SlideShare a Scribd company logo
1 of 6
Download to read offline
International Journal of Research in Advent Technology, Vol.7, No.6, June 2019
E-ISSN: 2321-9637
Available online at www.ijrat.org
129
doi: 10.32622/ijrat.76201975

Abstract - As per the review of WHO,
NCRB-social-government organization 35 percent
Women all over the world are facing a lot of
unscrupulous physical provocation in public places
such as crowd places, foot paths etc. This device for the
women security in community places which aims to
provide the 100 percent safe atmosphere. This system
can be implemented as an android app application and
using Raspberry Pi based board. This system provides
all required functionality and there is no need to buy
and install different apps that possess different
functionality. It is now becoming a necessity for
females to ensure safety while travelling at late hours
and visiting distant and remote locations as a part of
their work management.
Keywords - Attack, Parent, Police, Server, Women
Safety.
I. INTRODUCTION
In hottest years, acts of attack and cruelty against
women are rising at a threatening rate. It is now
becoming a necessity for females to ensure their safety
while travelling at late hours and visiting distant and
isolated spot as a part of their daily life. According to
the NCRB, in India, 93 women were raped every day in
the year 2014. Also 3, 37,922 cases of crime against
women were reported in year 2014 alone [1].These
crimes are creating an atmosphere of anxiety and
unrest among the women population. With the
stringent and tiresome law procedures, it becomes even
more difficult for those willing to take legal actions
against their offenders. These factors are leading to
exponential increase in attack, cruelty against women
in the past rare years, and posing a threat to the growth
and development of women. Hence, a security solution
that creates a sense of security among women needs to
be devise.
The current practices in women security broadly
fall into different categories from android applications
developed for mobile phones, to smart apparels that
Manuscript revised June 10, 2019 and published on July 10,
2019
Pushpalata N Sali, Electronics and Tele-communication, Savitribai
Phule Pune University Sir Visvesvaraya Institute of Technology,
Chincholi, Nashik, India.
Dr. KTV Reddy, Electronics and Tele-communication, Savitribai
Phule Pune University Sir Visvesvaraya Institute of Technology,
Chincholi, Nashik, India
can be wore and carried in day to day life. Each of
these has their own pros and cons. However, our focus
is on creating a safety system that merges the benefits
of existing techniques and brings about a solution that
ensures defense and creates a seamless pathway to
initiating legal procedures, if any; have to be taken by
the victim. We intend to create a partial wearable that
can provide a complete security solution and become a
utility that eases the apprehension among women and
their family members.
A. Objectives
The objective of the research work is to create a
safety system that precisely performs the following
tasks to ensure safety of a women if an adversary
attacks her. The device should:
i. Alert the police and family about the
location of the woman being attacked.
ii. Capture, stream and store real time
images/video and audio to a cloud server.
iii. Incorporate a defensive mechanism giving
a mild shock to the attacker.
B. Flow of Work
An emergency band would be worn by the person.
We will be developing a mobile application which will
help to send alerts in mobile of parents who are in
emergency situations. The web application which will
be developed is used to categorize the different users
like parent and police. Parents can login to the system
and view alerts by the relatives. Similarly, Police can
login to the system and also, that particular location
can be viewed on the map also and view daily alerts.
Emergency message can be viewed by the police and
appropriate action can be taken.
Security Communication System for Women Safety
Pushpalata N Sali, Dr. KTV Reddy
International Journal of Research in Advent Technology, Vol.7, No.6, June 2019
E-ISSN: 2321-9637
Available online at www.ijrat.org
130
doi: 10.32622/ijrat.76201975
Fig. 1. Flow of Work
II. LITERATURE REVIEW
A wide variety of devices, gadgets and applications
(apps) are available commercially that claim to satiate
the purpose of providing security to women. In a
review of the literature that has been studied for this
research work, standard publications, electronic apps
and gadgets already in existence will be presented. An
overview of standard papers associated to either a part,
or the entire research is also given in this chapter.
A. Review of Existing Devices for Women Safety
A very recent development, similar to the research
objective in this report is proposed in [2], in which the
authors have proposed the design of an armband using
ARM7.This armband can be wrapped around the arm
and can be triggered either in automatic or in manual
manner. Automatic triggering is done by using fall
detection sensors, which detect the falling motion if a
woman is attacked. Manual triggering is done using a
flex sensor situated on the hand which triggers the
system only when a certain type of gesture is
recognized. A switch is also incorporated for manual
activation. The processor used is LPC 2148 ARM7
processor.
In [3], authors propose a smart girl‟s security
method in the form of a belt that can be worn on the
body. This belt integrates GSM SIMCOM 900 and
GPS receiver to track the location of the victim being
attacked. It also proposes usage of a scream alarm
using APR 9600 to alert the people around. The core
controller used is Arduino board using ATMEGA 328
processor. Device is proposed to be activated by
pressure sensors worn on the body. The GPS module
that is being used is GY-GPS6MV2 patch-on-top unit.
A mechanism for sending location alerts via SMS until
the device is reset is developed.
The development of another safety device for
women called Suraksha is developed in [4]. The
working appliance of this device is almost on the same
lines as that of [3]. The distinguishing factor is that
Suraksha can be activated either manually by a switch
or using a voice recognition system that responds to a
pre-programmed voice only, or automatically by
triggering of a pressure sensor in incidents of attack.
Controller used in this device is AT 89s52.
In [5], the authors have created a client application
on Android platform called iMace. This smart phone
app is activated by vigorous shaking of the smart
phone. The accelerometer sensor of the smart phone
analyzes the acceleration on shaking the phone. If it is
beyond a certain threshold then, the image acquisition
is performed by activation of camera module in the
phone. The localization module uses the GPS system
in the phone to acquire current location of the person.
Finally, the communication module uses WLAN 3G
service to transfer the image of the attacker on the web
server and notifies the whereabouts of the victim to the
police.
Apart from these, there are several commercially
