SlideShare a Scribd company logo
1 of 5
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_________________________________________________________________________________________
Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 386
I AM SECURE ANDROID APPLICATION
Amrutha Barge1
, Nikita Vitthal Belokar2
, Sonali Khodave3
, Pallavi Gosavi4
1
Department of Computer Science, Pimpri Chinchwad College of Engineering
2
Department of Computer Science, Pimpri Chinchwad College of Engineering
3
Department of Computer Science, Pimpri Chinchwad College of Engineering
4
Department of Computer Science, Pimpri Chinchwad College of Engineering
Abstract
The mobile device has been positioned to become the world’s leading solution for every problem. The problem can be any emergency
case like natural disaster, kidnapping etc. in which smart phones can be used to provide help. This article outlines use of mobile
technology through which we can ensure person’s safety. This application provides you and your family with a one-click automated
emergency communication system that contacts up to 3 family or friends. It will even send your location Because of it becomes easy
for you to locate and contact the closest Police Department, Ambulance Service, and Hospital. This mobile application can be useful
to optimize the workflow in emergency cases.
----------------------------------------------------------------------***--------------------------------------------------------------------
1. INTRODUCTION
The enormous trend of crimes is happening now days so there
is a need of such application which runs on smart phones. By
using this “I am secure app” the victims can report any
emergency cases as fast as it could enable to act effectively. In
this the client that is the user of android phone and the cops will
create the account for access of this application. After creating
this account the client will get the username and password. In
emergency the client with android phone will send the
emergency message to server including current position of the
victim. The server will in turn send this emergency message to
cops. Then this cops will take the respective action to the
emergency an d will give notification .We are also using the
GSM module it will be beneficial whenever the client is not
having internet connection .The GSM module will be having
one helpline number, and this module will be connected to
server .In emergency the client will send message to this GSM
module and via server it will send to cops.
2. PROBLEM STATEMENT
Development of this project is to ensure human safety in
emergency cases. We are developing mobile application that
provide client with one click automated emergency system that
contacts up to 3 registered numbers. It will even send clients’
location. In case of any emergency, client will use this
application which is already installed in clients’ mobile .With
one click; client will initiate the service by which the message
will be send to the server. In case internet is not available on
clients mobile the client himself will send the message to the
helpline number provided. This helpline number is of a GSM
device which will always be connected to the server. The server
will in turn read the message received by the device. Now the
server will send the information to the nearest police station
according to the report generated. Then the cops will take the
further action and provide notification on the account provided
by the server.
3. PURPOSE OF STUDY
i. In this modern era, human safety has been greatly
threatened due to various crimes, attacks and other
misfortunes taking place.
ii. Almost 90% of the people around the globe are aware
of the technology and use it in their daily life.
iii. Mobile phone is the only device which is carried and
useful during time of emergency.
iv. Keeping this point in mind, the idea of developing this
application has been emerged to provide human safety.
v. Informing about the emergency is as important as
reporting and taking action within certain amount of
time.
vi. Knowledge about the victim’s location in the report can
save time which can be used in taking further action.
vii. Using this technology we can prevent the severity of
any problem that can be caused by disaster or any
misfortune.
viii. Hence, this application can be proved to be useful in
reporting emergency along with the location.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_________________________________________________________________________________________
Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 387
4. METHODOLOGY
Fig.1 Research Methodology Diagram (a)
Fig.2 Research Methodology Diagram for dev developing the
android application (b)
We begin with the literature survey and the previous work done
in other research papers. This is the extension to the SOS
emergency messages. Then we started with data gathering by
analyzing previously implemented SOS emergency messages.
In designing phase the suitable architecture diagram and
modules were identified. We will be using mobile pull service.
First we need to review the previous works by doing literature
survey. Data is to be gathered by observing and collecting
information. Determine which service is to be used to build the
project. Plan for the design of the project staring with the user
interface Check the running of the project by testing it.
5. HOW IT WORKS
Fig.3 work flow on server side
The working of the android application on the client as well as
the server side is as follows:
1. If user is android client then
(a) First install the developed application.
(b) Follow the given registration steps:
i. Fill the personal information.
ii. Provide three contact numbers to which the message
will be sent in emergency.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_________________________________________________________________________________________
Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 388
2. Else If user is police/hospital
(a) Create an account on the web server which includes
registered user id and password.
3. When in emergency android client can use this application
using the following steps
(a) If emergency is of higher priority then
i. long press the icon which will directly send only the
emergency report to the server.
(b) Else
i. Select the type of emergency from menu.
ii. Select your current location from menu
(c) Send this information to the server.
4. For non-android clients the above information can be sent
through message to available helpline number.
5. Server will receive above information from clients and
decrypt the location from the received information.
(a) If received information is from internet then
i. send the emergency messages to three registered
numbers by client and
ii. Update this information on the webserver for the
respected users according the priority (police
station/hospital).
(b) If received information is from the GSM model then
i. update this information on the webserver for the
respected users(police station/hospital).
Fig.4 work flow on client-side
6. PROPOSED ARCHITECTURE
The above architecture shows the flow of the design for the
current application being developed.It involves three main
components: firstly two types of user i.e android client and
desktop client.Secondly the GSM and the server.
a. Android Client :- Here the android client will be using
the application which can ensure human safety. This
application helps in selecting location and is capable of
sending a message to the server.
b. Non-Android Client :- In case of other clients and in
unavalaibility of internet facility,user can send the text
message to the paritcular helpline number containing
location and the need of emergency service in the
specific format.
Fig.5 overview of the android application
c. Desktop Client :-It will be developed for the
emergency service providers like police,hospital,fire
brigade and other helping agencies.They need to create
account on the server and can receive the emergency
alerts as notifications. They can access notifications
from their accounts. After taking actions or solving the
issues it can be updated in the accounts as the issue has
been solved.The emergency cases can be viewed
according to the location of the departments.
d. GSM Device:- This acts as a intermediate module
between non android clients and server.It
communicates on behalf of the client with the
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_________________________________________________________________________________________
Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 389
server.Help line number will be provided to this
device.This GSM device is in turn connected to the
server.
e. Server:-There are two types of inputs recieved by the
server one is directly through android client and
second through non-android client via GSM.After
receiving input the server will check for the registerd
numbers in the database and send emergency message
with the location of the victim embeded in it. The
respective location police department account will be
updated with this report.The server will extract the
information about the location from the GSM device
and the further process will be followed as above.
Fig.6 Detailed Architecture
The below n-tier architecture shows the important part that is
internet may acess HTTP server.
Fig.7 n-tier architecture for the web services
7. CONCLUSIONS
The web services are considered to be playing the vital role in
rendering the information for building mobile application
prototype. The information will always be updated based on
information the user feeds in to the system. With the help of
this application the policeman can easily use this device to
detect any kind of emergency. The emerging cloud device is
proved to be useful for fighting crimes when there is increase in
crimes.
ACKNOWLEDGMENTS
This Research was supported by Computer Science department
of Pimpri Chinchwad College of Engineering Pune. We would
like to thank the reviewers, faculty members and other
supporters for their suggestions and contribution. Also thankful
for the continuous support of lecturers to research on this
subject
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_________________________________________________________________________________________
Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 390
REFERENCES
[1] Dr Rosidah Ibrahim(2010).”Communication System In
Emergency Medical And Trauma Services Ministry of
Health.”
[2] Jonathan D.Mayer(1980),"Response Time and Its
Significance in Medical Emergencies", Geographical
Review, American Geographical Society
[3] Jovilyn Therese B. Fajardo, Carlos M. Oppus,“A mobile
disaster management system using the android
technology,” WSEAS Transactions on Communications.
[4] T D’ Roza and G Bilchev (2004).” An Overview of
Location Based Services, Location and Personalisation:
Delivering Online and Mobility Services.”British
Telecommunication Plc.p20-27
[5] A.R. Awad, I. Von Poser, and M.T. Aboul-Ela,
Advanced Intelligent Technique of Real Genetic
Algorithm for Traveling Salesman Problem
Optimization, Proceedings of the 9th WSEAS
International Conference on Data Networks,
Communications, and Computers, Trinidad and Tobago,
November 5-7, 2007, pp. 447-453.
[6] GIS for Fire Station Locations and Response Protocol,
An ESRI® White Paper

