SlideShare a Scribd company logo
1 of 5
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1055
TOUCH ME NOT-A Women Safety Device
Jismi Thomas1, Maneesha K J2, Nambissan Shruthi Vijayan3, Prof. Divya R4.
1,2,3 Student, Dept. of Computer science Engineering, SCET College, Kerala, India
4Professor, Dept. of Computer science Engineering, SCET College, Kerala, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - : Women security is a major issue of concern in
today’s world. Women are subjected to unethical physical
harassment. Women safety methods such as various mobile
apps have been tried and implemented, but the need of the
time is that they need is a device that can be carried
everywhere easily. Here we present Touch Me Not, an idea to
design one such device which can be attached to the clothing.
It will be a button which will be attachable to the clothing.
This button will be connected to the system which has two
modules, one which can be used when someone makes some
sort of unethical movement and the other one which can be
used when you sense danger. The first module can be used
just to record that is making a short video to capture the
assailant, while the second one can be used during times of
danger to send your location to family or friends as well as it
alerts the nearest police station, such that help can reach as
soon as possible. The tools that we will be using include micro-
controllers, GSM and GPS modules for the hardware section,
python for the software section.
Key Words: Ardino programming, GSM module, GPS
Module, SD Module
1. INTRODUCTION
The purpose of this project is to design an easy and portable
device for women safety. Here we are mainly focusing on
designing a prototype in which the device can be easily
carried around. Women security is a major issue of concern
in today’sworld. Women are subjected to unethicalphysical
harassment. Women safety methods such as various mobile
apps have been tried and implemented, but the need of the
time is that they need is a device that can be carried
everywhere easily. Touch Me Not, an idea to design one such
device which can be attached to the clothing. It will be a
button which will be attachable to the clothing. This button
will be connected to the system which hastwo modules, one
which can be used when someone makes some sort of
unethical movement and the other one which can be used
when you sense danger. The first module can be used just to
record that is making a short video to capture the assailant,
while the second one can be used during times of danger to
send your location to family or friends as well as it alerts
then nearest police station, such that help can reach as soon
as possible.
The idea to develop a smart device for women is that it’s
completely comfortable and easy to use as compared with
already existing women security solutionssuchasaseparate
garment, bulky belts and in famous mobile apps thatarejust
very abstract and obsolete. If a woman is subjected toattack
by an adversary, then a switch has to be pressed by her,
manually, (which will be ideally located at a convenient
location on the body), which in turn will trigger the micro-
controller to activate the on body GPS Tracker and
simultaneously capture the image/video of the attacker,and
transmit it via an RF module to another section where it will
be stored. Here we are attempting to make to develop a
method by which this image can be transferred on a web
server, ideally on the police server. Next, the Global
Positioning System (GPS) receiver will acquire the
location co-ordinates of the woman subjected to attack,
and will send these to the pre-decided cell phone numbers
(typically the family and the police), via GSM module.
1.1 Existing System
Having the concern of women in mindmanydevelopershave
come up are: Codes like *91# is used to provide emergency
services, which will alert police control. Free mobile
application 'Help me on mobile' to ensure safety of women
was launched to assist those who need emergency .These
applications need a single click to do this task. But when a
girl is in trouble, there can be times that the girl is not
capable of taking the phone and pressing button.
SHE (Society Harnessing Equipment): It is a garment
embedded with an electronic device which givesout3800kV
electric shock to the assailants helping the victim to escape.
Smart Belt: This system is designed with a portable device
which resemblesa normal belt. It consists of Arduino board,
screaming alarm and pressure sensors.
Watch Over Me an application which turns phone into a
personal safety device. It monitorsthe journeyandalertsthe
contacts it the user has not reached the destination within
scheduled time. In the instance of attack the user has to
shake the phone to trigger alarm.
Witness: Using Witness, users can broadcast their location,
audio, and video to loved ones in just one touch. It will call
and text emergency contacts as well as broadcast live video,
audio, and your location. iOS. The above mentionedarejusta
few examples of safety and security devices implemented.
1.2 Proposed System
Touch Me Not is a security device in a button form. The
button which can be attached to the clothing and when
pressed it performs the action of alerting contacts including
the selected family member or friend as well as the police.
The device enabled with the GPS system will be able to send
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1056
the location to the contacts. The device will be enabled with
camera which will capture images and videos based on the
users trigger and these images will also be sent to the
contacts. The figures below show block diagram
representation of the system to be implemented.
Figure1: Design of the System
Here the figure 1.2.1 represents the block diagram of
location tracking module. Here the trigger will be button
press which will activate the GSM module to send the
location which is tracked by GPS to the selected phone
numbers.
The following steps briefly define the working of the device
as shown in the figure 3.2:
1. The system is turned ON when switch is pressed in
instances of attack, manually by the woman.
2. This switch triggersa microcontroller thatactivatesanon-
body alarm.
3. The microcontroller triggersthe on-body camera andGPS
module to capture the image and get the location
respectively.
4. Images are stored in a micro SD card as a proof for legal
actions.
5. Hand-held controller when triggered, receiveslocationco-
ordinates from the GPS receiver and transmits these in the
form of an SMS to the pre- decided phone number.
2. DESIGN AND DEVELOPMENT
MODULE DESIGN
This system functions with 4 different modules. They are
1. GPRS MODULE (Location Tracking Module)
2. Image capturing and storing
3. GSM Module (Sending module)
4. Alarm
2.1 GSM and GPRS Module
Figure2: GSM/GPS/GPRS Module
Figure3: Camera OV7670
Figure4: Alarm Module
MODULE DESRIPTION
The system we have presented here has mainly four parts.
They are
1. Location Tracking (GPS module)
2. Image capturing and storing
3. Storing and sending (GSM module)
4. Alarm
The first step is location tracking. The location tracking
system is an important part of this project since it makes
sure that help is on the way for the victim. Hence, it is
required to be faster and efficient. Location tracking intends
to update the location of the victim continuously to either
the police or the family of the victim. The programming is
such that the latitude and longitude of the victimis reported
at multiple instances and at different times. The most
convenient form to inform about location is a Short Message
Service (SMS) as cell phones are widely used. The location
tracking subsystem starts working on the triggerbytheuser.
On parsing the correct reading, the micro-controller
commands the Global System for Mobile (GSM) module to
transmit the data through an SMS by using AT commands. A
GSM digitizes and reduces the data, then sends it down
through a channel with two different streams of client data,
each in itsown particular time slot. The digital system hasan
ability to carry 64 k bps to 120 Mbps of data rates.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1057
Image is acquired from a high definition button-spy camera
that is of button size attached to cloth. It captures images at
trigger i.e. button press by the user. These captured image
are then store to SD card and saved for future use. The alarm
module is secondary module which will be triggered with
two button press. Initially at the first trigger only the
location will be sent. If the user feels threatened or needs
emergency assistance, then all that has to be done is simply
activate this alarm. It will catch the attention of others for
immediate help. The alarm will sound for three minutesand
then cease. Especially useful for women while traveling
alone as it is small enough to pocket or carry in a hand bag.
2.1. HARDWARE SPECIFICATIONS
The components used for this system are:
(A) Ardino
Arduino is an open source computer hardware andsoftware
company, project, and user community that designs and
manufactures single-board microcontrollers and
microcontroller kits for building digital devices and
interactive objects that can sense and control objects in the
physical world. The project's products are distributed as
open-source hardware and software, which are licensed
under the GNU Lesser General Public License (LGPL) or the
GNU General Public License (GPL), permitting the