launched mobile apps [6], such as the popular VithU,
M-indicator apps that enable location tracking by the
press of the pressed push button on our cell phones.
Similar apps like Nirbhaya, Safe Hands, Watch Over
Me function in a manner that lets their near ones and
the police, know their location and allows tracking of
the person. The „life 360 family locator‟ app allows the
parents to locate their ward through the day at several
instances.
In the world of wearables, „The CUFFs‟ are a recent
trend. These are a variety of stylish and fashionable
wrist bands that are GPS enabled and are associated
with an app that sends their near ones an alert on a
press of a switch, every time the women wearing it is in
danger. However, these are not launched globally yet.
Similar example is a Safe bet, which although
resembles the appearance of a bracelet, performs the
function of a tracker. There is yet another variety of
GPS enabled jewelry like necklaces, wrist and waist
bands and also earrings that pretty much satisfy the
same requirement [7].
B. Review of Location Tracking Techniques and GPS
In [8], the authors have designed a tracking system
for pets, elderly and the disabled. The functioning of
the system is such that whenever a person tries to cross
a certain boundary around the house, the tracking
function is set out and the location is sent to the
pre-programmed number. There is also the inclusion of
an emergency calling system on triggering a latch.
Successful tracking of humans was established.
Authors propose the use of this system for tracking
animals in zoo also. In [9], authors have designed a
simplistic system for acquiring and tracking location
International Journal of Research in Advent Technology, Vol.7, No.6, June 2019
E-ISSN: 2321-9637
Available online at www.ijrat.org
131
doi: 10.32622/ijrat.76201975
and have implemented the same. The simplistic
approach makes it low cost and flexible for various
applications. The system uses a PIC16F877A
microcontroller for integrating a Garmin 18-5 Hz GPS
receiver and a SIMCOM 300 GSM module. The paper
presents a neat software algorithm for parsing the GPS
NMEA sentences to extract the latitude and longitude.
The hardware circuit details are also included showing
interfacing of the Assisted GPS (A-GPS) with other
components. Authors have checked the accuracy of the
system using Google Maps and they deduce that the
accuracy of the system is 1 to 2.5 meters in range
which is better as compared to previous approaches.
In [10], a comparatively novel approach for location
tracking of vehicles is introduced where the core
controller is Arduino. This system uses two way
communications by making use of transceivers
modules at each stage, be it controllers or GSM shields.
Accuracy testing was done by using the vehicle radius
as a measure. With an increase in speed, the error was
found to increase too.
An energy saving technique for applications using
GPS is proposed in [12]. Here, the others first explain
the different phases of acquiring location using GPS
from a Satellite vehicle (SV). Authors have proven that
sending raw pseudo ranges has saved 80% of current
energy consumption. Authors also propose a Low
Earth Orbit (LEO) constellation for GPS data
assistance that requires only 6 satellites and is a much
quicker solution.
An Indoor Positioning system that makes use of
Visible Light Communication and Ultrasound is
proposed in [13] .The positioning depends on unique
global co-ordinates associated with each LED lamp.
The hardware includes Arduino Uno, Arduino Mega
and use of GSM shield along with an RF transmitter.
GPS receivers use a collection of satellites and
ground elements to calculate position and time almost
anywhere on earth. At any given time, there are at least
24 active satellites orbiting over 12,000 miles above
earth. There are at the least, 12 satellites visible at all
times as 12 visible satellites are used to TRANSMIT
information back to earth over radio frequency
(ranging from 1.1 to 1.5 GHz).Then, a ground based
RECEIVER or GPS module can calculate its position
and time. If the GPS receiver‟s antenna can see at least
4 satellites, it can accurately calculate its position and
time. This is also called a lock or a fix.
Triangulation geometry is fairly straightforward. If
distance is X in miles is known from point A it defines
the position on a sphere of radius X centered on A. If
distances are X and Y from two dispersed points are
known, it defines the position somewhere on the
imaginary circle at which the two spheres with radii X
and Y intersect. If distances from three dispersed
points are X, Y and Z, are known, it defines the
position as one of two points where the three spheres
intersect (one sphere intersects the circle representing
the intersection of the other two spheres).With 24
satellites in well-dispersed orbits, there are never fewer
than four satellites above the horizon anywhere on
earth, so a GPS receiver can always triangulate its
position to a unique X-Y-Z point in space. The GPS
satellites' orbits are precisely known, and they use
precisely-synchronized on-board atomic clocks to
broadcast exactly simultaneous signal patterns as well
as information about any minor deviations in orbit. The
triangulation procedure is shown in Figure 2.
Fig. 2. Triangulation process in GPS
C. Survey of Video Streaming Techniques
The Raspberry Pi is a mini-computer based on the
Broadcom BCM 2835 processor. Due to its powerful
processor, it has been used in many applications
involving capturing and streaming video usually to a
cloud. In [16], authors have proposed and implemented
an Internet of Things (IoT) approach to build a security
system. It includes triggering of an alarm remotely and
capturing and streaming images/videos to a cloud
server if any motion is detected on the IP cameras. The
open source „motion‟ algorithm has been used to detect
any change in consequent frames captured by the
camera and if such a change is detected then the image
is streamed to a server and can be viewed by the user
remotely.
D. Software Tools for Raspberry Pi Zero
The Raspberry Pi has its own command terminal and
its own Graphical User Interface (GUI) when
connected to HDMI screen directly. Here we are using
Raspberry Pi Zero which will attaching to the wearable
band. This raspberry pi zero module having camera
module which will record the video.
In addition to the wireless capabilities, the Pi Zero
W is almost identical to the previous iteration of the
appliance, which will still remain on sale at its original
price. On-board, the tiny computer has 512MB RAM,
a mini-HDMI port and two micro-USB ports,
including one for power. As with all Raspberry Pi‟s, a
power supply, keyboard, mouse or input appliance, and
screen must be provided to use the device. However,
its low cost and new-found connectivity means it is a
International Journal of Research in Advent Technology, Vol.7, No.6, June 2019
E-ISSN: 2321-9637
Available online at www.ijrat.org
132
doi: 10.32622/ijrat.76201975
perfect appliance for running Internet of Things
applications.
III. IMPLEMENTATION
In this review, emphasis will be given on explaining
