Sunteți pe pagina 1din 3

Hostel Autonomous Management System

Mr. M. Maranco, M.E,

MARIVIGNESH. N, DEEPAN. S

DEPARTMENT OF COMPUTER SCIENCE


Abstract—The number of users for digitalized resources II. PURPOSE OF HOSTEL AUTONOMOUS
have increased drastically. Since it becomes more MANAGEMENT SYSTEM
popular, developers are trying to solve the real world  In an existing system, they are updating
problems in embedded systems and web based application informations of buying details manually in the
in an efficient way. The physical objects getting connected notebook.
 As they update information in the notebook,
and accessed digitally with the wired and wireless
there will be chances of losing the information in
infrastructure. The proposed function of this project
the future.
migrates from manual work to automation for modern  It means, the data of students who bought things
technology. It will be very easier for the student access in will be lost. This will create a big issue when it
hostel autonomous management system. RFID(Radio happens.
Frequency Identification) is unique identification for  To overcome the situation of loosing data and the
electronics communication in active and passive mode, manual work of store owner came up with this
student can be able to access it from their own mobile proposed system. It will reduce their time too.
device .This autonomous system could support time
optimization and we can control and monitor student III. DOMAINS AND METHODOLOGIES
performance well. A. EMBEDDED SYSTEMS

I. INTRODUCTION An embedded system is a controller


programmed and controlled by a real-time operating
The proposed system for Hostel Autonomous
system(RTOS) with a dedicated function within a larger
Management System is based on embedded systems and
mechanical or electrical system, often with real-time
web application. Students will be provided with RFID
computing constraints. It is embedded as part of a
card which will be used to identify them individually.
complete device often including hardware and mechanical
RFID card will have 12 digits number and it will be read
parts. Embedded systems control many devices in
by RFID Reader. After RFID reader reads the RFID Card,
common use today. Ninety-eight percent of all
the corresponding web page of the student will be
microprocessors are manufactured to serve as embedded
displayed on the screen. If the students buy anything in
system component.
the store then that will be updated in the database by the
time they buy it. Whenever students buy something in the
Examples of properties of typical embedded computers
store, the total amount in the account will be reduced
when compared with general-purpose counterparts are low
accordingly. Students can view their account balance and
power consumption, small size, rugged operating ranges,
the things they bought last month, even two months before
and low per-unit cost. This comes at the price of limited
details through web application at anytime. The admin
processing resources, which make them significantly more
(store owner) can be able to update their new products in
difficult to program and to interact with.
the application by log in to their account which will not be
permitted for access to students.

JOURNAL OF HOSTEL AUTONOMOUS MANAGEMENT SYSTEM, MARCH 2019


IV. IMPLEMENTATION F. MODULES IN WEB APPLICATION

The admins and Students would be provided


A. STUDENTS UNIQUE IDENTITYFICATION
with different modules to be used by them.

Students will be provided with RFID card which will be because The admin (store owner) can be able to

used to identify them individually. RFID card will have 12 update their new products in the application by

digits number and it will be read by RFID Reader. After log in to their account. they will only be provided

RFID reader reads the RFID Card, the corresponding web with these kind of modules. whereas the students

page of the student will be displayed on the screen. If the have to view their account balance and the things

students buy anything in the store then that will be they bought last month, even two months before

updated in the database by the time they buy it. Whenever details at anytime. so students will be provided

students buy something in the store, the total amount in with these kind of modules.

the their account will be reduced accordingly. G . ANALYZING PRODUCT DATASET

The store’s product datasets and in that


B. WEB APPLICATION: datasets, frequently bought things will be taken

This will be an user interface for all the students and the into the consideration for the analysis. Whenever

store owner(the admin).Students can view their account the students buy something in the store, the count

balance and the things they bought last month, even two of the corresponding product will be

months before details through web application at anytime. incremented. With that count, the percentage sale

