SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1209
Women Safety Application
Tandra Debnath, Dr Kamalraj R
Student, MCA Department, Jain University, Bangalore, India
Assistant Professor, MCA Department, Jain University, Bangalore, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Security for women has turned into a significant issue as the quantity of violations over women and young girls
expanding step by step. This paper depicts about females wellbeing and their security by utilizing electronic gadget to both
distinguish The issue and sending alerts. This paper proposes another viewpoint to utilize innovation to safeguard women. we
utilize an android based advanced mobile phone withacoordinatedcomponentthatcautionandgiveareabasedInformation. This
Document depict GPS and GSM based "women Security System "that gives the blend of GPS gadgets as-well-as give cautions and
message. At the point when someone is in a tough situation They Only need to shake the phone ,after that a message alert is
shipped off to the Register Contact rundown and a days a message "I'm In TROUBLE PLEASE HELP ME" Now daily security of
women is turning out to be extremely poor, but with the assistance of this Application The undertaking was improvement. In
Android Which Graphical User Interface it give the degree of unwavering quality, accessibility and similarity .All these make
Android a suitable language for this project since Android language depends on JAVA language.
Key Words: Women Security, Smart Phone, Android, Registered Contacts, GPS location.
1. INTRODUCTION
Ladies are achieved at preparing assorted bunches for regular causes. They frequently work acrossracial,hallowed,stubborn,
and scholarly partitions to empower peacefulness. We know aboutsignificanceofladies'security,however weshouldperceive
that they ought to be very much gotten. A Lady isn't a lot of strong when contrasted with men actually, experiencing the same
thing and necessities some assistance to assuage them. The most ideal way to limit chances in turningintoa survivorofsavage
wrongdoing (burglary, rape, assault, aggressive behavior at home) is to recognize and approach assets to helpyou outofrisky
circumstances. Whether you are in moment inconvenience or got isolated from companions during night and don't have the
foggiest idea how to return home, having these applications on your telephone can decrease yourgambleandbringhelpwhen
you require it.
In the illumination of late shock in Delhi which shook the country and woke us to the wellbeing issues for our girls, public are
equipping playful in various ways to retaliate. A multitude of new applications have been created to give security frameworks
to ladies on their phones. Here, we present an android application that guarantees the wellbeing of ladies. It decreases the
gamble and helps us deprived by distinguishing the area of individual who is at serious risk.
1.1 LITERATURE REVIEW
Koss et al. [1] concentrated on the adjustment of the memory example of genuinely mishandled ladies. A review was directed
on ladies working in clinical trots and colleges, and so on. Results demonstrated that after the provocation, the casualty
memory is impacted: "lucidity" and "sharpness". Creators depicted that post-provocation,actual sideeffectsandmental strain
are high. Mezey [2] distributed a paper on treating component for provocation casualty. Mental post-badgering impact
incorporates wretchedness, nervousness, and sexual brokenness. Consequently, the point of the creator is to recuperate the
soundness of the casualty to the ordinary condition. The creators finish up saying that emotional wellness expert can know
about the historical backdrop of past actual maltreatment and jabbering. Sudderth's [3] study depends on subjective
investigation of interview with 30 assault survivors, who had been bothered by men. The centre of this study is that the
casualty individuals are really feeling pessimistic while talking about their unpleasant minutes that they looked in badgering.
They feel reluctant to impart their experience to other people. Loads of overviews say that a casualty individual, particularly
more youthful casualties, doesn't go and objection in police headquarters. Indeed, even they don't feel greatwhensharestheir
experience till extensive time. A definitive motivation behind this examination is "recuperation process". Deceiving survivors
abstain from uncovering actuating feeling associated with provocation. Casualty individuals wonder whether or not to share
their experience as a result of disgrace joined to being a badgering casualty. The goal oftheexaminationby ShipherdandGayle
Beck[4] is to defeated post-horrible pressure issue in light of badgering. The review report says that individualsbecomemore
restless, discouraged, and troubled all through. They can't dispose of provocation related considerations. This reviewbyBrad
Passage (2000) says that individuals who had encountered kid misuse are more discouraged liquor misuse and dating
pressure. In the study by Campbell et al. [5], 102 provocation survivors wereevaluatedaboutfriendlyresponseandlovedones
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1210
support post-badgering. The help from society and companions are unimportant. Ratherthangivingconsiderationandhelpin
regards to genuinely and intellectually, they (society and companions) leadthemintohopelessnessbygiving negativeprotests
and accusing. The study presumes that the help from society as well as the companionandfamilydidn'tsufficient. Theprimary
motivation behind Schewe (2002) review is creating cocurricular from Middleware School to secondary school. Wasco [6]
featured the restriction of injury reaction and utilizations of post-horrible pressure in individuals who are annoyed. The
concentrate by Sochting [7] implemented to give badgering avoidance projects to young ladies. The vast majority oftheNorth
American Colleges give need to change ladies mentality, by instructing them about provocation counteraction methods.
