SlideShare a Scribd company logo
1 of 3
Download to read offline
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 6 Issue: 6 50- 52
______________________________________________________________________________________
50
IJRITCC | June 2018, Available @ http://www.ijritcc.org
______________________________________________________________________________________
Wearable Technology for Personal Security
Shuttari Faizan Khalil
M-tech in Electronics Design and Technology
National Institute of Electronics and Information
TechnologyAurangabad, India
E-mail: faizan6199@gmail.com
Mr. Y. P. Gogia
Scientist „D‟
National Institute of Electronics and Information
TechnologyAurangabad, India
E-mail: Yashpal@nielit.gov.in
Abstract—In global scenario, the prime question in every person‟s mind is about their safety and the harassment issues. The only thought
haunting them is when they will be able to move freely on the streets even in odd hours without worrying about their security. This project
focuses on this aspect of security so one will ever feel helpless. Our proposed Raspberry Pi-3 Based Self Defensive System consists of various
sub modules such as GSM, GPS, memory card, shock circuit, buzzer and camera.
Keywords: -Raspberry Pi-3, Personal Security, Smart devices, GSM, GPS, Wearable Technology, Camera, Gmail.
__________________________________________________*****_________________________________________________
I. INTRODUCTION
The wearable tech market is alive and thriving. As a matter of
fact, fitness trackers and smart watches are hotter than ever
according to figures released by the International Data
Corporation. Statistics released from the IDC state that last
year came to a close with 102.4 million devices shipped. The
worldwide wearable's market reached an all-time high as
shipments reached 33.9 million units in the fourth quarter of
2016 and is growing at the rate of 16.9% year over year.
Like many, you might be asking yourself:
What is wearable technology today? Present scenario has
proved there is more to wearable electronics than the wrist-
worn devices.
Who is wearing them?
How are they evolving?
Who are the top vendors?
Wearable technology is more integrated with us and can either
capture data, present data or both.
II. WEARABLE TECHNOLOGY
Wearable technology, fashionable technology, wearable
devices, or fashionelectronics are smart electronic devices
(electronic device with micro-controllers) that can be worn on
the body as implants or accessories.
Wearable devices such as activity trackers are a good example
of the Internet of Things, since "things" such
as electronics, software, sensors, and connectivity are effectors
that enable objects to exchange data (including data quality)
through the internet with a manufacturer, operator, and/or
other connected devices, without requiring human
intervention.
Wearable technology has a variety of applications which
grows as the field itself expands. It appears prominently in
consumer electronics with the popularization of the smart
watch and activity tracker. Apart from commercial uses,
wearable technology is being incorporated into navigation
systems, advanced textiles, and healthcare.
III. WERABLE IOT PRODUCTS CURRENTLY AVAILABLE IN
MARKET
1) Smart Watches: - Smart watches are watches
that twofold as cell phones and emergency alert
frameworks. Furthermore, wearers can play
music on the watch, send and get instant
messages and, obviously, make calls.
2) Fitness Trackers: - Gadget or application for
checking and following fitness-related metrics
such as distance walked or run, calorie
consumption, and in some cases heartbeat and
quality of sleep.
3) Implantable: - Implantable are gadgets that
clients convey with them wherever they go as
they are embedded under the skin through
surgeries in different structures like tattoos or
pacemakers.
4) Smart clothing: - Smart clothing or smart
garments are fabrics that are embedded with
digital components and electronics into them. To
obtain health care status's signals from various
physiological indicators due to forming a source data
center for comprehensive health monitoring, a „smart
clothing‟ design was presented. To make smart
clothing systems intelligent, an infrastructure
incorporating smartphones, mobile applications,
cloud computing, and big data analytic is required to
communicate in the structured design.
5) Smart Jewelry: - Smart jewelry maintains
activity tracking of a fitness band without
siliconstrap in a fashionable manner using
earrings, necklaces, bracelets and rings.
6) Smart Eye Glasses: - The Smart Eye Glasses
includes a bunch of features, including a gyroscope,
accelerometer, ambient light sensor and built-in
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 6 Issue: 6 50- 52
______________________________________________________________________________________
51
IJRITCC | June 2018, Available @ http://www.ijritcc.org
______________________________________________________________________________________
camera. These stylish glasses are packed with sensors
that can track brainwaves, eye movement, facial
expressions and more.
IV. RASPBERRY-PI BASED SELF DEFENSIVE SYSTEM
In global scenario, the prime question in every person‟s mind
is about their safety and the harassment issues. The only
thought haunting them is when they will be able to move