manufacture of Arduino boardsand softwaredistributionby
anyone. Arduino boards are available commercially in
preassembled form, or as do-it-yourself (DIY) kits.
Arduino boarddesigns use a variety of microprocessorsand
controllers. The boardsare equipped with sets of digitaland
analogue input/output (I/O) pins that may be interfaced to
various expansion boards (shields) and other circuits. The
boards feature serial communications interfaces, including
Universal Serial Bus (USB) on some models, which are also
used for loading programs from personal computers. The
microcontrollers are typically programmed using a dialect
of features from the programming languages C and C++. In
addition to using traditional compiler toolchains, the
Arduino (IDE) based on the Processing language project.
(B) SIM908 GPS & GSM/GPRS Quad Band Serial Modem
SIM908 module is a completeQuad-BandGSM/GPRSmodule
which combines GPS technology for satellite navigation.The
compact design which integrated GPRS and GPS in a SMT
package will significantly save both timeandcosts.Featuring
an industry-standard interface and GPS function, it allows
variable assets to be tracked seamlessly at any location and
anytime with signal coverage. It includes GSM Antenna and
GPS Antenna. Features: Dual SMA Antenna Connector for
GSM and GPS, Dual Serial Port for GSM and GPS GSM
standard AT Commands, GPS NMEA Protocol, Network and
Ring LED , Rugged Simcard Holder.
Features of GSM Module:
 Improved spectrum efficiency
 International roaming
 Compatibility with integrated services digital
network (ISDN)
 Support for new services.
 SIM phonebook management
 Fixed dialing number (FDN)
 Real time clock with alarm management
 High-quality speech
 Uses encryption to make phone calls more secure
 Short message service (SMS)
The security strategies standardized for the GSM system
make it the most secure telecommunications standard
currently accessible. Although the confidentiality of a call
and secrecy of the GSM subscriber is just ensured on the
radio channel, this is a major step in achieving end-to- end
security. A GSM modem can also be a standard GSM mobile
phone with the appropriate cable and software driver to
connect to a serial port or USB port on your computer.
A GPS device can retrieve from the GPS system location and
time information in all weather conditions, anywhere on or
near the Earth. A GPS reception requires an unobstructed
line of sight to four or more GPS satellites, and is subject to
poor satellite signal conditions. In exceptionally poor signal
conditions, for example in urban areas, satellite signals may
exhibit multipath propagation where signals bounce off
structures, or are weakened by meteorological conditions.
(C) Button Spy Camera
A hidden camera or spy camera or security camera is a
still or video camera used to record people without their
knowledge. The camera is "hidden" because it is either not
visible to the subject being filmed, or is disguised as another
object. Hidden cameras can be built into commonly used
objects such astelevision sets, smokedetectors, clock radios,
motion detectors, ball caps, plants, and mobile phones. The
OV7670/OV7171 CAMERACHIPTM is a low voltage CMOS
image sensor that provides the full functionality of a single-
chip VGA camera and image processor in a small footprint
package. The OV7670/OV7171 provides full-frame, sub-
sampled or windowed 8-bit images in a wide range of
formats, controlled through the Serial Camera Control Bus
(SCCB) interface. This product has an image array capable of
operating at up to 30 frames per second (fps) in VGA with
complete user control over image quality, formatting and
outputdata transfer. All requiredimageprocessingfunctions,
including exposure control, gamma, white balance, color
saturation, hue control and more, are also programmable
through the SCCB interface. In addition, OmniVision
CAMERACHIPsuse proprietarysensortechnologytoimprove
image quality by reducing or eliminating common
lighting/electrical sources of image contamination, such as
fixed pattern noise (FPN), smearing, blooming, etc., to
produce a clean, fully stable color image.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1058
2.1. SOFTWARE SPECIFICATIONS
(A)Python
Python is a widely used high-level programming language
for general-purpose programming, created by Guido van
Rossum and first released in 1991. A interpreted language,
Python has a design philosophy that emphasizes cod
readability (notably using white-spaceindentationtodelimit
code blocks rather than curly brackets or keywords), and a
syntax that allows programmers to express concepts in
fewer lines of code than might be used in languages such as
C++ or Java. The language provides constructs intended to
enable writing clear programs on both a small and large
scale. Python features a dynamic type system and automatic
memory management and supports multiple programming
paradigms, includingobject-oriented, imperative,functional
programming, and procedural styles. It has a large and
comprehensive standard library. Python interpreters are
available for many operating systems, allowing Python code
to run on a wide variety of systems. Python, the reference
implementation of Python, is open source softwareandhasa
community-based development model, asdo nearly all ofits
variant implementations. C Python is managed by the non-
profit Python Software Foundation. The imagesstoredinthe
SD card are in bmp format. These images can be read using
python programming.
(B) Arduino Programming
For the location tracking system using Arduino,thesoftware
approach is given in figure below. The software used is the
Arduino Integrated Development Environment (IDE) which
provides a smooth platform for programming the
microcontroller and the programming sequence is shownin
figure The delays are included in order to allow the
respective modules to initialize and synchronize with
the networks.
3. CONCLUSIONS
Touch Me Not (A Woman Security Device)hasbeendesigned
keeping in mind the increasing violence againstwomen.This
system is designed to help women in distress situations to
call for help as well as alert the surrounding people. It has
been developed as an idea to make the security device more
portable and comfortable. This system was designed after
reference to already implemented system. Here measures
are being made to overcome the flaws in previous designs
and also to reduce the power consumption.
The following are the results obtained.
Figure 3.1: GPS receiver data.
Figure 3.2: Message received showing location.
Figure 3.3: Camera Module output
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1059
ACKNOWLEDGEMENT
We would like to express our immense gratitude and
profound thanks to all those who helped us to make this
project a great success. At the very outset we express our
thanks to the Almighty God for all the blessings endowed on
us. We express our thanks to our Executive Director
Msgr.Rev.Fr. Dr. Lazer Kuttikadan, Director Rev. Fr. Dr.Jose
Kannampuzha, Joint Director Dr. Sudha George Valavi and
Principal Dr. Nixon Kuruvila for providing us with such a
great opportunity. We can hardly find words to express our
deep appreciation for the help and warm encouragement
that we have received from Mr.Krishnadas J, head of the
department, Sahrdaya College of Engineering and
Technology, our project guide Ms. Divya R Assistant
professor, Sahrdaya College of Engineering and Technology
and also our project coordinators Mr. Willson Joseph C
Assistant professor, Sahrdaya College of Engineering and
Technology and Ms. Roshni R Menon Assistant professor,
Sahrdaya College of Engineering and Technology because
without their sacrificial help we couldn't have dreamt of
completing this project successfully. We would also extend
our deep sense of gratitude to all other faculties for their
help and advice throughout the advancement of this project.
We are extremely thankful to our parents and friends for
being with as a constant source of inspiration.
REFERENCES
[1] Vanshaj Sikri, Tushar Kundra “GSM enabled
Wristwatch to send Distress Message consisting
Location Co-ordinates obtained Using Cell
TowerTriangulation” in 2015 International
Conference on Man and Machine Interfacing (MAMI),
978-1-5090-0225-2/15/2015 IEEE.
[2] G C Harikiran, Karthik Menasinkai, Suhas Shirol,
“Smart Security Solution forWomenbasedonInternet
Of Things(IOT)”, in “International Conference on
Electrical, Electronics, and Optimization Techniques
(ICEEOT) - 2016”,978-1-4673-9939-5/16/2016IEEE
[3] Madhura Mahajan1,KTV Reddy2,Manita Rajput
“Design and Implementation of a Rescue System for
Safety of Women” in “IEEE WiSPNET 2016
conference” .
[4] Nandita Viswanath, Naga Vaishnavi Pakyala,Dr. G.
Muneeswari “Smart Foot Device forWomenSafety”in
IEEE Region 10 Symposium(TENSYMP),
Bali,indonesia,2016
[5] W. El-Medany, A. Al-Omary, R. Al-Hakim, S. Al-
Irhayim and M. Nusaif, “A Cost Effective Real-Time
Tracking System Prototype Using Integrated
GPS/GPRS Module,” in 6th International Conference
on Wireless and Mobile Communications, Valencia,
2010, pp.521-525.
BIOGRAPHIES
Maneesha K J ,
Final Year Student,
Sahrdaya College of Engineering
and Technology,
Kerala, India.
Shruthi Nambissan
Final Year Student,
Sahrdaya College of Engineering
and Technology,
Kerala, India.
Jismi Thomas
Final Year Student,
Sahrdaya College of Engineering
and Technology,
Kerala, India.
Divya R,
Assistant Professor,
Sahrdaya College of Engineering
and Technology,
Kerala, India.