More Related Content

What's hot

IRJET - Enhanced Driving License using NFC
IRJET - Enhanced Driving License using NFCIRJET - Enhanced Driving License using NFC
IRJET - Enhanced Driving License using NFCIRJET Journal
 
A women secure mobile app for emergency usage (go safe app)
A women secure mobile app for emergency usage (go safe app)A women secure mobile app for emergency usage (go safe app)
A women secure mobile app for emergency usage (go safe app)eSAT Journals
 
IRJET- High Security in Automated Fare Collection for TollSystem with NFC usi...
IRJET- High Security in Automated Fare Collection for TollSystem with NFC usi...IRJET- High Security in Automated Fare Collection for TollSystem with NFC usi...
IRJET- High Security in Automated Fare Collection for TollSystem with NFC usi...IRJET Journal
 
Ijacsa published research paper march 2020
Ijacsa published research paper march 2020Ijacsa published research paper march 2020
Ijacsa published research paper march 2020shoaibulhassanuos
 
IRJET- Securing E-Medical Documents using QR Code
IRJET-  	  Securing E-Medical Documents using QR CodeIRJET-  	  Securing E-Medical Documents using QR Code
IRJET- Securing E-Medical Documents using QR CodeIRJET Journal
 
An Improved Personal Security System
An Improved Personal Security SystemAn Improved Personal Security System
An Improved Personal Security SystemIJERA Editor
 
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...IRJET Journal
 
IRJET- Design and Development of Security based Voting System
IRJET- Design and Development of Security based Voting SystemIRJET- Design and Development of Security based Voting System
IRJET- Design and Development of Security based Voting SystemIRJET Journal
 
IRJET - Face Recognition and Fingerprint based Attendance Monitoring System
IRJET -  	  Face Recognition and Fingerprint based Attendance Monitoring SystemIRJET -  	  Face Recognition and Fingerprint based Attendance Monitoring System
IRJET - Face Recognition and Fingerprint based Attendance Monitoring SystemIRJET Journal
 