the hardware and software arrangement of the project.
The choice of hardware was made considering the
nature of the appliance being a partial wearable.
Controllers and other supporting peripherals were
selected such that they would be lightweight, portable,
and at the same time possess the capacity of
performing heavy load functions like video streaming.
Certain hardware arrangements mentioned in the
literature have also been adapted as they satisfy the
requirement.
A. Hardware
The appliance can be activated by just merely pressing
the emergency button once. This appliance gets
activated and sends instant location with a distress
message to the police pre-set numbers through a GSM
module. The appliance looks like and when the
emergency button is double clicked, the device sends
both the distress message with instant location and
records the audio of the incident. When the same
button is long pressed it activated call to the police and
sends message to the police instant location. The
location is located using GPS. The audio is recorded
using audio recorder and call is made from GSM
modem respectively. This GSM Modem that is inbuilt
in the smartphone accept any GSM network operator
SIM card. It can be used to send and receive SMS or
make/receive voice calls. And also camera and mike
activated for live preview and sound recording, live
preview and recording send to the registered mobile
number along with police station. We connect the
appliance with our mobile (through WIFI), to find our
location even if our mobile is lost which can be
activated by clicking tracking your mobile button and
the location of the mobile is sent to the pre-set number.
Displayed equations are to be centered on the page
width. Standard English letters like x are to appear as x
(italicized) in the text if they are used as mathematical
symbols. Punctuation marks are used at the end of
equations as if they appeared directly in the text.
Fig. 3 Raspberry Pi Zero
B. Software
Design of any system may refer to either all the
activities involved in conceptualizing, implementing,
framing, commissioning, and ultimately modifying
complex method or the activity which following
requirements speciation and before programming, as a
stylized software engineering process.
Fig. 4 SQL Implementation Software
International Journal of Research in Advent Technology, Vol.7, No.6, June 2019
E-ISSN: 2321-9637
Available online at www.ijrat.org
133
doi: 10.32622/ijrat.76201975
Fig. 5 Screenshot of Mobile App
IV. RESULT AND DISCUSSION
The results obtained from individual components
and different sections.
In wearable section, the results relative to SMS files,
audio files, video files.
The particular parent whose phone number is
registered will receive an SMS displaying the location
from where the emergency need has come. The screen
shot is showed in Figure 6. In this figure, a sample
message is displayed.
Fig. 6 Screenshot of SMS
The screen shot of location is showed in Figure 7.
When the button is pressed, a details like location, mail
id, mobile number and will get the longitude and
latitude of the current location. It can automatically get
the longitude and latitude by pressing on get location
button.
Fig. 7 Screenshot of Location
Figure 8 shows the after pressing button call is
automatically generated to the registered parent.
Fig. 8 Screenshot of Audio Calling
Figure 9 shows the after pressing button call is
automatically capturing video and send to the
registered parent.
Fig. 9 Screenshot of Video
International Journal of Research in Advent Technology, Vol.7, No.6, June 2019
E-ISSN: 2321-9637
Available online at www.ijrat.org
134
doi: 10.32622/ijrat.76201975
V. CONCLUSION
The proposed design will deal with critical issues
like physical harassment, rape, attack etc. faced by
women in the near past and will help to solve them
with technologically sound equipment‟s and ideas.
It gives immediate alert like SMS, Video calling,
Audio calling to predefined number in case of any
crime which provide women safety.
VI. REFERENCES
[1] Toney, G.; Jabeen, F.; Puneeth, S., “Design and
Implementation of Safety Armband for Women and Children
using ARM7”, International Conference on Power and
Advanced Control Engineering (ICPACE), 2015, pp.
300-303.J. Clerk Maxwell, A Treatise on Electricity and
Magnetism, 3rd ed., vol. 2. Oxford: Clarendon, 1892,
pp.68-73.
[2] Prof. Basavaraj Chougula1, Archana Naik2, “SMART GIRLS
SECURITY SYSTEM”,International Journal of Application or
Innovation in Engineering & Management (IJAIEM) Volume
3, Issue 4, April 2014.
[3] Nishant Bhardwaj and Nitish Aggarwal, “Design and
Development of “Suraksha”-A Women Safety Device”
International Journal of Information & Computation
Technology, 2014Volume 4, Number 8.
[4] Jou-Chih Chang, Pi-Shih Wang, “iMace: Protecting Females
from Sexual and Violent Offenders in a Community via
Smartphones” Parallel Processing Workshops (ICPPW), 40th
International Conference, 2011.
[5] Punetha, D.; Mehta, V. “Protection of the child/ elderly/
disabled/ pet by smart and intelligent GSM and GPS based
automatic tracking and alert system” ,Advances in Computing,
Communications and Informatics (ICACCI, 2014 International
Conference on Year: 2014 pg2349 – 2354.
[6] Dafallah, H.A.A, “Design and implementation of an accurate
real time GPS tracking system.”, e-Technologies and Networks
for Development (ICeND), 2014 Third International
Conference on Year: 2014 pg 183 – 188.C. J. Kaufman, Rocky
Mountain Research Lab., Boulder, CO, private
communication, May 1995.
[7] http://www.parents.com/parenting/technology/best-apps-for-p
aranoid-parents.
[8] https://ncrb.gov.in/MAPS-2014/ALL-MAPS-2014.htm
[9] https://cuf.io./
[10] M.F. Saaid, M.A. Kamaludin, M.S.A. Megat Ali, “Vehicle
Location Find Using Global Position System and Global
System for Mobile” , 2014 IEEE 5th Control and System
Graduate Research Colloquium, Aug.11-12,pp.279-285.
[11] Pham Hoang Oat, Micheal Drieberg and Nguyen Chi Cuong,
“Development of Vehicle Tracking System using GPS and
GSM Modem”, 2013 IEEE Conference on Open Systems
(ICOS), December 2-4,2013,pp.89-95.
[12] Bharath Patil, Radhika Patil, Dr. Andre Pittet, “Energy Saving
Techniques For GPS Based Tracking Applications”, Integrated
Communications, Navigation and Surveilance Conference
(ICNS), 2011, pp.J8-17.
[13] Lih Chieh Png, Liangquan Chen, Song Liu, and Wei Kuan Peh,
“An Arduino-based Indoor Positioning System (IPS) using
Visible Light Communication and Ultrasound”,2014
ICCE-Taiwan, pp. 217-218.
[14] http://www.udel.edu/johnmack/frec480/gps_intro.htm
[15] www.garmin.com›AboutGPS
[16] Ansari ,Sedkyl, Sharma,Tyagil, “An Internet of Things
Approach for Motion Detection using Raspberry Pi”,
International Conference on Intelligent Computing and
Internet of Things (IC1T),2015, pp 131-134.
[17] Nguyen, Kim Loan, Mao and Eu Huh, “Low Cost Real-Time
System Monitoring Using Raspberry Pi”, International
Conference on Ubiquitous Fundamental Networking (ICUFN),
2015, pp 857-860.
[18] V Menezes, V Patchava, M.Gupta, “Surveillance and
Monitoring System Using Raspberry Pi and SimpleCV”,
International Conference on Green Computing and Internet
ofThings (ICGCIoT), 2015, pp 1276-1279.