2. IMPLEMENTATION
The absolute assessment should be possible in three significant advances which are portrayed independently. Assessment
portrays the entire working of the application in three significant stages.
The main significant advance is to enter the contact subtleties in the application made. Those contacts can be our family
members, companions and boss cop of the specific city the individual we live in. Whenever the application is introducedinthe
PDA interestingly the above contact subtleties ought to be given. The application will save the given data.
The subsequent significant advance is to send the GPS data (GPS data can be as the Co-ordinatesortheURLwhichpromptsthe
area of the individual any stock guide application in any semblance of outsider application like Google, Nokia and so on)tothe
enrolled contacts at peril times or when the individual is required to have been saved. This progression is followed just when
the salvage button is squeezed in application. The entire course of this progression is done just when the gadget is associated
with the legitimate versatile organization and area administration in the gadget is turned on (GPS).
The third significant advance involves work done in sending the message containing area URL ceaselessly to the enlisted
contacts. Here, we have established the point in time stretch as 5minutes, so for at regular intervals of time-pass, SMS is
shipped off the enlisted contacts. In this manner the specific area of the individual can be followed by the application
ceaselessly which is the essential point of the proposed framework and the individual can be helped.
2.1 Uniqueness
In the current frameworks, we have referenced numerous Android applications having comparable component to my
application. In that large number of uses, casualty's area is sent just a single time to the enlisted contacts in various structures
like SMS, However in circumstances, the casualty may not be kept at one spot standing, she might move around. Thus, in that
multitude of uses, we can know just a single area following the beginning of the application, yet for all intents and purposes
after at some point she may not be available at that spot. The one of a kind element of myapplicationisarea issentconsistently
for each five minutes. So, regardless of whether the lady is made to move around in the city, as a result of this element of
constant area following, she can be safeguarded rapidly and securely. Likewise, one of the contactswill geta call,insome cases
there might be opportunity for individuals not seeing the SMS, but rather in the wake of getting the call they get ready and can
take a gander at the SMS and can distinguish that their almost ones is in peril rapidly.
Fig -1: Screenshort of the app
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1211
2.2 PROPOSED SYSTEM:
To develop a system for android users for keeping track through several applications. This application uses GPS for
identifying the location of the person in trouble and the system can be divided into two modules:
1. First module can be the victim’s phone i.e. the root device which uses 3G/2G data connection for trackingthelocation
of the victim through GPS.
2. Second module can be the mobile phone of registered contacts either police or friends or family members which
receives the message containing URL of location of victim that is sent from the root device.
Fig -2: Block Diagram
3. CONCLUSION
We are carrying out the Women Safety in android framework by the utilizing GPS Location android with Mobile. Already we
are Facing such countless issues to track down the area of the client or ladies. So that here is the application which will assist
with tracking down the specific area of the individual alongside theirscopeandlongitude.Inthismannerfindingtheindividual
when there is a crisis is more straightforward with this application.
REFERENCES
1. VaijayantiPawar,Prof.N.R.Wankhade, DipikaNikam, KanchanJadhav and NehaPathak, "SCIWARS Android App for Women
Safety" in VaijayantiPawar Int. Journal of Engineering Research and Applications, vol. 4, no. 3, pp. 823826, March 2014.
2. Robi Grgurina, Brestovac and Tihana Galinac Grbac, "Development EnvironmentforAndroidApplicationDevelopment:An
Experience Report" in MIPRO 2011, Opatija, Croatia, pp. 23-27, May 2011.
3. "FIGHTBACK", Android App developed by Canvas M Technologies, June 2013.
4. "SECUREMEBETA", Android App developed by Think MPI Consulting Private Limited, September 2014.
5. "VANITHAALERT", ABC Mobile Learning Communication, January 2014.
6. "RAKSHA - WOMEN SAFETY ALERT", BharathSewa.com, March 2014.
7. "GLYMPSE- SHARE GPS LOCATION", Android App Developed by Glympse Corp., January2015,http://www.glympse.com/.
8. "GUARDLY", Android App Developed by Guardly Corp., January 2014.
9. "STREET SAFE", Android App Developed by People Guard LLC, September 2013, Available:
https://jezebel.com/5895916/the-street-safety-appfor-proactive-and-paranoid-woman.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1212
10. Munesh Chandra DIT,School of Engg.,Vikrant Gupta R.K.G.I.T.,Santhosh Kr.Paul,R.K.G.I.T.”A Statistical approach for
Automatic Text Summarization by Extraction”, International Conference on Communication Systems and Network
Technologies , IEEE 2011
11. Samadhan R.Manore,Computer Science Department, Shivaji University.”Email DocumentsSummarizationUsing Statistical
Approach “.International Advance Computing Conference (LACC 2009),IEEE 2009
12. “Fight back”Android App Developed By Canvas M Technologies,26 June 2013,
http://www.fightbackmobile.com/welcome
13. “Guardly “Android App Developed By Guardlycorp.,28January2014, https://www.guardly.com/
14. “OnWatch “Android App Developed By On Watch,10November2012 ”https://play.google.com/store/apps/details?id=c
om onwatch”
15. “Life360-Family Locator”Android App Developed By Life360,20 february 2014,”https://www.life360.com/family-
locator/”
16. “StreetSafe” Android App DevelopedBypeopleGuard LLC”,24 September 2013,http://streetsafe.com/static-products-
overview