Fnal year project on iot accident detection and tracking system 26-may 21'
 Fnal year project on iot accident detection and tracking system  26-may 21' Fnal year project on iot accident detection and tracking system  26-may 21'
Fnal year project on iot accident detection and tracking system 26-may 21'ankitadeokate
 
IRJET- Traffic Rules Violation System using NFC Card
IRJET-  	  Traffic Rules Violation System using NFC CardIRJET-  	  Traffic Rules Violation System using NFC Card
IRJET- Traffic Rules Violation System using NFC CardIRJET Journal
 
IRJET - Three Layered Security for Banking
IRJET -  	  Three Layered Security for BankingIRJET -  	  Three Layered Security for Banking
IRJET - Three Layered Security for BankingIRJET Journal
 
IRJET-Effective and Secure E- Voting Application in GSM Module using IOT
IRJET-Effective and Secure E- Voting Application in GSM Module using IOTIRJET-Effective and Secure E- Voting Application in GSM Module using IOT
IRJET-Effective and Secure E- Voting Application in GSM Module using IOTIRJET Journal
 
IRJET - Anti-Fraud ATM Security System
IRJET  - Anti-Fraud ATM Security SystemIRJET  - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security SystemIRJET Journal
 
IRJET- Review of Fingerprint based Automobile Anti-Theft System
IRJET- Review of Fingerprint based Automobile Anti-Theft SystemIRJET- Review of Fingerprint based Automobile Anti-Theft System
IRJET- Review of Fingerprint based Automobile Anti-Theft SystemIRJET Journal
 
IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...
IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...
IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...IRJET Journal
 
A Review On Pocket Ambulance : Emergency Service
A Review On Pocket Ambulance : Emergency ServiceA Review On Pocket Ambulance : Emergency Service
A Review On Pocket Ambulance : Emergency ServiceIRJET Journal
 

What's hot (20)

IRJET - Enhanced Driving License using NFC
IRJET - Enhanced Driving License using NFCIRJET - Enhanced Driving License using NFC
IRJET - Enhanced Driving License using NFC
 
A women secure mobile app for emergency usage (go safe app)
A women secure mobile app for emergency usage (go safe app)A women secure mobile app for emergency usage (go safe app)
A women secure mobile app for emergency usage (go safe app)
 
IRJET- High Security in Automated Fare Collection for TollSystem with NFC usi...
IRJET- High Security in Automated Fare Collection for TollSystem with NFC usi...IRJET- High Security in Automated Fare Collection for TollSystem with NFC usi...
IRJET- High Security in Automated Fare Collection for TollSystem with NFC usi...
 
EFFECTIVE IN-HOUSE VOTING AND VERIFICATION USING BLOCK CHAIN IMPLEMENTATION
EFFECTIVE IN-HOUSE VOTING AND VERIFICATION USING BLOCK CHAIN IMPLEMENTATIONEFFECTIVE IN-HOUSE VOTING AND VERIFICATION USING BLOCK CHAIN IMPLEMENTATION
EFFECTIVE IN-HOUSE VOTING AND VERIFICATION USING BLOCK CHAIN IMPLEMENTATION
 
Ijacsa published research paper march 2020
Ijacsa published research paper march 2020Ijacsa published research paper march 2020
Ijacsa published research paper march 2020
 
NECK MOVEMENT BASED WHEELCHAIR TO ASSIST THE PHYSICALLY CHALLENGED
NECK MOVEMENT BASED WHEELCHAIR TO ASSIST  THE PHYSICALLY CHALLENGEDNECK MOVEMENT BASED WHEELCHAIR TO ASSIST  THE PHYSICALLY CHALLENGED
NECK MOVEMENT BASED WHEELCHAIR TO ASSIST THE PHYSICALLY CHALLENGED
 
IRJET- Securing E-Medical Documents using QR Code
IRJET-  	  Securing E-Medical Documents using QR CodeIRJET-  	  Securing E-Medical Documents using QR Code
IRJET- Securing E-Medical Documents using QR Code
 
An Improved Personal Security System
An Improved Personal Security SystemAn Improved Personal Security System
An Improved Personal Security System
 
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
 
IRJET- Design and Development of Security based Voting System
IRJET- Design and Development of Security based Voting SystemIRJET- Design and Development of Security based Voting System
IRJET- Design and Development of Security based Voting System
 
IRJET - Face Recognition and Fingerprint based Attendance Monitoring System
IRJET -  	  Face Recognition and Fingerprint based Attendance Monitoring SystemIRJET -  	  Face Recognition and Fingerprint based Attendance Monitoring System
IRJET - Face Recognition and Fingerprint based Attendance Monitoring System
 
Fnal year project on iot accident detection and tracking system 26-may 21'
 Fnal year project on iot accident detection and tracking system  26-may 21' Fnal year project on iot accident detection and tracking system  26-may 21'
Fnal year project on iot accident detection and tracking system 26-may 21'
 
IRJET- Traffic Rules Violation System using NFC Card
IRJET-  	  Traffic Rules Violation System using NFC CardIRJET-  	  Traffic Rules Violation System using NFC Card
IRJET- Traffic Rules Violation System using NFC Card
 