More Related Content

What's hot

IRJET- Women Security System using GSM and GPS
IRJET-  	  Women Security System using GSM and GPSIRJET-  	  Women Security System using GSM and GPS
IRJET- Women Security System using GSM and GPSIRJET Journal
 
IRJET- Intelligent Security System for Women by using Arduino
IRJET- Intelligent Security System for Women by using ArduinoIRJET- Intelligent Security System for Women by using Arduino
IRJET- Intelligent Security System for Women by using ArduinoIRJET Journal
 
IRJET- Border Security using Computer Vision
IRJET- Border Security using Computer VisionIRJET- Border Security using Computer Vision
IRJET- Border Security using Computer VisionIRJET Journal
 
Women safety device with gps tracking and alerts
Women safety device with gps tracking  and alertsWomen safety device with gps tracking  and alerts
Women safety device with gps tracking and alertsPraween Lakra
 
IRJET- Iot Based Home Visitor Monitoring System using Raspberry Pi
IRJET-  	  Iot Based Home Visitor Monitoring System using Raspberry PiIRJET-  	  Iot Based Home Visitor Monitoring System using Raspberry Pi
IRJET- Iot Based Home Visitor Monitoring System using Raspberry PiIRJET Journal
 
Application for Women Safety
Application for Women SafetyApplication for Women Safety
Application for Women Safetyiosrjce
 
Gesture Human-Machine Interface (GHMI) in Home Automation
Gesture Human-Machine Interface (GHMI) in Home AutomationGesture Human-Machine Interface (GHMI) in Home Automation
Gesture Human-Machine Interface (GHMI) in Home AutomationIRJET Journal
 
1. 10077 12326-1-pb
1. 10077 12326-1-pb1. 10077 12326-1-pb
1. 10077 12326-1-pbIAESIJEECS
 
IRJET- Secured Perimeter using Voice Recognition and Location Tracking Sy...
IRJET-  	  Secured Perimeter using Voice Recognition and Location Tracking Sy...IRJET-  	  Secured Perimeter using Voice Recognition and Location Tracking Sy...
IRJET- Secured Perimeter using Voice Recognition and Location Tracking Sy...IRJET Journal
 
IRJET - Women’s Safety System using IoT
IRJET -  	  Women’s Safety System using IoTIRJET -  	  Women’s Safety System using IoT
IRJET - Women’s Safety System using IoTIRJET Journal
 
IRJET - Drowsiness Detection System using ML & IP
IRJET - Drowsiness Detection System using ML & IPIRJET - Drowsiness Detection System using ML & IP
IRJET - Drowsiness Detection System using ML & IPIRJET Journal
 