More Related Content

Similar to Women Safety Application

A Comprehensive Study on Social Network Mental Disorders Detection
A Comprehensive Study on Social Network Mental Disorders DetectionA Comprehensive Study on Social Network Mental Disorders Detection
A Comprehensive Study on Social Network Mental Disorders Detection
ijtsrd
 
© 2017 Journal of the Practice of Cardiovascular Sciences Pu.docx
© 2017 Journal of the Practice of Cardiovascular Sciences  Pu.docx© 2017 Journal of the Practice of Cardiovascular Sciences  Pu.docx
© 2017 Journal of the Practice of Cardiovascular Sciences Pu.docx
gerardkortney
 

Similar to Women Safety Application (20)

6’APART – A STEP TO PREVENT COVID-19
6’APART – A STEP TO PREVENT COVID-196’APART – A STEP TO PREVENT COVID-19
6’APART – A STEP TO PREVENT COVID-19
 
6’APART – A STEP TO PREVENT COVID-19
6’APART – A STEP TO PREVENT COVID-196’APART – A STEP TO PREVENT COVID-19
6’APART – A STEP TO PREVENT COVID-19
 
IRJET- An Implementation and Efficient Way to Improve Women Safety Empowe...
IRJET-  	  An Implementation and Efficient Way to Improve Women Safety Empowe...IRJET-  	  An Implementation and Efficient Way to Improve Women Safety Empowe...
IRJET- An Implementation and Efficient Way to Improve Women Safety Empowe...
 
A Mobile Based Women Safety Application (I Safe Apps)
A Mobile Based Women Safety Application (I Safe Apps)A Mobile Based Women Safety Application (I Safe Apps)
A Mobile Based Women Safety Application (I Safe Apps)
 
F017112934
F017112934F017112934
F017112934
 
IRJET- Modern Era and Security of Women: An Intellectual Device
IRJET- Modern Era and Security of Women: An Intellectual DeviceIRJET- Modern Era and Security of Women: An Intellectual Device
IRJET- Modern Era and Security of Women: An Intellectual Device
 
IRJET- Modern Era and Security of Women: An Intellectual Device
IRJET- Modern Era and Security of Women: An Intellectual DeviceIRJET- Modern Era and Security of Women: An Intellectual Device
IRJET- Modern Era and Security of Women: An Intellectual Device
 