The admin (store owner) can be able to update their new of particular product will be calculated .The

products in the application by log in to their account percentage will be shown in plot. If the

which will not be permitted for access to students. percentage sale is less, then store owner don’t
have to buy that particular product more than
C. CONNECTING WEB APPLICATION THROUGH certain count in the next month. This will reduce
COLLEGE LA N the total amount with which they buy something
to the store.
All the students and the admin will be provided with
V. CONCLUSION AND SCOPE FOR FUTURE
authentication to access the LAN. They are only able to
connect the application through this LAN Our proposed system will reduce the manual
work as well as store owner is able to update the buying
D. PURPOSE OF CONNECTING THROUGH LAN
details as soon as students buy it and students can be able
Purpose of connecting through LAN is, this
to view their transaction details anywhere at any time with
application must be used by the particular college
their web application. So the future work of this project
students. Others are not allowed here. Especially, the
will be, may be able to find the probability of a product
students who are all studying in other colleges should not
which will be bought by the students in the future. That’s
be allowed to use this application.
prediction of products will be sold out in the future by
E. SECURITY PROVIDED TO ACCESS using machine learning algorithms. So it’s more efficient
Each and every students are given with user name or way to run any business in this modern world.
roll no as login id and passwords so that they can only be References
able to connect their devices to the college LAN. If any
[1] Komal Satish Agarwal, Kranthi Drive “RFID Based
student wants to their login password, they are allowed to
Intelligent Bus Management and Monitoring System”.
do it.
International Journal of Engineering & Technology, ISSN: [12] Lim, T.S., S.C. Sim, and M.M. Mansor. RFID based
2278-0181, Vol.3 Issue 7, July-2014. attendance system. in Industrial Electronics &
[2] Mahyidin, M.F. Student Attendance Using RFID Applications, 2009. ISIEA 2009. IEEE Symposium on.
System. December 2012; Available from: 2009
http://umpir.ump.edu.my. [13] S. Shepard, “RFID Radio Frequency Identification”,
[3] Company, C. RFID based voting System. s.l.: MacGraw-Hill, 2005.
http://www.chiyu-t.com.tw/ 2011 [cited 2011 April 2011]. [14] Sato DCS & Labeling Worldwide, “The RFID
[4] Yahaya, C.K.H.C.K., et al., A framework on halal Guidebook (Revision 8)”, 2004.
product recognition system through smartphone [15] Qaiser, A. and S.A. Khan. Automation of Time and
authentication, in (2011) Lecture Notes in Electrical Attendance using RFID Systems. in Emerging
Engineering. 2011. p. 49-56. Technologies, 2006. ICET '06. International Conference
[5] Sulaiman, N.A. and M. Kassim. Developing a on. 2006.
customized software engineering testing for Shared
Banking Services (SBS) System. in 2011 IEEE
International Conference on System Engineering and
Technology, ICSET 2011. 2011. UiTM, Shah Alam,
Malaysia.
[6] Yahaya, C.K.H.C.K., M.N. Ismail, and M. Kassim. A
study on automated, speech and remote temperature
monitoring for modeling Web based temperature
monitoring system. in 2010 2nd International Conference
on Education Technology and Computer (ICETC). 2010.
Shanghai, China.
[7] Wahab, M.H.A., et al. Door locking system using
RFID. in Intelligent and Advanced Systems (ICIAS), 2010
International Conference on. 2010. 2012 IEEE Control
and System Graduate Res.
[8] Sulaiman, N.A. and M. Kassim. An approach using
RUP Test Discipline process for Shared Banking Services
(SBS) system. in (2010) 2nd International Conference on
Computer Research and Development, ICCRD 2010.
2010. Kuala Lumpur, Malaysia.
[9] X.S. Wu et al., "A New Method for Bar Code
Localization and Recognition," in Image and Signal
Processing. CISP '09. 2nd International Congress on , vol.,
no., 2009, pp. 1-6.
[10] HID Corporation, “Understanding Card Data
Formats”, Technology Basics White Paper, 2009.
[11] Kassim, M. and S. Yahya. A case study: Reliability of
smartcard applications and implementation in university
environment, Malaysia. in 2009 International
Semiconductor Device Research Symposium, ISDRS '09.
2009. USA.

S-ar putea să vă placă și