IRJET - Three Layered Security for Banking
IRJET -  	  Three Layered Security for BankingIRJET -  	  Three Layered Security for Banking
IRJET - Three Layered Security for Banking
 
IRJET-Effective and Secure E- Voting Application in GSM Module using IOT
IRJET-Effective and Secure E- Voting Application in GSM Module using IOTIRJET-Effective and Secure E- Voting Application in GSM Module using IOT
IRJET-Effective and Secure E- Voting Application in GSM Module using IOT
 
new Algorithm1
new Algorithm1new Algorithm1
new Algorithm1
 
IRJET - Anti-Fraud ATM Security System
IRJET  - Anti-Fraud ATM Security SystemIRJET  - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security System
 
IRJET- Review of Fingerprint based Automobile Anti-Theft System
IRJET- Review of Fingerprint based Automobile Anti-Theft SystemIRJET- Review of Fingerprint based Automobile Anti-Theft System
IRJET- Review of Fingerprint based Automobile Anti-Theft System
 
IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...
IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...
IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...
 
A Review On Pocket Ambulance : Emergency Service
A Review On Pocket Ambulance : Emergency ServiceA Review On Pocket Ambulance : Emergency Service
A Review On Pocket Ambulance : Emergency Service
 

Viewers also liked

Restrained lict domination in graphs
Restrained lict domination in graphsRestrained lict domination in graphs
Restrained lict domination in graphseSAT Publishing House
 
Robust control of pmsm using genetic algorithm
Robust control of pmsm using genetic algorithmRobust control of pmsm using genetic algorithm
Robust control of pmsm using genetic algorithmeSAT Publishing House
 
Cmos active pixel design using 0.6 μm image sensor
Cmos active pixel design using 0.6 μm image sensorCmos active pixel design using 0.6 μm image sensor
Cmos active pixel design using 0.6 μm image sensoreSAT Publishing House
 
Vibration analysis of line continuum with new matrices of elastic and inertia...
Vibration analysis of line continuum with new matrices of elastic and inertia...Vibration analysis of line continuum with new matrices of elastic and inertia...
Vibration analysis of line continuum with new matrices of elastic and inertia...eSAT Publishing House
 
Economics of a high performance solar distilled water
Economics of a high performance solar distilled waterEconomics of a high performance solar distilled water
Economics of a high performance solar distilled watereSAT Publishing House
 
Transmission and reception of data through usb using
Transmission and reception of data through usb usingTransmission and reception of data through usb using
Transmission and reception of data through usb usingeSAT Publishing House
 
Correlation measure for intuitionistic fuzzy multi sets
Correlation measure for intuitionistic fuzzy multi setsCorrelation measure for intuitionistic fuzzy multi sets
Correlation measure for intuitionistic fuzzy multi setseSAT Publishing House
 
Fpga implementation of a functional microcontroller
Fpga implementation of a functional microcontrollerFpga implementation of a functional microcontroller
Fpga implementation of a functional microcontrollereSAT Publishing House
 
Effect of calcination on the electrical properties and quantum confinement of...
Effect of calcination on the electrical properties and quantum confinement of...Effect of calcination on the electrical properties and quantum confinement of...
Effect of calcination on the electrical properties and quantum confinement of...eSAT Publishing House
 
Analysis of multiport dc dc converter in renewable energy sources
Analysis of multiport dc dc converter in renewable energy sourcesAnalysis of multiport dc dc converter in renewable energy sources
Analysis of multiport dc dc converter in renewable energy sourceseSAT Publishing House
 
Virtual private network a veritable tool for network security
Virtual private network a veritable tool for network securityVirtual private network a veritable tool for network security
Virtual private network a veritable tool for network securityeSAT Publishing House
 
A novel speech enhancement technique
A novel speech enhancement techniqueA novel speech enhancement technique
A novel speech enhancement techniqueeSAT Publishing House
 
Information technology and cost optimization
Information technology and cost optimizationInformation technology and cost optimization
Information technology and cost optimizationeSAT Publishing House
 
Performance evaluation of nano graphite inclusions in
Performance evaluation of nano graphite inclusions inPerformance evaluation of nano graphite inclusions in
Performance evaluation of nano graphite inclusions ineSAT Publishing House
 
Usability analysis of sms alert system for immunization
Usability analysis of sms alert system for immunizationUsability analysis of sms alert system for immunization
Usability analysis of sms alert system for immunizationeSAT Publishing House
 
Cfd analaysis of flow through a conical exhaust
Cfd analaysis of flow through a conical exhaustCfd analaysis of flow through a conical exhaust
Cfd analaysis of flow through a conical exhausteSAT Publishing House
 
Intelligent vision based snake robot
Intelligent vision based snake robotIntelligent vision based snake robot
Intelligent vision based snake roboteSAT Publishing House
 
Characterization of reflectors and absorber coatings
Characterization of reflectors and absorber coatingsCharacterization of reflectors and absorber coatings
Characterization of reflectors and absorber coatingseSAT Publishing House
 