freely on the streets even in odd hours without worrying about
their security. This project focuses on this aspect of security so
one will ever feel helpless. Our proposed Raspberry Pi Based
Self Defensive System consists of various sub modules such
as GSM, GPS, memory card, shock circuit, speaker, and
camera. The project is based on wireless technology. The main
problem is when someone is in danger or when there is an
emergency situation then the victim cannot protect themselves
and operate the smart phones. Also, they cannot set alert
function when they are in a risky situation & they cannot pass
and send their location to the police & family members
immediately.
V. DESIGN STUDY OF THE SYSTEM
The system consists of various modules such as GSM, GPS,
memory card, shock circuit, speaker, camera, Raspberry pi-3
module. In this system we are using wireless technology for
security purpose. A wearable device for safety means that
allow users to protect while traveling odd hours or when they
feel helpless. This project is based on personal security as it is
reported that every day there is many cases about harassment,
theft, etc. Although an Android based applications on security
is already out in the market but for non-android users, I
thought an idea for developing a system based on security
using Raspberry pi module. Raspberry pi module receives the
signals from GPS system which has present location
information and then the Raspberry pi controller allows the
GSM system to send the Alert Message to the three predefined
numbers. Also in the system a shock circuit is used to injure
the attacker for self-defense. A camera is used for capturing
the image of the attacker and a micro SD card is used to save
the captured image. A speaker is used to play an SOS message
to call for help for the nearby people. There is also an
additional feature of e-mail, due to which the image
capturedby the camera is immediately sent through the e-mail
to the specified e-mail address as a record.
 Raspberry Pi-3 Module: -The Raspberry Pi-3 is a
popular, low-cost minicomputer running on Linux.
It is ideally suited for prototyping machine-to-
machine solutions through its GPIO pins and USB
support. Raspberry Pi 3 Model B was released in
February 2016 with a 64 bit quad-core processor, and
has on- board Wi-Fi, Bluetooth and USB boot
capabilities. In 2018 model 3B+ appeared with a
faster 1.4 GHz processor and a 3 times faster
network based on gigabit Ethernet (300 Mbit / s) or
2.4 / 5 GHz dual- band Wi-Fi (100 Mbit / s). Other
options are: Power over Ethernet (PoE), USB
boot and network boot (an SD card is no
longer required). This allows the use of the Pi in
hard-to-reach places (possibly without electricity).
Figure 1:- Raspberry Pi-3
 GSM: - A GSM Modem Is a Wireless Modem That
Works with a GSM Wireless Network .It Operates At
Either The 900mhz Or 1800mhz Frequency Band. It
Supports Voice Calls and Data Transfer Speeds.
 GPS: - GPS SIM 28 can track as low as -165 dbi
signal even without network assistance. It has
excellent low power consumption. It can be easily
interfaced with GSM module and can provide
precision location tracking with SMS to the pre-
loaded contacts stored in the GSM Module.
Figure 2:- GPS SIM 28
 Camera: - Any camera which can be interfaced
through USB can be used in this system for capturing
the images.
 Buzzer: - Portable buzzer (3-24V) connecting it to
raspberry-pi can be used to alert nearby people for
help.
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 6 Issue: 6 50- 52
______________________________________________________________________________________
52
IJRITCC | June 2018, Available @ http://www.ijritcc.org
______________________________________________________________________________________
 Shock circuit: - The shock circuit which I am using
in the system is shown in the figure. It contains a
small ferrite core step up transformer which converts
low voltage to high voltage. When the two output
ports come I contact to any living being then it
creates a shock effect and sparks are also generated.
Figure 3:- Shock Circuit
VI. FLOW OF OPERATION
OUR PRODUCT
CONCLUSION
The proposed design will help the person when they are in
danger. They can make rescue of themselves in danger
situations. This system will also remove or decrease the fear
of travelling in odd hours so that people will never feel
helpless at any situation and can protect themself. And the
culprit‟s image will be captured by camera so that police will
be able to trace them with ease.
REFERENCES
[1] D.S. Vasant, B.A. Arun, M.P. Shivaji. “Raspberry-pi based anti-
theft system with image feedback”. AES Journals in
Engineering, Technology, Management & Sciences. Vol-4,
Issue-2.
[2] A Survey on IoT Based Security System By Indrajit Patil,
Saurabh Jaiswal, Pallavi Sakhre, Mohammad Shoaib, Asst. Prof.
Poonam Gupta. IJARCCE, Vol-5, Issue-11, Nov 2016.
[3] “Wearable Electronics: Robust or Rotten?”, Cheryl Tulkoff,
SMTA Austin 2014.
[4] Smart Intelligent Security System for Women By Geetha
Pratyusha Miriyala and P.V.V.N.D.P. Sunil. IJECET Vol-7,
Issue—, March-April 2016.
Switch 3 is pressed
STOP
Switch 2 is pressed
START
Initialize the system
Send’s location through SMS using
GSM & GPS
Activates camera, speaker, shock
circuit and e-mail feature