IRJET- IoT based Smart Foot Device for Women Safety
IRJET- IoT based Smart Foot Device for Women SafetyIRJET- IoT based Smart Foot Device for Women Safety
IRJET- IoT based Smart Foot Device for Women Safety
 
COVID-19 FACE MASK DETECTION
COVID-19 FACE MASK DETECTIONCOVID-19 FACE MASK DETECTION
COVID-19 FACE MASK DETECTION
 
Social Distancing Detection, Monitoring and Management Using OpenCV
Social Distancing Detection, Monitoring and Management Using OpenCVSocial Distancing Detection, Monitoring and Management Using OpenCV
Social Distancing Detection, Monitoring and Management Using OpenCV
 
204
204204
204
 
A Comprehensive Study on Social Network Mental Disorders Detection
A Comprehensive Study on Social Network Mental Disorders DetectionA Comprehensive Study on Social Network Mental Disorders Detection
A Comprehensive Study on Social Network Mental Disorders Detection
 
IRJET- Social Network Mental Disoreders Detection
IRJET- Social Network Mental Disoreders DetectionIRJET- Social Network Mental Disoreders Detection
IRJET- Social Network Mental Disoreders Detection
 
© 2017 Journal of the Practice of Cardiovascular Sciences Pu.docx
© 2017 Journal of the Practice of Cardiovascular Sciences  Pu.docx© 2017 Journal of the Practice of Cardiovascular Sciences  Pu.docx
© 2017 Journal of the Practice of Cardiovascular Sciences Pu.docx
 
ELECTRONIC JACKET FOR WOMEN SAFETY
ELECTRONIC JACKET FOR WOMEN SAFETYELECTRONIC JACKET FOR WOMEN SAFETY
ELECTRONIC JACKET FOR WOMEN SAFETY
 
Social media platform and Our right to privacy
Social media platform and Our right to privacySocial media platform and Our right to privacy
Social media platform and Our right to privacy
 
SMART SECURITY DEVICE FOR WOMEN USING IOT
SMART SECURITY DEVICE FOR WOMEN USING IOTSMART SECURITY DEVICE FOR WOMEN USING IOT
SMART SECURITY DEVICE FOR WOMEN USING IOT
 
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESAN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
 
An Improved Personal Security System
An Improved Personal Security SystemAn Improved Personal Security System
An Improved Personal Security System
 
IRJET- Cyber Bullying Detection in Web Chat Application
IRJET- Cyber Bullying Detection in Web Chat ApplicationIRJET- Cyber Bullying Detection in Web Chat Application
IRJET- Cyber Bullying Detection in Web Chat Application
 

More from IRJET Journal

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
pritamlangde
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 

Recently uploaded (20)

Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxElectromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptx
 