IRJET - Woman Safety Device using Arduino, GPS and GSM Module
IRJET - Woman Safety Device using Arduino, GPS and GSM ModuleIRJET - Woman Safety Device using Arduino, GPS and GSM Module
IRJET - Woman Safety Device using Arduino, GPS and GSM ModuleIRJET Journal
 
Secured Spy for Highly Secured Areas
Secured Spy for Highly Secured AreasSecured Spy for Highly Secured Areas
Secured Spy for Highly Secured AreasIRJET Journal
 
PROMINENT NAVIGATION FOR VISUALLY IMPAIRED PEOPLE
PROMINENT NAVIGATION FOR VISUALLY IMPAIRED PEOPLEPROMINENT NAVIGATION FOR VISUALLY IMPAIRED PEOPLE
PROMINENT NAVIGATION FOR VISUALLY IMPAIRED PEOPLEIAEME Publication
 
137.gsm, fprs ,keypad_based_atm_security_(doc)
137.gsm, fprs ,keypad_based_atm_security_(doc)137.gsm, fprs ,keypad_based_atm_security_(doc)
137.gsm, fprs ,keypad_based_atm_security_(doc)Karteek Irukulla
 
IRJET- Hand Gesture based Camera Monitorning System using Raspberry Pi
IRJET- Hand Gesture based Camera Monitorning System using Raspberry PiIRJET- Hand Gesture based Camera Monitorning System using Raspberry Pi
IRJET- Hand Gesture based Camera Monitorning System using Raspberry PiIRJET Journal
 
IRJET- Motion Activated Security System
IRJET-  	  Motion Activated Security SystemIRJET-  	  Motion Activated Security System
IRJET- Motion Activated Security SystemIRJET Journal
 

What's hot (20)

IRJET- Women Security System using GSM and GPS
IRJET-  	  Women Security System using GSM and GPSIRJET-  	  Women Security System using GSM and GPS
IRJET- Women Security System using GSM and GPS
 
IRJET- Intelligent Security System for Women by using Arduino
IRJET- Intelligent Security System for Women by using ArduinoIRJET- Intelligent Security System for Women by using Arduino
IRJET- Intelligent Security System for Women by using Arduino
 
IRJET- Border Security using Computer Vision
IRJET- Border Security using Computer VisionIRJET- Border Security using Computer Vision
IRJET- Border Security using Computer Vision
 
Women safety device with gps tracking and alerts
Women safety device with gps tracking  and alertsWomen safety device with gps tracking  and alerts
Women safety device with gps tracking and alerts
 
IRJET- Iot Based Home Visitor Monitoring System using Raspberry Pi
IRJET-  	  Iot Based Home Visitor Monitoring System using Raspberry PiIRJET-  	  Iot Based Home Visitor Monitoring System using Raspberry Pi
IRJET- Iot Based Home Visitor Monitoring System using Raspberry Pi
 
Application for Women Safety
Application for Women SafetyApplication for Women Safety
Application for Women Safety
 
Gesture Human-Machine Interface (GHMI) in Home Automation
Gesture Human-Machine Interface (GHMI) in Home AutomationGesture Human-Machine Interface (GHMI) in Home Automation
Gesture Human-Machine Interface (GHMI) in Home Automation
 
1. 10077 12326-1-pb
1. 10077 12326-1-pb1. 10077 12326-1-pb
1. 10077 12326-1-pb
 
women security on IOT
women security on IOTwomen security on IOT
women security on IOT
 
IRJET- Secured Perimeter using Voice Recognition and Location Tracking Sy...
IRJET-  	  Secured Perimeter using Voice Recognition and Location Tracking Sy...IRJET-  	  Secured Perimeter using Voice Recognition and Location Tracking Sy...
IRJET- Secured Perimeter using Voice Recognition and Location Tracking Sy...
 
IRJET - Women’s Safety System using IoT
IRJET -  	  Women’s Safety System using IoTIRJET -  	  Women’s Safety System using IoT
IRJET - Women’s Safety System using IoT
 
ATM (1)
ATM (1)ATM (1)
ATM (1)
 
IRJET - Drowsiness Detection System using ML & IP
IRJET - Drowsiness Detection System using ML & IPIRJET - Drowsiness Detection System using ML & IP
IRJET - Drowsiness Detection System using ML & IP
 
IRJET - Woman Safety Device using Arduino, GPS and GSM Module
IRJET - Woman Safety Device using Arduino, GPS and GSM ModuleIRJET - Woman Safety Device using Arduino, GPS and GSM Module
IRJET - Woman Safety Device using Arduino, GPS and GSM Module
 
Secured Spy for Highly Secured Areas
Secured Spy for Highly Secured AreasSecured Spy for Highly Secured Areas
Secured Spy for Highly Secured Areas
 
Vehicle security system final report
Vehicle security system final reportVehicle security system final report
Vehicle security system final report
 
PROMINENT NAVIGATION FOR VISUALLY IMPAIRED PEOPLE
PROMINENT NAVIGATION FOR VISUALLY IMPAIRED PEOPLEPROMINENT NAVIGATION FOR VISUALLY IMPAIRED PEOPLE
PROMINENT NAVIGATION FOR VISUALLY IMPAIRED PEOPLE
 
137.gsm, fprs ,keypad_based_atm_security_(doc)
137.gsm, fprs ,keypad_based_atm_security_(doc)137.gsm, fprs ,keypad_based_atm_security_(doc)
137.gsm, fprs ,keypad_based_atm_security_(doc)
 
IRJET- Hand Gesture based Camera Monitorning System using Raspberry Pi
IRJET- Hand Gesture based Camera Monitorning System using Raspberry PiIRJET- Hand Gesture based Camera Monitorning System using Raspberry Pi
IRJET- Hand Gesture based Camera Monitorning System using Raspberry Pi
 
IRJET- Motion Activated Security System
IRJET-  	  Motion Activated Security SystemIRJET-  	  Motion Activated Security System
IRJET- Motion Activated Security System
 

Similar to IRJET- TOUCH ME NOT-A Women Safety Device

IRJET - Ensuring Women Safety by Offline Tracking
IRJET -  	  Ensuring Women Safety by Offline TrackingIRJET -  	  Ensuring Women Safety by Offline Tracking
IRJET - Ensuring Women Safety by Offline TrackingIRJET Journal
 