More Related Content

What's hot

What's hot (20)

An Improved Personal Security System
An Improved Personal Security SystemAn Improved Personal Security System
An Improved Personal Security System
 
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoTIRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
 
IRJET- Smart Child Safety Monitoring System
IRJET-  	  Smart Child Safety Monitoring SystemIRJET-  	  Smart Child Safety Monitoring System
IRJET- Smart Child Safety Monitoring System
 
Application for Women Safety
Application for Women SafetyApplication for Women Safety
Application for Women Safety
 
Tracking And Security System for Women’s using GPS & GSM
Tracking And Security System for Women’s using GPS & GSMTracking And Security System for Women’s using GPS & GSM
Tracking And Security System for Women’s using GPS & GSM
 
An Intelligence Security System for Women
An Intelligence Security System for WomenAn Intelligence Security System for Women
An Intelligence Security System for Women
 
IRJET - Women’s Safety using IoT
IRJET - Women’s Safety using IoTIRJET - Women’s Safety using IoT
IRJET - Women’s Safety using IoT
 
Biometric Security Bags
Biometric Security BagsBiometric Security Bags
Biometric Security Bags
 
Biometric Security Bags
Biometric Security BagsBiometric Security Bags
Biometric Security Bags
 
Ej4301823826
Ej4301823826Ej4301823826
Ej4301823826
 
IRJET- Women Safety using IoT
IRJET- Women Safety using IoTIRJET- Women Safety using IoT
IRJET- Women Safety using IoT
 
IJSRED-V2I3P47
IJSRED-V2I3P47IJSRED-V2I3P47
IJSRED-V2I3P47
 
IRJET- Road Mishap (Accident Detector)
IRJET-  	  Road Mishap (Accident Detector)IRJET-  	  Road Mishap (Accident Detector)
IRJET- Road Mishap (Accident Detector)
 
abstract.docx
abstract.docxabstract.docx
abstract.docx
 
IRJET- Multifunctional Bag Monitoring System
IRJET- Multifunctional Bag Monitoring SystemIRJET- Multifunctional Bag Monitoring System
IRJET- Multifunctional Bag Monitoring System
 
SMART MOTORCYCLE HELMET: REAL-TIME CRASH DETECTION WITH EMERGENCY NOTIFICATIO...
SMART MOTORCYCLE HELMET: REAL-TIME CRASH DETECTION WITH EMERGENCY NOTIFICATIO...SMART MOTORCYCLE HELMET: REAL-TIME CRASH DETECTION WITH EMERGENCY NOTIFICATIO...
SMART MOTORCYCLE HELMET: REAL-TIME CRASH DETECTION WITH EMERGENCY NOTIFICATIO...
 