Use of scc and rca for sustainable construction –
Use of scc and rca for sustainable construction – Use of scc and rca for sustainable construction –
Use of scc and rca for sustainable construction – eSAT Publishing House
 
Seismic pounding of multistoreyed buildings
Seismic pounding of multistoreyed buildingsSeismic pounding of multistoreyed buildings
Seismic pounding of multistoreyed buildingseSAT Publishing House
 

Viewers also liked (20)

Restrained lict domination in graphs
Restrained lict domination in graphsRestrained lict domination in graphs
Restrained lict domination in graphs
 
Robust control of pmsm using genetic algorithm
Robust control of pmsm using genetic algorithmRobust control of pmsm using genetic algorithm
Robust control of pmsm using genetic algorithm
 
Cmos active pixel design using 0.6 μm image sensor
Cmos active pixel design using 0.6 μm image sensorCmos active pixel design using 0.6 μm image sensor
Cmos active pixel design using 0.6 μm image sensor
 
Vibration analysis of line continuum with new matrices of elastic and inertia...
Vibration analysis of line continuum with new matrices of elastic and inertia...Vibration analysis of line continuum with new matrices of elastic and inertia...
Vibration analysis of line continuum with new matrices of elastic and inertia...
 
Economics of a high performance solar distilled water
Economics of a high performance solar distilled waterEconomics of a high performance solar distilled water
Economics of a high performance solar distilled water
 
Transmission and reception of data through usb using
Transmission and reception of data through usb usingTransmission and reception of data through usb using
Transmission and reception of data through usb using
 
Correlation measure for intuitionistic fuzzy multi sets
Correlation measure for intuitionistic fuzzy multi setsCorrelation measure for intuitionistic fuzzy multi sets
Correlation measure for intuitionistic fuzzy multi sets
 
Fpga implementation of a functional microcontroller
Fpga implementation of a functional microcontrollerFpga implementation of a functional microcontroller
Fpga implementation of a functional microcontroller
 
Effect of calcination on the electrical properties and quantum confinement of...
Effect of calcination on the electrical properties and quantum confinement of...Effect of calcination on the electrical properties and quantum confinement of...
Effect of calcination on the electrical properties and quantum confinement of...
 
Analysis of multiport dc dc converter in renewable energy sources
Analysis of multiport dc dc converter in renewable energy sourcesAnalysis of multiport dc dc converter in renewable energy sources
Analysis of multiport dc dc converter in renewable energy sources
 
Virtual private network a veritable tool for network security
Virtual private network a veritable tool for network securityVirtual private network a veritable tool for network security
Virtual private network a veritable tool for network security
 
A novel speech enhancement technique
A novel speech enhancement techniqueA novel speech enhancement technique
A novel speech enhancement technique
 
Information technology and cost optimization
Information technology and cost optimizationInformation technology and cost optimization
Information technology and cost optimization
 
Performance evaluation of nano graphite inclusions in
Performance evaluation of nano graphite inclusions inPerformance evaluation of nano graphite inclusions in
Performance evaluation of nano graphite inclusions in
 
Usability analysis of sms alert system for immunization
Usability analysis of sms alert system for immunizationUsability analysis of sms alert system for immunization
Usability analysis of sms alert system for immunization
 
Cfd analaysis of flow through a conical exhaust
Cfd analaysis of flow through a conical exhaustCfd analaysis of flow through a conical exhaust
Cfd analaysis of flow through a conical exhaust
 
Intelligent vision based snake robot
Intelligent vision based snake robotIntelligent vision based snake robot
Intelligent vision based snake robot
 
Characterization of reflectors and absorber coatings
Characterization of reflectors and absorber coatingsCharacterization of reflectors and absorber coatings
Characterization of reflectors and absorber coatings
 
Use of scc and rca for sustainable construction –
Use of scc and rca for sustainable construction – Use of scc and rca for sustainable construction –
Use of scc and rca for sustainable construction –
 
Seismic pounding of multistoreyed buildings
Seismic pounding of multistoreyed buildingsSeismic pounding of multistoreyed buildings
Seismic pounding of multistoreyed buildings
 

Similar to I am secure android application

Hazard object reporting to respective authorities
Hazard object reporting to respective authoritiesHazard object reporting to respective authorities
Hazard object reporting to respective authoritieseSAT Journals
 
Hazard object reporting to respective authorities
Hazard object reporting to respective authoritiesHazard object reporting to respective authorities
Hazard object reporting to respective authoritieseSAT Publishing House
 
Dynamic interaction of mobile device and database for
Dynamic interaction of mobile device and database forDynamic interaction of mobile device and database for
Dynamic interaction of mobile device and database foreSAT Publishing House
 
Crime Record Management system with React Native and Google Cloud Services(Be...
Crime Record Management system with React Native and Google Cloud Services(Be...Crime Record Management system with React Native and Google Cloud Services(Be...
Crime Record Management system with React Native and Google Cloud Services(Be...IRJET Journal
 
Security based home surveillance system using android application
Security based home surveillance system using android applicationSecurity based home surveillance system using android application
Security based home surveillance system using android applicationeSAT Publishing House
 