IRJET - Women Safety Device with GPS Tracking and Alerts
IRJET -  	  Women Safety Device with GPS Tracking and AlertsIRJET -  	  Women Safety Device with GPS Tracking and Alerts
IRJET - Women Safety Device with GPS Tracking and AlertsIRJET Journal
 
Tracking And Security System for Women’s using GPS & GSM
Tracking And Security System for Women’s using GPS & GSMTracking And Security System for Women’s using GPS & GSM
Tracking And Security System for Women’s using GPS & GSMIRJET Journal
 
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoTIRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoTIRJET Journal
 
Raspberry Pi Based Surveillance Robot for Home Security
Raspberry Pi Based Surveillance Robot for Home SecurityRaspberry Pi Based Surveillance Robot for Home Security
Raspberry Pi Based Surveillance Robot for Home SecurityIRJET Journal
 
Smart ID for Blind People’s
Smart ID for Blind People’sSmart ID for Blind People’s
Smart ID for Blind People’sIRJET Journal
 
Cloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewCloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewIJSRD
 
Cloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewCloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewIJSRD
 
IRJET- Smart Protection Jacket for Women Safety
IRJET- Smart Protection Jacket for Women SafetyIRJET- Smart Protection Jacket for Women Safety
IRJET- Smart Protection Jacket for Women SafetyIRJET Journal
 
Home Security Systems using Camera and Android Application
Home Security Systems using Camera and Android ApplicationHome Security Systems using Camera and Android Application
Home Security Systems using Camera and Android ApplicationIRJET Journal
 
IRJET - Women’s Safety using IoT
IRJET - Women’s Safety using IoTIRJET - Women’s Safety using IoT
IRJET - Women’s Safety using IoTIRJET Journal
 
Emergency Tracking System for Women using Body Sensors Via Wrist Watches usin...
Emergency Tracking System for Women using Body Sensors Via Wrist Watches usin...Emergency Tracking System for Women using Body Sensors Via Wrist Watches usin...
Emergency Tracking System for Women using Body Sensors Via Wrist Watches usin...IRJET Journal
 
ADVANCE ATM SECURITY SYSTEM
ADVANCE ATM SECURITY SYSTEMADVANCE ATM SECURITY SYSTEM
ADVANCE ATM SECURITY SYSTEMIRJET Journal
 
IRJET- An Implementation and Efficient Way to Improve Women Safety Empowe...
IRJET-  	  An Implementation and Efficient Way to Improve Women Safety Empowe...IRJET-  	  An Implementation and Efficient Way to Improve Women Safety Empowe...
IRJET- An Implementation and Efficient Way to Improve Women Safety Empowe...IRJET Journal
 
IRJET-Automatic Vehicle Accident Detection and Messaging System using GSM and...
IRJET-Automatic Vehicle Accident Detection and Messaging System using GSM and...IRJET-Automatic Vehicle Accident Detection and Messaging System using GSM and...
IRJET-Automatic Vehicle Accident Detection and Messaging System using GSM and...IRJET Journal
 
IRJET- Implementation of Children Tracking System on Android Mobile Termi...
IRJET-  	  Implementation of Children Tracking System on Android Mobile Termi...IRJET-  	  Implementation of Children Tracking System on Android Mobile Termi...
IRJET- Implementation of Children Tracking System on Android Mobile Termi...IRJET Journal
 
Two Step Design for Personal Authentication Using Finger Vein Recognition and...
Two Step Design for Personal Authentication Using Finger Vein Recognition and...Two Step Design for Personal Authentication Using Finger Vein Recognition and...
Two Step Design for Personal Authentication Using Finger Vein Recognition and...IJTET Journal
 
IRJET- Advance ATM Security Solution
IRJET-  	  Advance ATM Security SolutionIRJET-  	  Advance ATM Security Solution
IRJET- Advance ATM Security SolutionIRJET Journal
 
IRJET- Vehicle Security System using IoT Application
IRJET-  	  Vehicle Security System using IoT ApplicationIRJET-  	  Vehicle Security System using IoT Application
IRJET- Vehicle Security System using IoT ApplicationIRJET Journal
 

Similar to IRJET- TOUCH ME NOT-A Women Safety Device (20)

IRJET - Ensuring Women Safety by Offline Tracking
IRJET -  	  Ensuring Women Safety by Offline TrackingIRJET -  	  Ensuring Women Safety by Offline Tracking
IRJET - Ensuring Women Safety by Offline Tracking
 
IRJET - Women Safety Device with GPS Tracking and Alerts
IRJET -  	  Women Safety Device with GPS Tracking and AlertsIRJET -  	  Women Safety Device with GPS Tracking and Alerts
IRJET - Women Safety Device with GPS Tracking and Alerts
 
Tracking And Security System for Women’s using GPS & GSM
Tracking And Security System for Women’s using GPS & GSMTracking And Security System for Women’s using GPS & GSM
Tracking And Security System for Women’s using GPS & GSM
 
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoTIRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
 
Raspberry Pi Based Surveillance Robot for Home Security
Raspberry Pi Based Surveillance Robot for Home SecurityRaspberry Pi Based Surveillance Robot for Home Security
Raspberry Pi Based Surveillance Robot for Home Security
 
Smart ID for Blind People’s
Smart ID for Blind People’sSmart ID for Blind People’s
Smart ID for Blind People’s
 
Cloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewCloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature Review
 
Cloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewCloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature Review
 
IRJET- Smart Protection Jacket for Women Safety
IRJET- Smart Protection Jacket for Women SafetyIRJET- Smart Protection Jacket for Women Safety
IRJET- Smart Protection Jacket for Women Safety
 
Home Security Systems using Camera and Android Application
Home Security Systems using Camera and Android ApplicationHome Security Systems using Camera and Android Application
Home Security Systems using Camera and Android Application
 
IRJET - Women’s Safety using IoT
IRJET - Women’s Safety using IoTIRJET - Women’s Safety using IoT
IRJET - Women’s Safety using IoT
 
Emergency Tracking System for Women using Body Sensors Via Wrist Watches usin...
Emergency Tracking System for Women using Body Sensors Via Wrist Watches usin...Emergency Tracking System for Women using Body Sensors Via Wrist Watches usin...
Emergency Tracking System for Women using Body Sensors Via Wrist Watches usin...
 