More Related Content

What's hot

Android Operated Application Based Smart Eye for Home Automation System Using...
Android Operated Application Based Smart Eye for Home Automation System Using...Android Operated Application Based Smart Eye for Home Automation System Using...
Android Operated Application Based Smart Eye for Home Automation System Using...
IJMTST Journal
 
An IOT based solution for Road Accidents
An IOT based solution for Road AccidentsAn IOT based solution for Road Accidents
An IOT based solution for Road Accidents
ijtsrd
 
Next Decade of Internet of Things and its
Next Decade of Internet of Things and itsNext Decade of Internet of Things and its
Next Decade of Internet of Things and its
Ruma Shukla
 

What's hot (20)

IRJET- A Survey of Security Issues in Internet of Things
IRJET- A Survey of Security Issues in Internet of ThingsIRJET- A Survey of Security Issues in Internet of Things
IRJET- A Survey of Security Issues in Internet of Things
 
IRJET- Women Security System using IoT
IRJET-  	  Women Security System using IoTIRJET-  	  Women Security System using IoT
IRJET- Women Security System using IoT
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Embedded IEEE 2012 titles
Embedded IEEE 2012 titlesEmbedded IEEE 2012 titles
Embedded IEEE 2012 titles
 
DIGITAL NOTICEBOARD USING IOT
DIGITAL NOTICEBOARD USING IOTDIGITAL NOTICEBOARD USING IOT
DIGITAL NOTICEBOARD USING IOT
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
 
Android Operated Application Based Smart Eye for Home Automation System Using...
Android Operated Application Based Smart Eye for Home Automation System Using...Android Operated Application Based Smart Eye for Home Automation System Using...
Android Operated Application Based Smart Eye for Home Automation System Using...
 
IRJET- IoT based Smart Foot Device for Women Safety
IRJET- IoT based Smart Foot Device for Women SafetyIRJET- IoT based Smart Foot Device for Women Safety
IRJET- IoT based Smart Foot Device for Women Safety
 
IRJET - Smart Classroom Automation based on IoT
IRJET -  	  Smart Classroom Automation based on IoTIRJET -  	  Smart Classroom Automation based on IoT
IRJET - Smart Classroom Automation based on IoT
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
IRJET- Smart, Secured and Solace Luggage Bag using Internet of Things and Com...
IRJET- Smart, Secured and Solace Luggage Bag using Internet of Things and Com...IRJET- Smart, Secured and Solace Luggage Bag using Internet of Things and Com...
IRJET- Smart, Secured and Solace Luggage Bag using Internet of Things and Com...
 
SIEM-based detection and mitigation of IoT-botnet DDoS attacks
SIEM-based detection and mitigation of IoT-botnet DDoS attacksSIEM-based detection and mitigation of IoT-botnet DDoS attacks
SIEM-based detection and mitigation of IoT-botnet DDoS attacks
 
IRJET - Android based Secure and Smart Home Application using IoT
IRJET -  	  Android based Secure and Smart Home Application using IoTIRJET -  	  Android based Secure and Smart Home Application using IoT
IRJET - Android based Secure and Smart Home Application using IoT
 
Internet of things-Introduction
Internet of things-IntroductionInternet of things-Introduction
Internet of things-Introduction
 
Internet of Things, Examples and Issues
Internet of Things, Examples and IssuesInternet of Things, Examples and Issues
Internet of Things, Examples and Issues
 
An IOT based solution for Road Accidents
An IOT based solution for Road AccidentsAn IOT based solution for Road Accidents
An IOT based solution for Road Accidents
 
IRJET- Body Sensor Network using Raspberry Pi3: IoT
IRJET- Body Sensor Network using Raspberry Pi3: IoTIRJET- Body Sensor Network using Raspberry Pi3: IoT
IRJET- Body Sensor Network using Raspberry Pi3: IoT
 