IRJET - Android App for Women Security
IRJET -  	  Android App for Women SecurityIRJET -  	  Android App for Women Security
IRJET - Android App for Women Security
 
A Smart Alarm System for Women’s Security
A Smart Alarm System for Women’s SecurityA Smart Alarm System for Women’s Security
A Smart Alarm System for Women’s Security
 
IRJET- Vehicle Security System using IoT Application
IRJET-  	  Vehicle Security System using IoT ApplicationIRJET-  	  Vehicle Security System using IoT Application
IRJET- Vehicle Security System using IoT Application
 
Artificial Intelligence for Audio control, safety in Automobile
Artificial Intelligence for Audio control, safety in AutomobileArtificial Intelligence for Audio control, safety in Automobile
Artificial Intelligence for Audio control, safety in Automobile
 

Similar to 76201975

Similar to 76201975 (20)

ELECTRONIC JACKET FOR WOMEN SAFETY
ELECTRONIC JACKET FOR WOMEN SAFETYELECTRONIC JACKET FOR WOMEN SAFETY
ELECTRONIC JACKET FOR WOMEN SAFETY
 
Batch-6.pptx
Batch-6.pptxBatch-6.pptx
Batch-6.pptx
 
87202003
8720200387202003
87202003
 
SMART SECURITY DEVICE FOR WOMEN USING IOT
SMART SECURITY DEVICE FOR WOMEN USING IOTSMART SECURITY DEVICE FOR WOMEN USING IOT
SMART SECURITY DEVICE FOR WOMEN USING IOT
 
Women Safety Application Android Project
Women Safety Application Android ProjectWomen Safety Application Android Project
Women Safety Application Android Project
 
A017340104
A017340104A017340104
A017340104
 
WOMEN’s SAFETY APP
WOMEN’s SAFETY APPWOMEN’s SAFETY APP
WOMEN’s SAFETY APP
 
Design and Development of Advanced Device for Women Safety
Design and Development of Advanced Device for Women SafetyDesign and Development of Advanced Device for Women Safety
Design and Development of Advanced Device for Women Safety
 
Published in the journal
Published in the journalPublished in the journal
Published in the journal
 
thomson reuters indexing journals
 thomson reuters indexing journals thomson reuters indexing journals
thomson reuters indexing journals
 
PHD research publications
PHD research publicationsPHD research publications
PHD research publications
 
PHD research publications
 PHD research publications PHD research publications
PHD research publications
 
IRJET- Smart Shield for Women Safety
IRJET-  	  Smart Shield for Women SafetyIRJET-  	  Smart Shield for Women Safety
IRJET- Smart Shield for Women Safety
 
IRJET - Women Safety Device with GPS Tracking and Alerts
IRJET -  	  Women Safety Device with GPS Tracking and AlertsIRJET -  	  Women Safety Device with GPS Tracking and Alerts
IRJET - Women Safety Device with GPS Tracking and Alerts
 
Implementation of Women Safety System using Internet of Things
Implementation of Women Safety System using Internet of ThingsImplementation of Women Safety System using Internet of Things
Implementation of Women Safety System using Internet of Things
 
Automated women safety device
Automated women safety deviceAutomated women safety device
Automated women safety device
 
IRJET- Child Safety Wearable Device using Wireless Technology
IRJET- Child Safety Wearable Device using Wireless TechnologyIRJET- Child Safety Wearable Device using Wireless Technology
IRJET- Child Safety Wearable Device using Wireless Technology
 
Swarma – A Women Safety Device
Swarma – A Women Safety DeviceSwarma – A Women Safety Device
Swarma – A Women Safety Device
 
Activity Tracker Wrist Band for Children Monitoring using IOT
Activity Tracker Wrist Band for Children Monitoring using IOTActivity Tracker Wrist Band for Children Monitoring using IOT
Activity Tracker Wrist Band for Children Monitoring using IOT
 
A women secure mobile app for emergency usage (go safe app)
A women secure mobile app for emergency usage (go safe app)A women secure mobile app for emergency usage (go safe app)
A women secure mobile app for emergency usage (go safe app)
 

More from IJRAT

More from IJRAT (20)

96202108
9620210896202108
96202108
 
97202107
9720210797202107
97202107
 
93202101
9320210193202101
93202101
 
92202102
9220210292202102
92202102
 
91202104
9120210491202104
91202104
 
87202001
8720200187202001
87202001
 
86202013
8620201386202013
86202013
 
86202008
8620200886202008
86202008
 
86202005
8620200586202005
86202005
 
86202004
8620200486202004
86202004
 
85202026
8520202685202026
85202026
 
711201940
711201940711201940
711201940
 
711201939
711201939711201939
711201939
 
711201935
711201935711201935
711201935
 
711201927
711201927711201927
711201927
 
711201905
711201905711201905
711201905
 
710201947
710201947710201947
710201947
 
712201907
712201907712201907
712201907
 
712201903
712201903712201903
712201903
 
711201903
711201903711201903
711201903
 

Recently uploaded

Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 

Recently uploaded (20)

Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic Marks
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Rums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfRums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdf
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 