ADVANCE ATM SECURITY SYSTEM
ADVANCE ATM SECURITY SYSTEMADVANCE ATM SECURITY SYSTEM
ADVANCE ATM SECURITY SYSTEM
 
IRJET- An Implementation and Efficient Way to Improve Women Safety Empowe...
IRJET-  	  An Implementation and Efficient Way to Improve Women Safety Empowe...IRJET-  	  An Implementation and Efficient Way to Improve Women Safety Empowe...
IRJET- An Implementation and Efficient Way to Improve Women Safety Empowe...
 
IRJET-Automatic Vehicle Accident Detection and Messaging System using GSM and...
IRJET-Automatic Vehicle Accident Detection and Messaging System using GSM and...IRJET-Automatic Vehicle Accident Detection and Messaging System using GSM and...
IRJET-Automatic Vehicle Accident Detection and Messaging System using GSM and...
 
IRJET- Implementation of Children Tracking System on Android Mobile Termi...
IRJET-  	  Implementation of Children Tracking System on Android Mobile Termi...IRJET-  	  Implementation of Children Tracking System on Android Mobile Termi...
IRJET- Implementation of Children Tracking System on Android Mobile Termi...
 
Two Step Design for Personal Authentication Using Finger Vein Recognition and...
Two Step Design for Personal Authentication Using Finger Vein Recognition and...Two Step Design for Personal Authentication Using Finger Vein Recognition and...
Two Step Design for Personal Authentication Using Finger Vein Recognition and...
 
IRJET- Advance ATM Security Solution
IRJET-  	  Advance ATM Security SolutionIRJET-  	  Advance ATM Security Solution
IRJET- Advance ATM Security Solution
 
FYP2016_NZ1504S
FYP2016_NZ1504SFYP2016_NZ1504S
FYP2016_NZ1504S
 
IRJET- Vehicle Security System using IoT Application
IRJET-  	  Vehicle Security System using IoT ApplicationIRJET-  	  Vehicle Security System using IoT Application
IRJET- Vehicle Security System using IoT Application
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...drmkjayanthikannan
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxSCMS School of Architecture
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxMustafa Ahmed
 
Introduction to Geographic Information Systems
Introduction to Geographic Information SystemsIntroduction to Geographic Information Systems
Introduction to Geographic Information SystemsAnge Felix NSANZIYERA
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdfKamal Acharya
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiessarkmank1
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...josephjonse
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"mphochane1998
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesRashidFaridChishti
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxpritamlangde
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...ppkakm
 
Post office management system project ..pdf
Post office management system project ..pdfPost office management system project ..pdf
Post office management system project ..pdfKamal Acharya
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementDr. Deepak Mudgal
 
Path loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata ModelPath loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata ModelDrAjayKumarYadav4
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARKOUSTAV SARKAR
 

Recently uploaded (20)

Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptx
 
Introduction to Geographic Information Systems
Introduction to Geographic Information SystemsIntroduction to Geographic Information Systems
Introduction to Geographic Information Systems
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...
 
Post office management system project ..pdf
Post office management system project ..pdfPost office management system project ..pdf
Post office management system project ..pdf
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth Reinforcement
 
Path loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata ModelPath loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata Model
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 