Pay-Cloak:Biometric
Pay-Cloak:BiometricPay-Cloak:Biometric
Pay-Cloak:Biometric
 
Next Decade of Internet of Things and its
Next Decade of Internet of Things and itsNext Decade of Internet of Things and its
Next Decade of Internet of Things and its
 
IRJET- Intelligent Manhole Cover System
IRJET- Intelligent Manhole Cover SystemIRJET- Intelligent Manhole Cover System
IRJET- Intelligent Manhole Cover System
 

Similar to Wearable Technology for Personal Security

02_Internet-of-things-Final PPT.pdf
02_Internet-of-things-Final PPT.pdf02_Internet-of-things-Final PPT.pdf
02_Internet-of-things-Final PPT.pdf
PunamSurwase
 
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
ssuserc5ee4c
 

Similar to Wearable Technology for Personal Security (20)

IRJET- Identification of Location of Laptop Devices using Raspberry Pi Mo...
IRJET-  	  Identification of Location of Laptop Devices using Raspberry Pi Mo...IRJET-  	  Identification of Location of Laptop Devices using Raspberry Pi Mo...
IRJET- Identification of Location of Laptop Devices using Raspberry Pi Mo...
 
IoT and Fingerprint Based Door Looking System
IoT and Fingerprint Based Door Looking SystemIoT and Fingerprint Based Door Looking System
IoT and Fingerprint Based Door Looking System
 
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart LockIRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
 
Smart Frame - A Location Sensing Picture Frame using IOT
Smart Frame - A Location Sensing Picture Frame using IOTSmart Frame - A Location Sensing Picture Frame using IOT
Smart Frame - A Location Sensing Picture Frame using IOT
 
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy MonitoringIOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
 
IOT Based Smart Home System Technologies
IOT Based Smart Home System TechnologiesIOT Based Smart Home System Technologies
IOT Based Smart Home System Technologies
 
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
 
Emerging Global Trends in Internet of Things.pptx
Emerging Global Trends in Internet of Things.pptxEmerging Global Trends in Internet of Things.pptx
Emerging Global Trends in Internet of Things.pptx
 
The Invisible Eye
The Invisible EyeThe Invisible Eye
The Invisible Eye
 
IRJET - Research and Analysis of Smart Mirror
IRJET - Research and Analysis of Smart MirrorIRJET - Research and Analysis of Smart Mirror
IRJET - Research and Analysis of Smart Mirror
 
Bank Locker System Using Fingerprint Authentication & Image Processing
Bank Locker System Using Fingerprint Authentication & Image ProcessingBank Locker System Using Fingerprint Authentication & Image Processing
Bank Locker System Using Fingerprint Authentication & Image Processing
 
02_Internet-of-things-Final PPT.pdf
02_Internet-of-things-Final PPT.pdf02_Internet-of-things-Final PPT.pdf
02_Internet-of-things-Final PPT.pdf
 
IRJET- Theft Control using IoT
IRJET-  	  Theft Control using IoTIRJET-  	  Theft Control using IoT
IRJET- Theft Control using IoT
 
Smart and Secure Home using IoT
Smart and Secure Home using IoTSmart and Secure Home using IoT
Smart and Secure Home using IoT
 
Q180203109113
Q180203109113Q180203109113
Q180203109113
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoTDesign and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT	Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT
 
Face Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock SystemFace Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock System
 
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
 
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
 

More from rahulmonikasharma

Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
rahulmonikasharma
 

More from rahulmonikasharma (20)

Data Mining Concepts - A survey paper
Data Mining Concepts - A survey paperData Mining Concepts - A survey paper
Data Mining Concepts - A survey paper
 
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
 
Considering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP FrameworkConsidering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP Framework
 
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication SystemsA New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
 
Broadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A SurveyBroadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A Survey
 
Sybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANETSybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANET
 
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine FormulaA Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
 
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
 
Quality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry PiQuality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry Pi
 
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
 
DC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide NanoparticlesDC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide Nanoparticles
 
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDMA Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
 
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
 
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
 
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM SystemAlamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
 
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault DiagnosisEmpirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
 
Short Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA TechniqueShort Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA Technique
 
Impact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line CouplerImpact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line Coupler
 
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction MotorDesign Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
 
Advancement in Abrasive Water Jet Machining - A Study
Advancement in Abrasive Water Jet Machining - A StudyAdvancement in Abrasive Water Jet Machining - A Study
Advancement in Abrasive Water Jet Machining - A Study
 

Recently uploaded

Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 

Recently uploaded (20)

Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptx
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdf
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 