Advanced Vehicle Tracking system using GSM/GPRS and GPS
Advanced Vehicle Tracking system using GSM/GPRS and GPSAdvanced Vehicle Tracking system using GSM/GPRS and GPS
Advanced Vehicle Tracking system using GSM/GPRS and GPSrahulmonikasharma
 
IRJET - Android App for Women Security
IRJET -  	  Android App for Women SecurityIRJET -  	  Android App for Women Security
IRJET - Android App for Women SecurityIRJET Journal
 
Ijiret siri-hp-a-remote-phone-access-for-smartphone-events
Ijiret siri-hp-a-remote-phone-access-for-smartphone-eventsIjiret siri-hp-a-remote-phone-access-for-smartphone-events
Ijiret siri-hp-a-remote-phone-access-for-smartphone-eventsIJIR JOURNALS IJIRUSA
 
IRJET- Emergency Medical Dispatcher
IRJET- Emergency Medical DispatcherIRJET- Emergency Medical Dispatcher
IRJET- Emergency Medical DispatcherIRJET Journal
 
WOMEN’s SAFETY APP
WOMEN’s SAFETY APPWOMEN’s SAFETY APP
WOMEN’s SAFETY APPIRJET Journal
 
Networking smartphones for disaster recovery using teamphone
Networking smartphones for disaster recovery using teamphoneNetworking smartphones for disaster recovery using teamphone
Networking smartphones for disaster recovery using teamphoneIJARIIT
 
Detect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructureDetect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructureeSAT Publishing House
 
Log into android mobile to fetch the device oriented information using remote...
Log into android mobile to fetch the device oriented information using remote...Log into android mobile to fetch the device oriented information using remote...
Log into android mobile to fetch the device oriented information using remote...eSAT Journals
 
Log into android mobile to fetch the device oriented information using remote...
Log into android mobile to fetch the device oriented information using remote...Log into android mobile to fetch the device oriented information using remote...
Log into android mobile to fetch the device oriented information using remote...eSAT Publishing House
 
Android Based Complaint Management System For Municipal Corporation
Android Based Complaint Management System For Municipal CorporationAndroid Based Complaint Management System For Municipal Corporation
Android Based Complaint Management System For Municipal CorporationIJERA Editor
 
IRJET- SMS based Mobile Technology
IRJET- SMS based Mobile TechnologyIRJET- SMS based Mobile Technology
IRJET- SMS based Mobile TechnologyIRJET Journal
 
IOT Based Smart Ambulance Monitoring System with Traffic Light Control
IOT Based Smart Ambulance Monitoring System with Traffic Light ControlIOT Based Smart Ambulance Monitoring System with Traffic Light Control
IOT Based Smart Ambulance Monitoring System with Traffic Light ControlIRJET Journal
 
IRJET- Intelligent Traffic Control System for Smart Ambulance
IRJET- Intelligent Traffic Control System for Smart AmbulanceIRJET- Intelligent Traffic Control System for Smart Ambulance
IRJET- Intelligent Traffic Control System for Smart AmbulanceIRJET Journal
 
IRJET-E-Nursing System
IRJET-E-Nursing SystemIRJET-E-Nursing System
IRJET-E-Nursing SystemIRJET Journal
 
IRJET- Emergency Navigation System using Mobile Computing
IRJET-  	  Emergency Navigation System using Mobile ComputingIRJET-  	  Emergency Navigation System using Mobile Computing
IRJET- Emergency Navigation System using Mobile ComputingIRJET Journal
 

Similar to I am secure android application (20)

Hazard object reporting to respective authorities
Hazard object reporting to respective authoritiesHazard object reporting to respective authorities
Hazard object reporting to respective authorities
 
Hazard object reporting to respective authorities
Hazard object reporting to respective authoritiesHazard object reporting to respective authorities
Hazard object reporting to respective authorities
 
Dynamic interaction of mobile device and database for
Dynamic interaction of mobile device and database forDynamic interaction of mobile device and database for
Dynamic interaction of mobile device and database for
 
Crime Record Management system with React Native and Google Cloud Services(Be...
Crime Record Management system with React Native and Google Cloud Services(Be...Crime Record Management system with React Native and Google Cloud Services(Be...
Crime Record Management system with React Native and Google Cloud Services(Be...
 
Security based home surveillance system using android application
Security based home surveillance system using android applicationSecurity based home surveillance system using android application
Security based home surveillance system using android application
 
Advanced Vehicle Tracking system using GSM/GPRS and GPS
Advanced Vehicle Tracking system using GSM/GPRS and GPSAdvanced Vehicle Tracking system using GSM/GPRS and GPS
Advanced Vehicle Tracking system using GSM/GPRS and GPS
 
IRJET - Android App for Women Security
IRJET -  	  Android App for Women SecurityIRJET -  	  Android App for Women Security
IRJET - Android App for Women Security
 
Ijiret siri-hp-a-remote-phone-access-for-smartphone-events
Ijiret siri-hp-a-remote-phone-access-for-smartphone-eventsIjiret siri-hp-a-remote-phone-access-for-smartphone-events
Ijiret siri-hp-a-remote-phone-access-for-smartphone-events
 