IRJET- TOUCH ME NOT-A Women Safety Device

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1055 TOUCH ME NOT-A Women Safety Device Jismi Thomas1, Maneesha K J2, Nambissan Shruthi Vijayan3, Prof. Divya R4. 1,2,3 Student, Dept. of Computer science Engineering, SCET College, Kerala, India 4Professor, Dept. of Computer science Engineering, SCET College, Kerala, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - : Women security is a major issue of concern in today’s world. Women are subjected to unethical physical harassment. Women safety methods such as various mobile apps have been tried and implemented, but the need of the time is that they need is a device that can be carried everywhere easily. Here we present Touch Me Not, an idea to design one such device which can be attached to the clothing. It will be a button which will be attachable to the clothing. This button will be connected to the system which has two modules, one which can be used when someone makes some sort of unethical movement and the other one which can be used when you sense danger. The first module can be used just to record that is making a short video to capture the assailant, while the second one can be used during times of danger to send your location to family or friends as well as it alerts the nearest police station, such that help can reach as soon as possible. The tools that we will be using include micro- controllers, GSM and GPS modules for the hardware section, python for the software section. Key Words: Ardino programming, GSM module, GPS Module, SD Module 1. INTRODUCTION The purpose of this project is to design an easy and portable device for women safety. Here we are mainly focusing on designing a prototype in which the device can be easily carried around. Women security is a major issue of concern in today’sworld. Women are subjected to unethicalphysical harassment. Women safety methods such as various mobile apps have been tried and implemented, but the need of the time is that they need is a device that can be carried everywhere easily. Touch Me Not, an idea to design one such device which can be attached to the clothing. It will be a button which will be attachable to the clothing. This button will be connected to the system which hastwo modules, one which can be used when someone makes some sort of unethical movement and the other one which can be used when you sense danger. The first module can be used just to record that is making a short video to capture the assailant, while the second one can be used during times of danger to send your location to family or friends as well as it alerts then nearest police station, such that help can reach as soon as possible. The idea to develop a smart device for women is that it’s completely comfortable and easy to use as compared with already existing women security solutionssuchasaseparate garment, bulky belts and in famous mobile apps thatarejust very abstract and obsolete. If a woman is subjected toattack by an adversary, then a switch has to be pressed by her, manually, (which will be ideally located at a convenient location on the body), which in turn will trigger the micro- controller to activate the on body GPS Tracker and simultaneously capture the image/video of the attacker,and transmit it via an RF module to another section where it will be stored. Here we are attempting to make to develop a method by which this image can be transferred on a web server, ideally on the police server. Next, the Global Positioning System (GPS) receiver will acquire the location co-ordinates of the woman subjected to attack, and will send these to the pre-decided cell phone numbers (typically the family and the police), via GSM module. 1.1 Existing System Having the concern of women in mindmanydevelopershave come up are: Codes like *91# is used to provide emergency services, which will alert police control. Free mobile application 'Help me on mobile' to ensure safety of women was launched to assist those who need emergency .These applications need a single click to do this task. But when a girl is in trouble, there can be times that the girl is not capable of taking the phone and pressing button. SHE (Society Harnessing Equipment): It is a garment embedded with an electronic device which givesout3800kV electric shock to the assailants helping the victim to escape. Smart Belt: This system is designed with a portable device which resemblesa normal belt. It consists of Arduino board, screaming alarm and pressure sensors. Watch Over Me an application which turns phone into a personal safety device. It monitorsthe journeyandalertsthe contacts it the user has not reached the destination within scheduled time. In the instance of attack the user has to shake the phone to trigger alarm. Witness: Using Witness, users can broadcast their location, audio, and video to loved ones in just one touch. It will call and text emergency contacts as well as broadcast live video, audio, and your location. iOS. The above mentionedarejusta few examples of safety and security devices implemented. 1.2 Proposed System Touch Me Not is a security device in a button form. The button which can be attached to the clothing and when pressed it performs the action of alerting contacts including the selected family member or friend as well as the police. The device enabled with the GPS system will be able to send
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1056 the location to the contacts. The device will be enabled with camera which will capture images and videos based on the users trigger and these images will also be sent to the contacts. The figures below show block diagram representation of the system to be implemented. Figure1: Design of the System Here the figure 1.2.1 represents the block diagram of location tracking module. Here the trigger will be button press which will activate the GSM module to send the location which is tracked by GPS to the selected phone numbers. The following steps briefly define the working of the device as shown in the figure 3.2: 1. The system is turned ON when switch is pressed in instances of attack, manually by the woman. 2. This switch triggersa microcontroller thatactivatesanon- body alarm. 3. The microcontroller triggersthe on-body camera andGPS module to capture the image and get the location respectively. 4. Images are stored in a micro SD card as a proof for legal actions. 5. Hand-held controller when triggered, receiveslocationco- ordinates from the GPS receiver and transmits these in the form of an SMS to the pre- decided phone number. 2. DESIGN AND DEVELOPMENT MODULE DESIGN This system functions with 4 different modules. They are 1. GPRS MODULE (Location Tracking Module) 2. Image capturing and storing 3. GSM Module (Sending module) 4. Alarm 2.1 GSM and GPRS Module Figure2: GSM/GPS/GPRS Module Figure3: Camera OV7670 Figure4: Alarm Module MODULE DESRIPTION The system we have presented here has mainly four parts. They are 1. Location Tracking (GPS module) 2. Image capturing and storing 3. Storing and sending (GSM module) 4. Alarm The first step is location tracking. The location tracking system is an important part of this project since it makes sure that help is on the way for the victim. Hence, it is required to be faster and efficient. Location tracking intends to update the location of the victim continuously to either the police or the family of the victim. The programming is such that the latitude and longitude of the victimis reported at multiple instances and at different times. The most convenient form to inform about location is a Short Message Service (SMS) as cell phones are widely used. The location tracking subsystem starts working on the triggerbytheuser. On parsing the correct reading, the micro-controller commands the Global System for Mobile (GSM) module to transmit the data through an SMS by using AT commands. A GSM digitizes and reduces the data, then sends it down through a channel with two different streams of client data, each in itsown particular time slot. The digital system hasan ability to carry 64 k bps to 120 Mbps of data rates.