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 

Women Safety Application

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1209 Women Safety Application Tandra Debnath, Dr Kamalraj R Student, MCA Department, Jain University, Bangalore, India Assistant Professor, MCA Department, Jain University, Bangalore, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Security for women has turned into a significant issue as the quantity of violations over women and young girls expanding step by step. This paper depicts about females wellbeing and their security by utilizing electronic gadget to both distinguish The issue and sending alerts. This paper proposes another viewpoint to utilize innovation to safeguard women. we utilize an android based advanced mobile phone withacoordinatedcomponentthatcautionandgiveareabasedInformation. This Document depict GPS and GSM based "women Security System "that gives the blend of GPS gadgets as-well-as give cautions and message. At the point when someone is in a tough situation They Only need to shake the phone ,after that a message alert is shipped off to the Register Contact rundown and a days a message "I'm In TROUBLE PLEASE HELP ME" Now daily security of women is turning out to be extremely poor, but with the assistance of this Application The undertaking was improvement. In Android Which Graphical User Interface it give the degree of unwavering quality, accessibility and similarity .All these make Android a suitable language for this project since Android language depends on JAVA language. Key Words: Women Security, Smart Phone, Android, Registered Contacts, GPS location. 1. INTRODUCTION Ladies are achieved at preparing assorted bunches for regular causes. They frequently work acrossracial,hallowed,stubborn, and scholarly partitions to empower peacefulness. We know aboutsignificanceofladies'security,however weshouldperceive that they ought to be very much gotten. A Lady isn't a lot of strong when contrasted with men actually, experiencing the same thing and necessities some assistance to assuage them. The most ideal way to limit chances in turningintoa survivorofsavage wrongdoing (burglary, rape, assault, aggressive behavior at home) is to recognize and approach assets to helpyou outofrisky circumstances. Whether you are in moment inconvenience or got isolated from companions during night and don't have the foggiest idea how to return home, having these applications on your telephone can decrease yourgambleandbringhelpwhen you require it. In the illumination of late shock in Delhi which shook the country and woke us to the wellbeing issues for our girls, public are equipping playful in various ways to retaliate. A multitude of new applications have been created to give security frameworks to ladies on their phones. Here, we present an android application that guarantees the wellbeing of ladies. It decreases the gamble and helps us deprived by distinguishing the area of individual who is at serious risk. 1.1 LITERATURE REVIEW Koss et al. [1] concentrated on the adjustment of the memory example of genuinely mishandled ladies. A review was directed on ladies working in clinical trots and colleges, and so on. Results demonstrated that after the provocation, the casualty memory is impacted: "lucidity" and "sharpness". Creators depicted that post-provocation,actual sideeffectsandmental strain are high. Mezey [2] distributed a paper on treating component for provocation casualty. Mental post-badgering impact incorporates wretchedness, nervousness, and sexual brokenness. Consequently, the point of the creator is to recuperate the soundness of the casualty to the ordinary condition. The creators finish up saying that emotional wellness expert can know about the historical backdrop of past actual maltreatment and jabbering. Sudderth's [3] study depends on subjective investigation of interview with 30 assault survivors, who had been bothered by men. The centre of this study is that the casualty individuals are really feeling pessimistic while talking about their unpleasant minutes that they looked in badgering. They feel reluctant to impart their experience to other people. Loads of overviews say that a casualty individual, particularly more youthful casualties, doesn't go and objection in police headquarters. Indeed, even they don't feel greatwhensharestheir experience till extensive time. A definitive motivation behind this examination is "recuperation process". Deceiving survivors abstain from uncovering actuating feeling associated with provocation. Casualty individuals wonder whether or not to share their experience as a result of disgrace joined to being a badgering casualty. The goal oftheexaminationby ShipherdandGayle Beck[4] is to defeated post-horrible pressure issue in light of badgering. The review report says that individualsbecomemore restless, discouraged, and troubled all through. They can't dispose of provocation related considerations. This reviewbyBrad Passage (2000) says that individuals who had encountered kid misuse are more discouraged liquor misuse and dating pressure. In the study by Campbell et al. [5], 102 provocation survivors wereevaluatedaboutfriendlyresponseandlovedones