76201975

  • 1. International Journal of Research in Advent Technology, Vol.7, No.6, June 2019 E-ISSN: 2321-9637 Available online at www.ijrat.org 129 doi: 10.32622/ijrat.76201975  Abstract - As per the review of WHO, NCRB-social-government organization 35 percent Women all over the world are facing a lot of unscrupulous physical provocation in public places such as crowd places, foot paths etc. This device for the women security in community places which aims to provide the 100 percent safe atmosphere. This system can be implemented as an android app application and using Raspberry Pi based board. This system provides all required functionality and there is no need to buy and install different apps that possess different functionality. It is now becoming a necessity for females to ensure safety while travelling at late hours and visiting distant and remote locations as a part of their work management. Keywords - Attack, Parent, Police, Server, Women Safety. I. INTRODUCTION In hottest years, acts of attack and cruelty against women are rising at a threatening rate. It is now becoming a necessity for females to ensure their safety while travelling at late hours and visiting distant and isolated spot as a part of their daily life. According to the NCRB, in India, 93 women were raped every day in the year 2014. Also 3, 37,922 cases of crime against women were reported in year 2014 alone [1].These crimes are creating an atmosphere of anxiety and unrest among the women population. With the stringent and tiresome law procedures, it becomes even more difficult for those willing to take legal actions against their offenders. These factors are leading to exponential increase in attack, cruelty against women in the past rare years, and posing a threat to the growth and development of women. Hence, a security solution that creates a sense of security among women needs to be devise. The current practices in women security broadly fall into different categories from android applications developed for mobile phones, to smart apparels that Manuscript revised June 10, 2019 and published on July 10, 2019 Pushpalata N Sali, Electronics and Tele-communication, Savitribai Phule Pune University Sir Visvesvaraya Institute of Technology, Chincholi, Nashik, India. Dr. KTV Reddy, Electronics and Tele-communication, Savitribai Phule Pune University Sir Visvesvaraya Institute of Technology, Chincholi, Nashik, India can be wore and carried in day to day life. Each of these has their own pros and cons. However, our focus is on creating a safety system that merges the benefits of existing techniques and brings about a solution that ensures defense and creates a seamless pathway to initiating legal procedures, if any; have to be taken by the victim. We intend to create a partial wearable that can provide a complete security solution and become a utility that eases the apprehension among women and their family members. A. Objectives The objective of the research work is to create a safety system that precisely performs the following tasks to ensure safety of a women if an adversary attacks her. The device should: i. Alert the police and family about the location of the woman being attacked. ii. Capture, stream and store real time images/video and audio to a cloud server. iii. Incorporate a defensive mechanism giving a mild shock to the attacker. B. Flow of Work An emergency band would be worn by the person. We will be developing a mobile application which will help to send alerts in mobile of parents who are in emergency situations. The web application which will be developed is used to categorize the different users like parent and police. Parents can login to the system and view alerts by the relatives. Similarly, Police can login to the system and also, that particular location can be viewed on the map also and view daily alerts. Emergency message can be viewed by the police and appropriate action can be taken. Security Communication System for Women Safety Pushpalata N Sali, Dr. KTV Reddy
  • 2. International Journal of Research in Advent Technology, Vol.7, No.6, June 2019 E-ISSN: 2321-9637 Available online at www.ijrat.org 130 doi: 10.32622/ijrat.76201975 Fig. 1. Flow of Work II. LITERATURE REVIEW A wide variety of devices, gadgets and applications (apps) are available commercially that claim to satiate the purpose of providing security to women. In a review of the literature that has been studied for this research work, standard publications, electronic apps and gadgets already in existence will be presented. An overview of standard papers associated to either a part, or the entire research is also given in this chapter. A. Review of Existing Devices for Women Safety A very recent development, similar to the research objective in this report is proposed in [2], in which the authors have proposed the design of an armband using ARM7.This armband can be wrapped around the arm and can be triggered either in automatic or in manual manner. Automatic triggering is done by using fall detection sensors, which detect the falling motion if a woman is attacked. Manual triggering is done using a flex sensor situated on the hand which triggers the system only when a certain type of gesture is recognized. A switch is also incorporated for manual activation. The processor used is LPC 2148 ARM7 processor. In [3], authors propose a smart girl‟s security method in the form of a belt that can be worn on the body. This belt integrates GSM SIMCOM 900 and GPS receiver to track the location of the victim being attacked. It also proposes usage of a scream alarm using APR 9600 to alert the people around. The core controller used is Arduino board using ATMEGA 328 processor. Device is proposed to be activated by pressure sensors worn on the body. The GPS module that is being used is GY-GPS6MV2 patch-on-top unit. A mechanism for sending location alerts via SMS until the device is reset is developed. The development of another safety device for women called Suraksha is developed in [4]. The working appliance of this device is almost on the same lines as that of [3]. The distinguishing factor is that Suraksha can be activated either manually by a switch or using a voice recognition system that responds to a pre-programmed voice only, or automatically by triggering of a pressure sensor in incidents of attack. Controller used in this device is AT 89s52. In [5], the authors have created a client application on Android platform called iMace. This smart phone app is activated by vigorous shaking of the smart phone. The accelerometer sensor of the smart phone analyzes the acceleration on shaking the phone. If it is beyond a certain threshold then, the image acquisition is performed by activation of camera module in the phone. The localization module uses the GPS system in the phone to acquire current location of the person. Finally, the communication module uses WLAN 3G service to transfer the image of the attacker on the web server and notifies the whereabouts of the victim to the police. Apart from these, there are several commercially launched mobile apps [6], such as the popular VithU, M-indicator