IRJET- Emergency Medical Dispatcher
IRJET- Emergency Medical DispatcherIRJET- Emergency Medical Dispatcher
IRJET- Emergency Medical Dispatcher
 
WOMEN’s SAFETY APP
WOMEN’s SAFETY APPWOMEN’s SAFETY APP
WOMEN’s SAFETY APP
 
Networking smartphones for disaster recovery using teamphone
Networking smartphones for disaster recovery using teamphoneNetworking smartphones for disaster recovery using teamphone
Networking smartphones for disaster recovery using teamphone
 
Detect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructureDetect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructure
 
Log into android mobile to fetch the device oriented information using remote...
Log into android mobile to fetch the device oriented information using remote...Log into android mobile to fetch the device oriented information using remote...
Log into android mobile to fetch the device oriented information using remote...
 
Log into android mobile to fetch the device oriented information using remote...
Log into android mobile to fetch the device oriented information using remote...Log into android mobile to fetch the device oriented information using remote...
Log into android mobile to fetch the device oriented information using remote...
 
Android Based Complaint Management System For Municipal Corporation
Android Based Complaint Management System For Municipal CorporationAndroid Based Complaint Management System For Municipal Corporation
Android Based Complaint Management System For Municipal Corporation
 
IRJET- SMS based Mobile Technology
IRJET- SMS based Mobile TechnologyIRJET- SMS based Mobile Technology
IRJET- SMS based Mobile Technology
 
IOT Based Smart Ambulance Monitoring System with Traffic Light Control
IOT Based Smart Ambulance Monitoring System with Traffic Light ControlIOT Based Smart Ambulance Monitoring System with Traffic Light Control
IOT Based Smart Ambulance Monitoring System with Traffic Light Control
 
IRJET- Intelligent Traffic Control System for Smart Ambulance
IRJET- Intelligent Traffic Control System for Smart AmbulanceIRJET- Intelligent Traffic Control System for Smart Ambulance
IRJET- Intelligent Traffic Control System for Smart Ambulance
 
IRJET-E-Nursing System
IRJET-E-Nursing SystemIRJET-E-Nursing System
IRJET-E-Nursing System
 
IRJET- Emergency Navigation System using Mobile Computing
IRJET-  	  Emergency Navigation System using Mobile ComputingIRJET-  	  Emergency Navigation System using Mobile Computing
IRJET- Emergency Navigation System using Mobile Computing
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...ranjana rawat
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 

Recently uploaded (20)