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1210 support post-badgering. The help from society and companions are unimportant. Ratherthangivingconsiderationandhelpin regards to genuinely and intellectually, they (society and companions) leadthemintohopelessnessbygiving negativeprotests and accusing. The study presumes that the help from society as well as the companionandfamilydidn'tsufficient. Theprimary motivation behind Schewe (2002) review is creating cocurricular from Middleware School to secondary school. Wasco [6] featured the restriction of injury reaction and utilizations of post-horrible pressure in individuals who are annoyed. The concentrate by Sochting [7] implemented to give badgering avoidance projects to young ladies. The vast majority oftheNorth American Colleges give need to change ladies mentality, by instructing them about provocation counteraction methods. 2. IMPLEMENTATION The absolute assessment should be possible in three significant advances which are portrayed independently. Assessment portrays the entire working of the application in three significant stages. The main significant advance is to enter the contact subtleties in the application made. Those contacts can be our family members, companions and boss cop of the specific city the individual we live in. Whenever the application is introducedinthe PDA interestingly the above contact subtleties ought to be given. The application will save the given data. The subsequent significant advance is to send the GPS data (GPS data can be as the Co-ordinatesortheURLwhichpromptsthe area of the individual any stock guide application in any semblance of outsider application like Google, Nokia and so on)tothe enrolled contacts at peril times or when the individual is required to have been saved. This progression is followed just when the salvage button is squeezed in application. The entire course of this progression is done just when the gadget is associated with the legitimate versatile organization and area administration in the gadget is turned on (GPS). The third significant advance involves work done in sending the message containing area URL ceaselessly to the enlisted contacts. Here, we have established the point in time stretch as 5minutes, so for at regular intervals of time-pass, SMS is shipped off the enlisted contacts. In this manner the specific area of the individual can be followed by the application ceaselessly which is the essential point of the proposed framework and the individual can be helped. 2.1 Uniqueness In the current frameworks, we have referenced numerous Android applications having comparable component to my application. In that large number of uses, casualty's area is sent just a single time to the enlisted contacts in various structures like SMS, However in circumstances, the casualty may not be kept at one spot standing, she might move around. Thus, in that multitude of uses, we can know just a single area following the beginning of the application, yet for all intents and purposes after at some point she may not be available at that spot. The one of a kind element of myapplicationisarea issentconsistently for each five minutes. So, regardless of whether the lady is made to move around in the city, as a result of this element of constant area following, she can be safeguarded rapidly and securely. Likewise, one of the contactswill geta call,insome cases there might be opportunity for individuals not seeing the SMS, but rather in the wake of getting the call they get ready and can take a gander at the SMS and can distinguish that their almost ones is in peril rapidly. Fig -1: Screenshort of the app
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1211 2.2 PROPOSED SYSTEM: To develop a system for android users for keeping track through several applications. This application uses GPS for identifying the location of the person in trouble and the system can be divided into two modules: 1. First module can be the victim’s phone i.e. the root device which uses 3G/2G data connection for trackingthelocation of the victim through GPS. 2. Second module can be the mobile phone of registered contacts either police or friends or family members which receives the message containing URL of location of victim that is sent from the root device. Fig -2: Block Diagram 3. CONCLUSION We are carrying out the Women Safety in android framework by the utilizing GPS Location android with Mobile. Already we are Facing such countless issues to track down the area of the client or ladies. So that here is the application which will assist with tracking down the specific area of the individual alongside theirscopeandlongitude.Inthismannerfindingtheindividual when there is a crisis is more straightforward with this application. REFERENCES 1. VaijayantiPawar,Prof.N.R.Wankhade, DipikaNikam, KanchanJadhav and NehaPathak, "SCIWARS Android App for Women Safety" in VaijayantiPawar Int. Journal of Engineering Research and Applications, vol. 4, no. 3, pp. 823826, March 2014. 2. Robi Grgurina, Brestovac and Tihana Galinac Grbac, "Development EnvironmentforAndroidApplicationDevelopment:An Experience Report" in MIPRO 2011, Opatija, Croatia, pp. 23-27, May 2011. 3. "FIGHTBACK", Android App developed by Canvas M Technologies, June 2013. 4. "SECUREMEBETA", Android App developed by Think MPI Consulting Private Limited, September 2014. 5. "VANITHAALERT", ABC Mobile Learning Communication, January 2014. 6. "RAKSHA - WOMEN SAFETY ALERT", BharathSewa.com, March 2014. 7. "GLYMPSE- SHARE GPS LOCATION", Android App Developed by Glympse Corp., January2015,http://www.glympse.com/. 8. "GUARDLY", Android App Developed by Guardly Corp., January 2014. 9. "STREET SAFE", Android App Developed by People Guard LLC, September 2013, Available: https://jezebel.com/5895916/the-street-safety-appfor-proactive-and-paranoid-woman.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1212 10. Munesh Chandra DIT,School of Engg.,Vikrant Gupta R.K.G.I.T.,Santhosh Kr.Paul,R.K.G.I.T.”A Statistical approach for Automatic Text Summarization by Extraction”, International Conference on Communication Systems and Network Technologies , IEEE 2011 11. Samadhan R.Manore,Computer Science Department, Shivaji University.”Email DocumentsSummarizationUsing Statistical Approach “.International Advance Computing Conference (LACC 2009),IEEE 2009 12. “Fight back”Android App Developed By Canvas M Technologies,26 June 2013, http://www.fightbackmobile.com/welcome 13. “Guardly “Android App Developed By Guardlycorp.,28January2014, https://www.guardly.com/ 14. “OnWatch “Android App Developed By On Watch,10November2012 ”https://play.google.com/store/apps/details?id=c om onwatch” 15. “Life360-Family Locator”Android App Developed By Life360,20 february 2014,”https://www.life360.com/family- locator/” 16. “StreetSafe” Android App DevelopedBypeopleGuard LLC”,24 September 2013,http://streetsafe.com/static-products- overview