apps that enable location tracking by the press of the pressed push button on our cell phones. Similar apps like Nirbhaya, Safe Hands, Watch Over Me function in a manner that lets their near ones and the police, know their location and allows tracking of the person. The „life 360 family locator‟ app allows the parents to locate their ward through the day at several instances. In the world of wearables, „The CUFFs‟ are a recent trend. These are a variety of stylish and fashionable wrist bands that are GPS enabled and are associated with an app that sends their near ones an alert on a press of a switch, every time the women wearing it is in danger. However, these are not launched globally yet. Similar example is a Safe bet, which although resembles the appearance of a bracelet, performs the function of a tracker. There is yet another variety of GPS enabled jewelry like necklaces, wrist and waist bands and also earrings that pretty much satisfy the same requirement [7]. B. Review of Location Tracking Techniques and GPS In [8], the authors have designed a tracking system for pets, elderly and the disabled. The functioning of the system is such that whenever a person tries to cross a certain boundary around the house, the tracking function is set out and the location is sent to the pre-programmed number. There is also the inclusion of an emergency calling system on triggering a latch. Successful tracking of humans was established. Authors propose the use of this system for tracking animals in zoo also. In [9], authors have designed a simplistic system for acquiring and tracking location
  • 3. International Journal of Research in Advent Technology, Vol.7, No.6, June 2019 E-ISSN: 2321-9637 Available online at www.ijrat.org 131 doi: 10.32622/ijrat.76201975 and have implemented the same. The simplistic approach makes it low cost and flexible for various applications. The system uses a PIC16F877A microcontroller for integrating a Garmin 18-5 Hz GPS receiver and a SIMCOM 300 GSM module. The paper presents a neat software algorithm for parsing the GPS NMEA sentences to extract the latitude and longitude. The hardware circuit details are also included showing interfacing of the Assisted GPS (A-GPS) with other components. Authors have checked the accuracy of the system using Google Maps and they deduce that the accuracy of the system is 1 to 2.5 meters in range which is better as compared to previous approaches. In [10], a comparatively novel approach for location tracking of vehicles is introduced where the core controller is Arduino. This system uses two way communications by making use of transceivers modules at each stage, be it controllers or GSM shields. Accuracy testing was done by using the vehicle radius as a measure. With an increase in speed, the error was found to increase too. An energy saving technique for applications using GPS is proposed in [12]. Here, the others first explain the different phases of acquiring location using GPS from a Satellite vehicle (SV). Authors have proven that sending raw pseudo ranges has saved 80% of current energy consumption. Authors also propose a Low Earth Orbit (LEO) constellation for GPS data assistance that requires only 6 satellites and is a much quicker solution. An Indoor Positioning system that makes use of Visible Light Communication and Ultrasound is proposed in [13] .The positioning depends on unique global co-ordinates associated with each LED lamp. The hardware includes Arduino Uno, Arduino Mega and use of GSM shield along with an RF transmitter. GPS receivers use a collection of satellites and ground elements to calculate position and time almost anywhere on earth. At any given time, there are at least 24 active satellites orbiting over 12,000 miles above earth. There are at the least, 12 satellites visible at all times as 12 visible satellites are used to TRANSMIT information back to earth over radio frequency (ranging from 1.1 to 1.5 GHz).Then, a ground based RECEIVER or GPS module can calculate its position and time. If the GPS receiver‟s antenna can see at least 4 satellites, it can accurately calculate its position and time. This is also called a lock or a fix. Triangulation geometry is fairly straightforward. If distance is X in miles is known from point A it defines the position on a sphere of radius X centered on A. If distances are X and Y from two dispersed points are known, it defines the position somewhere on the imaginary circle at which the two spheres with radii X and Y intersect. If distances from three dispersed points are X, Y and Z, are known, it defines the position as one of two points where the three spheres intersect (one sphere intersects the circle representing the intersection of the other two spheres).With 24 satellites in well-dispersed orbits, there are never fewer than four satellites above the horizon anywhere on earth, so a GPS receiver can always triangulate its position to a unique X-Y-Z point in space. The GPS satellites' orbits are precisely known, and they use precisely-synchronized on-board atomic clocks to broadcast exactly simultaneous signal patterns as well as information about any minor deviations in orbit. The triangulation procedure is shown in Figure 2. Fig. 2. Triangulation process in GPS C. Survey of Video Streaming Techniques The Raspberry Pi is a mini-computer based on the Broadcom BCM 2835 processor. Due to its powerful processor, it has been used in many applications involving capturing and streaming video usually to a cloud. In [16], authors have proposed and implemented an Internet of Things (IoT) approach to build a security system. It includes triggering of an alarm remotely and capturing and streaming images/videos to a cloud server if any motion is detected on the IP cameras. The open source „motion‟ algorithm has been used to detect any change in consequent frames captured by the camera and if such a change is detected then the image is streamed to a server and can be viewed by the user remotely. D. Software Tools for Raspberry Pi Zero The Raspberry Pi has its own command terminal and its own Graphical User Interface (GUI) when connected to HDMI screen directly. Here we are using Raspberry Pi Zero which will attaching to the wearable band. This raspberry pi zero module having camera module which will record the video. In addition to the wireless capabilities, the Pi Zero W is almost identical to the previous iteration of the appliance, which will still remain on sale at its original price. On-board, the tiny computer has 512MB RAM, a mini-HDMI port and two micro-USB ports, including one for power. As with all Raspberry Pi‟s, a power supply, keyboard, mouse or input appliance, and screen must be provided to use the device. However, its low cost and new-found connectivity means it is a