the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 

I am secure android application

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _________________________________________________________________________________________ Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 386 I AM SECURE ANDROID APPLICATION Amrutha Barge1 , Nikita Vitthal Belokar2 , Sonali Khodave3 , Pallavi Gosavi4 1 Department of Computer Science, Pimpri Chinchwad College of Engineering 2 Department of Computer Science, Pimpri Chinchwad College of Engineering 3 Department of Computer Science, Pimpri Chinchwad College of Engineering 4 Department of Computer Science, Pimpri Chinchwad College of Engineering Abstract The mobile device has been positioned to become the world’s leading solution for every problem. The problem can be any emergency case like natural disaster, kidnapping etc. in which smart phones can be used to provide help. This article outlines use of mobile technology through which we can ensure person’s safety. This application provides you and your family with a one-click automated emergency communication system that contacts up to 3 family or friends. It will even send your location Because of it becomes easy for you to locate and contact the closest Police Department, Ambulance Service, and Hospital. This mobile application can be useful to optimize the workflow in emergency cases. ----------------------------------------------------------------------***-------------------------------------------------------------------- 1. INTRODUCTION The enormous trend of crimes is happening now days so there is a need of such application which runs on smart phones. By using this “I am secure app” the victims can report any emergency cases as fast as it could enable to act effectively. In this the client that is the user of android phone and the cops will create the account for access of this application. After creating this account the client will get the username and password. In emergency the client with android phone will send the emergency message to server including current position of the victim. The server will in turn send this emergency message to cops. Then this cops will take the respective action to the emergency an d will give notification .We are also using the GSM module it will be beneficial whenever the client is not having internet connection .The GSM module will be having one helpline number, and this module will be connected to server .In emergency the client will send message to this GSM module and via server it will send to cops. 2. PROBLEM STATEMENT Development of this project is to ensure human safety in emergency cases. We are developing mobile application that provide client with one click automated emergency system that contacts up to 3 registered numbers. It will even send clients’ location. In case of any emergency, client will use this application which is already installed in clients’ mobile .With one click; client will initiate the service by which the message will be send to the server. In case internet is not available on clients mobile the client himself will send the message to the helpline number provided. This helpline number is of a GSM device which will always be connected to the server. The server will in turn read the message received by the device. Now the server will send the information to the nearest police station according to the report generated. Then the cops will take the further action and provide notification on the account provided by the server. 3. PURPOSE OF STUDY i. In this modern era, human safety has been greatly threatened due to various crimes, attacks and other misfortunes taking place. ii. Almost 90% of the people around the globe are aware of the technology and use it in their daily life. iii. Mobile phone is the only device which is carried and useful during time of emergency. iv. Keeping this point in mind, the idea of developing this application has been emerged to provide human safety. v. Informing about the emergency is as important as reporting and taking action within certain amount of time. vi. Knowledge about the victim’s location in the report can save time which can be used in taking further action. vii. Using this technology we can prevent the severity of any problem that can be caused by disaster or any misfortune. viii. Hence, this application can be proved to be useful in reporting emergency along with the location.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _________________________________________________________________________________________ Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 387 4. METHODOLOGY Fig.1 Research Methodology Diagram (a) Fig.2 Research Methodology Diagram for dev developing the android application (b) We begin with the literature survey and the previous work done in other research papers. This is the extension to the SOS emergency messages. Then we started with data gathering by analyzing previously implemented SOS emergency messages. In designing phase the suitable architecture diagram and modules were identified. We will be using mobile pull service. First we need to review the previous works by doing literature survey. Data is to be gathered by observing and collecting information. Determine which service is to be used to build the project. Plan for the design of the project staring with the user interface Check the running of the project by testing it. 5. HOW IT WORKS Fig.3 work flow on server side The working of the android application on the client as well as the server side is as follows: 1. If user is android client then (a) First install the developed application. (b) Follow the given registration steps: i. Fill the personal information. ii. Provide three contact numbers to which the message will be sent in emergency.
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _________________________________________________________________________________________ Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 388 2. Else If user is police/hospital (a) Create an account on the web server which includes registered user id and password. 3. When in emergency android client can use this application using the following steps (a) If emergency is of higher priority then i. long press the icon which will directly send only the emergency report to the server. (b) Else i. Select the type of emergency from menu. ii. Select your current location from menu (c) Send this information to the server. 4. For non-android clients the above information can be sent through message to available helpline number. 5. Server will receive above information from clients and decrypt the location from the received information. (a) If received information is from internet then i. send the emergency messages to three registered numbers by client and ii. Update this information on the webserver for the respected users according the priority (police station/hospital). (b) If received information is from the GSM model then i. update this information on the webserver for the respected users(police station/hospital). Fig.4 work flow on client-side 6. PROPOSED ARCHITECTURE The above architecture shows the flow of the design for the current application being developed.It involves three main components: firstly two types of user i.e android client and desktop client.Secondly the GSM and the server. a. Android Client :- Here the android client will be using the application which can ensure human safety. This application helps in selecting location and is capable of sending a message to the server. b. Non-Android Client :- In case of other clients and in unavalaibility of internet facility,user can send the text message to the paritcular helpline number containing location and the need of emergency service in the specific format. Fig.5 overview of the android application c. Desktop Client :-It will be developed for the emergency service providers like police,hospital,fire brigade and other helping agencies.They need to create account on the server and can receive the emergency alerts as notifications. They can access notifications from their accounts. After taking actions or solving the issues it can be updated in the accounts as the issue has been solved.The emergency cases can be viewed according to the location of the departments. d. GSM Device:- This acts as a intermediate module between non android clients and server.It communicates on behalf of the client with the
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _________________________________________________________________________________________ Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 389 server.Help line number will be provided to this device.This GSM device is in turn connected to the server. e. Server:-There are two types of inputs recieved by the server one is directly through android client and second through non-android client via GSM.After receiving input the server will check for the registerd numbers in the database and send emergency message with the location of the victim embeded in it. The respective location police department account will be updated with this report.The server will extract the information about the location from the GSM device and the further process will be followed as above. Fig.6 Detailed Architecture The below n-tier architecture shows the important part that is internet may acess HTTP server. Fig.7 n-tier architecture for the web services 7. CONCLUSIONS The web services are considered to be playing the vital role in rendering the information for building mobile application prototype. The information will always be updated based on information the user feeds in to the system. With the help of this application the policeman can easily use this device to detect any kind of emergency. The emerging cloud device is proved to be useful for fighting crimes when there is increase in crimes. ACKNOWLEDGMENTS This Research was supported by Computer Science department of Pimpri Chinchwad College of Engineering Pune. We would like to thank the reviewers, faculty members and other supporters for their suggestions and contribution. Also thankful for the continuous support of lecturers to research on this subject
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _________________________________________________________________________________________ Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 390 REFERENCES [1] Dr Rosidah Ibrahim(2010).”Communication System In Emergency Medical And Trauma Services Ministry of Health.” [2] Jonathan D.Mayer(1980),"Response Time and Its Significance in Medical Emergencies", Geographical Review, American Geographical Society [3] Jovilyn Therese B. Fajardo, Carlos M. Oppus,“A mobile disaster management system using the android technology,” WSEAS Transactions on Communications. [4] T D’ Roza and G Bilchev (2004).” An Overview of Location Based Services, Location and Personalisation: Delivering Online and Mobility Services.”British Telecommunication Plc.p20-27 [5] A.R. Awad, I. Von Poser, and M.T. Aboul-Ela, Advanced Intelligent Technique of Real Genetic Algorithm for Traveling Salesman Problem Optimization, Proceedings of the 9th WSEAS International Conference on Data Networks, Communications, and Computers, Trinidad and Tobago, November 5-7, 2007, pp. 447-453. [6] GIS for Fire Station Locations and Response Protocol, An ESRI® White Paper