Wearable Technology for Personal Security

  • 1. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 6 Issue: 6 50- 52 ______________________________________________________________________________________ 50 IJRITCC | June 2018, Available @ http://www.ijritcc.org ______________________________________________________________________________________ Wearable Technology for Personal Security Shuttari Faizan Khalil M-tech in Electronics Design and Technology National Institute of Electronics and Information TechnologyAurangabad, India E-mail: faizan6199@gmail.com Mr. Y. P. Gogia Scientist „D‟ National Institute of Electronics and Information TechnologyAurangabad, India E-mail: Yashpal@nielit.gov.in Abstract—In global scenario, the prime question in every person‟s mind is about their safety and the harassment issues. The only thought haunting them is when they will be able to move freely on the streets even in odd hours without worrying about their security. This project focuses on this aspect of security so one will ever feel helpless. Our proposed Raspberry Pi-3 Based Self Defensive System consists of various sub modules such as GSM, GPS, memory card, shock circuit, buzzer and camera. Keywords: -Raspberry Pi-3, Personal Security, Smart devices, GSM, GPS, Wearable Technology, Camera, Gmail. __________________________________________________*****_________________________________________________ I. INTRODUCTION The wearable tech market is alive and thriving. As a matter of fact, fitness trackers and smart watches are hotter than ever according to figures released by the International Data Corporation. Statistics released from the IDC state that last year came to a close with 102.4 million devices shipped. The worldwide wearable's market reached an all-time high as shipments reached 33.9 million units in the fourth quarter of 2016 and is growing at the rate of 16.9% year over year. Like many, you might be asking yourself: What is wearable technology today? Present scenario has proved there is more to wearable electronics than the wrist- worn devices. Who is wearing them? How are they evolving? Who are the top vendors? Wearable technology is more integrated with us and can either capture data, present data or both. II. WEARABLE TECHNOLOGY Wearable technology, fashionable technology, wearable devices, or fashionelectronics are smart electronic devices (electronic device with micro-controllers) that can be worn on the body as implants or accessories. Wearable devices such as activity trackers are a good example of the Internet of Things, since "things" such as electronics, software, sensors, and connectivity are effectors that enable objects to exchange data (including data quality) through the internet with a manufacturer, operator, and/or other connected devices, without requiring human intervention. Wearable technology has a variety of applications which grows as the field itself expands. It appears prominently in consumer electronics with the popularization of the smart watch and activity tracker. Apart from commercial uses, wearable technology is being incorporated into navigation systems, advanced textiles, and healthcare. III. WERABLE IOT PRODUCTS CURRENTLY AVAILABLE IN MARKET 1) Smart Watches: - Smart watches are watches that twofold as cell phones and emergency alert frameworks. Furthermore, wearers can play music on the watch, send and get instant messages and, obviously, make calls. 2) Fitness Trackers: - Gadget or application for checking and following fitness-related metrics such as distance walked or run, calorie consumption, and in some cases heartbeat and quality of sleep. 3) Implantable: - Implantable are gadgets that clients convey with them wherever they go as they are embedded under the skin through surgeries in different structures like tattoos or pacemakers. 4) Smart clothing: - Smart clothing or smart garments are fabrics that are embedded with digital components and electronics into them. To obtain health care status's signals from various physiological indicators due to forming a source data center for comprehensive health monitoring, a „smart clothing‟ design was presented. To make smart clothing systems intelligent, an infrastructure incorporating smartphones, mobile applications, cloud computing, and big data analytic is required to communicate in the structured design. 5) Smart Jewelry: - Smart jewelry maintains activity tracking of a fitness band without siliconstrap in a fashionable manner using earrings, necklaces, bracelets and rings. 6) Smart Eye Glasses: - The Smart Eye Glasses includes a bunch of features, including a gyroscope, accelerometer, ambient light sensor and built-in