  • 4. International Journal of Research in Advent Technology, Vol.7, No.6, June 2019 E-ISSN: 2321-9637 Available online at www.ijrat.org 132 doi: 10.32622/ijrat.76201975 perfect appliance for running Internet of Things applications. III. IMPLEMENTATION In this review, emphasis will be given on explaining the hardware and software arrangement of the project. The choice of hardware was made considering the nature of the appliance being a partial wearable. Controllers and other supporting peripherals were selected such that they would be lightweight, portable, and at the same time possess the capacity of performing heavy load functions like video streaming. Certain hardware arrangements mentioned in the literature have also been adapted as they satisfy the requirement. A. Hardware The appliance can be activated by just merely pressing the emergency button once. This appliance gets activated and sends instant location with a distress message to the police pre-set numbers through a GSM module. The appliance looks like and when the emergency button is double clicked, the device sends both the distress message with instant location and records the audio of the incident. When the same button is long pressed it activated call to the police and sends message to the police instant location. The location is located using GPS. The audio is recorded using audio recorder and call is made from GSM modem respectively. This GSM Modem that is inbuilt in the smartphone accept any GSM network operator SIM card. It can be used to send and receive SMS or make/receive voice calls. And also camera and mike activated for live preview and sound recording, live preview and recording send to the registered mobile number along with police station. We connect the appliance with our mobile (through WIFI), to find our location even if our mobile is lost which can be activated by clicking tracking your mobile button and the location of the mobile is sent to the pre-set number. Displayed equations are to be centered on the page width. Standard English letters like x are to appear as x (italicized) in the text if they are used as mathematical symbols. Punctuation marks are used at the end of equations as if they appeared directly in the text. Fig. 3 Raspberry Pi Zero B. Software Design of any system may refer to either all the activities involved in conceptualizing, implementing, framing, commissioning, and ultimately modifying complex method or the activity which following requirements speciation and before programming, as a stylized software engineering process. Fig. 4 SQL Implementation Software
  • 5. International Journal of Research in Advent Technology, Vol.7, No.6, June 2019 E-ISSN: 2321-9637 Available online at www.ijrat.org 133 doi: 10.32622/ijrat.76201975 Fig. 5 Screenshot of Mobile App IV. RESULT AND DISCUSSION The results obtained from individual components and different sections. In wearable section, the results relative to SMS files, audio files, video files. The particular parent whose phone number is registered will receive an SMS displaying the location from where the emergency need has come. The screen shot is showed in Figure 6. In this figure, a sample message is displayed. Fig. 6 Screenshot of SMS The screen shot of location is showed in Figure 7. When the button is pressed, a details like location, mail id, mobile number and will get the longitude and latitude of the current location. It can automatically get the longitude and latitude by pressing on get location button. Fig. 7 Screenshot of Location Figure 8 shows the after pressing button call is automatically generated to the registered parent. Fig. 8 Screenshot of Audio Calling Figure 9 shows the after pressing button call is automatically capturing video and send to the registered parent. Fig. 9 Screenshot of Video
  • 6. International Journal of Research in Advent Technology, Vol.7, No.6, June 2019 E-ISSN: 2321-9637 Available online at www.ijrat.org 134 doi: 10.32622/ijrat.76201975 V. CONCLUSION The proposed design will deal with critical issues like physical harassment, rape, attack etc. faced by women in the near past and will help to solve them with technologically sound equipment‟s and ideas. It gives immediate alert like SMS, Video calling, Audio calling to predefined number in case of any crime which provide women safety. VI. REFERENCES [1] Toney, G.; Jabeen, F.; Puneeth, S., “Design and Implementation of Safety Armband for Women and Children using ARM7”, International Conference on Power and Advanced Control Engineering (ICPACE), 2015, pp. 300-303.J. Clerk Maxwell, A Treatise on Electricity and Magnetism, 3rd ed., vol. 2. Oxford: Clarendon, 1892, pp.68-73. [2] Prof. Basavaraj Chougula1, Archana Naik2, “SMART GIRLS SECURITY SYSTEM”,International Journal of Application or Innovation in Engineering & Management (IJAIEM) Volume 3, Issue 4, April 2014. [3] Nishant Bhardwaj and Nitish Aggarwal, “Design and Development of “Suraksha”-A Women Safety Device” International Journal of Information & Computation Technology, 2014Volume 4, Number 8. [4] Jou-Chih Chang, Pi-Shih Wang, “iMace: Protecting Females from Sexual and Violent Offenders in a Community via Smartphones” Parallel Processing Workshops (ICPPW), 40th International Conference, 2011. [5] Punetha, D.; Mehta, V. “Protection of the child/ elderly/ disabled/ pet by smart and intelligent GSM and GPS based automatic tracking and alert system” ,Advances in Computing, Communications and Informatics (ICACCI, 2014 International Conference on Year: 2014 pg2349 – 2354. [6] Dafallah, H.A.A, “Design and implementation of an accurate real time GPS tracking system.”, e-Technologies and Networks for Development (ICeND), 2014 Third International Conference on Year: 2014 pg 183 – 188.C. J. Kaufman, Rocky Mountain Research Lab., Boulder, CO, private communication, May 1995. [7] http://www.parents.com/parenting/technology/best-apps-for-p aranoid-parents. [8] https://ncrb.gov.in/MAPS-2014/ALL-MAPS-2014.htm [9] https://cuf.io./ [10] M.F. Saaid, M.A. Kamaludin, M.S.A. Megat Ali, “Vehicle Location Find Using Global Position System and Global System for Mobile” , 2014 IEEE 5th Control and System Graduate Research Colloquium, Aug.11-12,pp.279-285. [11] Pham Hoang Oat, Micheal Drieberg and Nguyen Chi Cuong, “Development of Vehicle Tracking System using GPS and GSM Modem”, 2013 IEEE Conference on Open Systems (ICOS), December 2-4,2013,pp.89-95. [12] Bharath Patil, Radhika Patil, Dr. Andre Pittet, “Energy Saving Techniques For GPS Based Tracking Applications”, Integrated Communications, Navigation and Surveilance Conference (ICNS), 2011, pp.J8-17. [13] Lih Chieh Png, Liangquan Chen, Song Liu, and Wei Kuan Peh, “An Arduino-based Indoor Positioning System (IPS) using Visible Light Communication and Ultrasound”,2014 ICCE-Taiwan, pp. 217-218. [14] http://www.udel.edu/johnmack/frec480/gps_intro.htm [15] www.garmin.com›AboutGPS [16] Ansari ,Sedkyl, Sharma,Tyagil, “An Internet of Things Approach for Motion Detection using Raspberry Pi”, International Conference on Intelligent Computing and Internet of Things (IC1T),2015, pp 131-134. [17] Nguyen, Kim Loan, Mao and Eu Huh, “Low Cost Real-Time System Monitoring Using Raspberry Pi”, International Conference on Ubiquitous Fundamental Networking (ICUFN), 2015, pp 857-860. [18] V Menezes, V Patchava, M.Gupta, “Surveillance and Monitoring System Using Raspberry Pi and SimpleCV”, International Conference on Green Computing and Internet ofThings (ICGCIoT), 2015, pp 1276-1279.