girl wants to leave the hostel, she goes into her private life and carries a security module, which is a
mobile application. When the girl is at risk, she presses a button on the security module and her message is sent to the Warden cell phone. The message will also be sent to her parents' mobile phone number along with the girl's location. The technology used in the system is based on the boundary and GPS.
The main objective is very clear that is to design a security for girls.
1. Main Purpose is that when girls cross the boundary of Hostle's then automatically generated the message to girls parents. Message is your daughter or boy out of Hostle's boundary so university is now not response for any accident. Parents are responsible.
2. Use the GPS.
3. We easily track the location of girls every time
Do is steps in projects where theory design is turn into a system working and is giving reliability new users which it will work and
effectively. It involves careful planning
, investigating investigating current system and its constraints out of implementation,
design out of changes out of methods. In addition to of planning main tasks of preparing implementing are user education and training. Implementation begins with the preparation of
of the plan for implementation of the system. Discussion implementation involving devices and resources and Additional equipment must be purchased to implement the new system. In the network backup system, no additional resources are needed. Implementation is the last and most important stage.
Stage plus important of achievements success new system gives users confidence that the new system will work and will work. The system can only be deployed after thorough testing and if it is found to work in accordance with specification. The old system can take over if a defect is detected or is not capable. handle some types of transactions when using the new system

(95/500 Words)
EN
To increase limit upto 1000 wordsGo Pro!
Paraphrased Text
This system provides the security for the girls in the hostel. It uses the GPS which enables efficient and easy way of monitoring in big organization. It provides an easy way of monitoring security. Also alert message is an advantage of this project. We use fingerprint technology, hence no one can use the other name as the every human being has different design pattern on finger. Through this system, girls can automatically get permission to leave the hostel without wasting time, and guards will also receive all-day reports for all girls in the hostel.
In addition to a list of mandatory requirements for project with an IT component, the
following deliverables should be evaluated for inclusion in the Statement of Work (SOW) and if necessary, be further
clarified based on specific project requirements.
| Item Name | Type | No. of Units | Per Unit Cost (in Rs) | Total (in Rs) |
|---|---|---|---|---|
| Smart tools | Equipment | 5 | 5000 | 25000 |
| GPS | Miscellaneous | 1 | 8000 | 8000 |
| Total in (Rs) | 33000 |
.Keeping track of Consumption of electricity is one of the major issues, we do not monitor...
Virtual patient simulator(VPS) is a simulator conducted on the three-dimensional virtual m...
A brain-computer interface (BCI) is a new communication channel between the human brain an...
The summary of developing this new technology is to mechanize sewer inspections in or...
Millions of lives are lost every year as a result of inappropriate search and rescue missi...