  • 2. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 6 Issue: 6 50- 52 ______________________________________________________________________________________ 51 IJRITCC | June 2018, Available @ http://www.ijritcc.org ______________________________________________________________________________________ camera. These stylish glasses are packed with sensors that can track brainwaves, eye movement, facial expressions and more. IV. RASPBERRY-PI BASED SELF DEFENSIVE SYSTEM In global scenario, the prime question in every person‟s mind is about their safety and the harassment issues. The only thought haunting them is when they will be able to move freely on the streets even in odd hours without worrying about their security. This project focuses on this aspect of security so one will ever feel helpless. Our proposed Raspberry Pi Based Self Defensive System consists of various sub modules such as GSM, GPS, memory card, shock circuit, speaker, and camera. The project is based on wireless technology. The main problem is when someone is in danger or when there is an emergency situation then the victim cannot protect themselves and operate the smart phones. Also, they cannot set alert function when they are in a risky situation & they cannot pass and send their location to the police & family members immediately. V. DESIGN STUDY OF THE SYSTEM The system consists of various modules such as GSM, GPS, memory card, shock circuit, speaker, camera, Raspberry pi-3 module. In this system we are using wireless technology for security purpose. A wearable device for safety means that allow users to protect while traveling odd hours or when they feel helpless. This project is based on personal security as it is reported that every day there is many cases about harassment, theft, etc. Although an Android based applications on security is already out in the market but for non-android users, I thought an idea for developing a system based on security using Raspberry pi module. Raspberry pi module receives the signals from GPS system which has present location information and then the Raspberry pi controller allows the GSM system to send the Alert Message to the three predefined numbers. Also in the system a shock circuit is used to injure the attacker for self-defense. A camera is used for capturing the image of the attacker and a micro SD card is used to save the captured image. A speaker is used to play an SOS message to call for help for the nearby people. There is also an additional feature of e-mail, due to which the image capturedby the camera is immediately sent through the e-mail to the specified e-mail address as a record.  Raspberry Pi-3 Module: -The Raspberry Pi-3 is a popular, low-cost minicomputer running on Linux. It is ideally suited for prototyping machine-to- machine solutions through its GPIO pins and USB support. Raspberry Pi 3 Model B was released in February 2016 with a 64 bit quad-core processor, and has on- board Wi-Fi, Bluetooth and USB boot capabilities. In 2018 model 3B+ appeared with a faster 1.4 GHz processor and a 3 times faster network based on gigabit Ethernet (300 Mbit / s) or 2.4 / 5 GHz dual- band Wi-Fi (100 Mbit / s). Other options are: Power over Ethernet (PoE), USB boot and network boot (an SD card is no longer required). This allows the use of the Pi in hard-to-reach places (possibly without electricity). Figure 1:- Raspberry Pi-3  GSM: - A GSM Modem Is a Wireless Modem That Works with a GSM Wireless Network .It Operates At Either The 900mhz Or 1800mhz Frequency Band. It Supports Voice Calls and Data Transfer Speeds.  GPS: - GPS SIM 28 can track as low as -165 dbi signal even without network assistance. It has excellent low power consumption. It can be easily interfaced with GSM module and can provide precision location tracking with SMS to the pre- loaded contacts stored in the GSM Module. Figure 2:- GPS SIM 28  Camera: - Any camera which can be interfaced through USB can be used in this system for capturing the images.  Buzzer: - Portable buzzer (3-24V) connecting it to raspberry-pi can be used to alert nearby people for help.
  • 3. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 6 Issue: 6 50- 52 ______________________________________________________________________________________ 52 IJRITCC | June 2018, Available @ http://www.ijritcc.org ______________________________________________________________________________________  Shock circuit: - The shock circuit which I am using in the system is shown in the figure. It contains a small ferrite core step up transformer which converts low voltage to high voltage. When the two output ports come I contact to any living being then it creates a shock effect and sparks are also generated. Figure 3:- Shock Circuit VI. FLOW OF OPERATION OUR PRODUCT CONCLUSION The proposed design will help the person when they are in danger. They can make rescue of themselves in danger situations. This system will also remove or decrease the fear of travelling in odd hours so that people will never feel helpless at any situation and can protect themself. And the culprit‟s image will be captured by camera so that police will be able to trace them with ease. REFERENCES [1] D.S. Vasant, B.A. Arun, M.P. Shivaji. “Raspberry-pi based anti- theft system with image feedback”. AES Journals in Engineering, Technology, Management & Sciences. Vol-4, Issue-2. [2] A Survey on IoT Based Security System By Indrajit Patil, Saurabh Jaiswal, Pallavi Sakhre, Mohammad Shoaib, Asst. Prof. Poonam Gupta. IJARCCE, Vol-5, Issue-11, Nov 2016. [3] “Wearable Electronics: Robust or Rotten?”, Cheryl Tulkoff, SMTA Austin 2014. [4] Smart Intelligent Security System for Women By Geetha Pratyusha Miriyala and P.V.V.N.D.P. Sunil. IJECET Vol-7, Issue—, March-April 2016. Switch 3 is pressed STOP Switch 2 is pressed START Initialize the system Send’s location through SMS using GSM & GPS Activates camera, speaker, shock circuit and e-mail feature