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1057 Image is acquired from a high definition button-spy camera that is of button size attached to cloth. It captures images at trigger i.e. button press by the user. These captured image are then store to SD card and saved for future use. The alarm module is secondary module which will be triggered with two button press. Initially at the first trigger only the location will be sent. If the user feels threatened or needs emergency assistance, then all that has to be done is simply activate this alarm. It will catch the attention of others for immediate help. The alarm will sound for three minutesand then cease. Especially useful for women while traveling alone as it is small enough to pocket or carry in a hand bag. 2.1. HARDWARE SPECIFICATIONS The components used for this system are: (A) Ardino Arduino is an open source computer hardware andsoftware company, project, and user community that designs and manufactures single-board microcontrollers and microcontroller kits for building digital devices and interactive objects that can sense and control objects in the physical world. The project's products are distributed as open-source hardware and software, which are licensed under the GNU Lesser General Public License (LGPL) or the GNU General Public License (GPL), permitting the manufacture of Arduino boardsand softwaredistributionby anyone. Arduino boards are available commercially in preassembled form, or as do-it-yourself (DIY) kits. Arduino boarddesigns use a variety of microprocessorsand controllers. The boardsare equipped with sets of digitaland analogue input/output (I/O) pins that may be interfaced to various expansion boards (shields) and other circuits. The boards feature serial communications interfaces, including Universal Serial Bus (USB) on some models, which are also used for loading programs from personal computers. The microcontrollers are typically programmed using a dialect of features from the programming languages C and C++. In addition to using traditional compiler toolchains, the Arduino (IDE) based on the Processing language project. (B) SIM908 GPS & GSM/GPRS Quad Band Serial Modem SIM908 module is a completeQuad-BandGSM/GPRSmodule which combines GPS technology for satellite navigation.The compact design which integrated GPRS and GPS in a SMT package will significantly save both timeandcosts.Featuring an industry-standard interface and GPS function, it allows variable assets to be tracked seamlessly at any location and anytime with signal coverage. It includes GSM Antenna and GPS Antenna. Features: Dual SMA Antenna Connector for GSM and GPS, Dual Serial Port for GSM and GPS GSM standard AT Commands, GPS NMEA Protocol, Network and Ring LED , Rugged Simcard Holder. Features of GSM Module:  Improved spectrum efficiency  International roaming  Compatibility with integrated services digital network (ISDN)  Support for new services.  SIM phonebook management  Fixed dialing number (FDN)  Real time clock with alarm management  High-quality speech  Uses encryption to make phone calls more secure  Short message service (SMS) The security strategies standardized for the GSM system make it the most secure telecommunications standard currently accessible. Although the confidentiality of a call and secrecy of the GSM subscriber is just ensured on the radio channel, this is a major step in achieving end-to- end security. A GSM modem can also be a standard GSM mobile phone with the appropriate cable and software driver to connect to a serial port or USB port on your computer. A GPS device can retrieve from the GPS system location and time information in all weather conditions, anywhere on or near the Earth. A GPS reception requires an unobstructed line of sight to four or more GPS satellites, and is subject to poor satellite signal conditions. In exceptionally poor signal conditions, for example in urban areas, satellite signals may exhibit multipath propagation where signals bounce off structures, or are weakened by meteorological conditions. (C) Button Spy Camera A hidden camera or spy camera or security camera is a still or video camera used to record people without their knowledge. The camera is "hidden" because it is either not visible to the subject being filmed, or is disguised as another object. Hidden cameras can be built into commonly used objects such astelevision sets, smokedetectors, clock radios, motion detectors, ball caps, plants, and mobile phones. The OV7670/OV7171 CAMERACHIPTM is a low voltage CMOS image sensor that provides the full functionality of a single- chip VGA camera and image processor in a small footprint package. The OV7670/OV7171 provides full-frame, sub- sampled or windowed 8-bit images in a wide range of formats, controlled through the Serial Camera Control Bus (SCCB) interface. This product has an image array capable of operating at up to 30 frames per second (fps) in VGA with complete user control over image quality, formatting and outputdata transfer. All requiredimageprocessingfunctions, including exposure control, gamma, white balance, color saturation, hue control and more, are also programmable through the SCCB interface. In addition, OmniVision CAMERACHIPsuse proprietarysensortechnologytoimprove image quality by reducing or eliminating common lighting/electrical sources of image contamination, such as fixed pattern noise (FPN), smearing, blooming, etc., to produce a clean, fully stable color image.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1058 2.1. SOFTWARE SPECIFICATIONS (A)Python Python is a widely used high-level programming language for general-purpose programming, created by Guido van Rossum and first released in 1991. A interpreted language, Python has a design philosophy that emphasizes cod readability (notably using white-spaceindentationtodelimit code blocks rather than curly brackets or keywords), and a syntax that allows programmers to express concepts in fewer lines of code than might be used in languages such as C++ or Java. The language provides constructs intended to enable writing clear programs on both a small and large scale. Python features a dynamic type system and automatic memory management and supports multiple programming paradigms, includingobject-oriented, imperative,functional programming, and procedural styles. It has a large and comprehensive standard library. Python interpreters are available for many operating systems, allowing Python code to run on a wide variety of systems. Python, the reference implementation of Python, is open source softwareandhasa community-based development model, asdo nearly all ofits variant implementations. C Python is managed by the non- profit Python Software Foundation. The imagesstoredinthe SD card are in bmp format. These images can be read using python programming. (B) Arduino Programming For the location tracking system using Arduino,thesoftware approach is given in figure below. The software used is the Arduino Integrated Development Environment (IDE) which provides a smooth platform for programming the microcontroller and the programming sequence is shownin figure The delays are included in order to allow the respective modules to initialize and synchronize with the networks. 3. CONCLUSIONS Touch Me Not (A Woman Security Device)hasbeendesigned keeping in mind the increasing violence againstwomen.This system is designed to help women in distress situations to call for help as well as alert the surrounding people. It has been developed as an idea to make the security device more portable and comfortable. This system was designed after reference to already implemented system. Here measures are being made to overcome the flaws in previous designs and also to reduce the power consumption. The following are the results obtained. Figure 3.1: GPS receiver data. Figure 3.2: Message received showing location. Figure 3.3: Camera Module output
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1059 ACKNOWLEDGEMENT We would like to express our immense gratitude and profound thanks to all those who helped us to make this project a great success. At the very outset we express our thanks to the Almighty God for all the blessings endowed on us. We express our thanks to our Executive Director Msgr.Rev.Fr. Dr. Lazer Kuttikadan, Director Rev. Fr. Dr.Jose Kannampuzha, Joint Director Dr. Sudha George Valavi and Principal Dr. Nixon Kuruvila for providing us with such a great opportunity. We can hardly find words to express our deep appreciation for the help and warm encouragement that we have received from Mr.Krishnadas J, head of the department, Sahrdaya College of Engineering and Technology, our project guide Ms. Divya R Assistant professor, Sahrdaya College of Engineering and Technology and also our project coordinators Mr. Willson Joseph C Assistant professor, Sahrdaya College of Engineering and Technology and Ms. Roshni R Menon Assistant professor, Sahrdaya College of Engineering and Technology because without their sacrificial help we couldn't have dreamt of completing this project successfully. We would also extend our deep sense of gratitude to all other faculties for their help and advice throughout the advancement of this project. We are extremely thankful to our parents and friends for being with as a constant source of inspiration. REFERENCES [1] Vanshaj Sikri, Tushar Kundra “GSM enabled Wristwatch to send Distress Message consisting Location Co-ordinates obtained Using Cell TowerTriangulation” in 2015 International Conference on Man and Machine Interfacing (MAMI), 978-1-5090-0225-2/15/2015 IEEE. [2] G C Harikiran, Karthik Menasinkai, Suhas Shirol, “Smart Security Solution forWomenbasedonInternet Of Things(IOT)”, in “International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT) - 2016”,978-1-4673-9939-5/16/2016IEEE [3] Madhura Mahajan1,KTV Reddy2,Manita Rajput “Design and Implementation of a Rescue System for Safety of Women” in “IEEE WiSPNET 2016 conference” . [4] Nandita Viswanath, Naga Vaishnavi Pakyala,Dr. G. Muneeswari “Smart Foot Device forWomenSafety”in IEEE Region 10 Symposium(TENSYMP), Bali,indonesia,2016 [5] W. El-Medany, A. Al-Omary, R. Al-Hakim, S. Al- Irhayim and M. Nusaif, “A Cost Effective Real-Time Tracking System Prototype Using Integrated GPS/GPRS Module,” in 6th International Conference on Wireless and Mobile Communications, Valencia, 2010, pp.521-525. BIOGRAPHIES Maneesha K J , Final Year Student, Sahrdaya College of Engineering and Technology, Kerala, India. Shruthi Nambissan Final Year Student, Sahrdaya College of Engineering and Technology, Kerala, India. Jismi Thomas Final Year Student, Sahrdaya College of Engineering and Technology, Kerala, India. Divya R, Assistant Professor, Sahrdaya College of Engineering and Technology, Kerala, India.