SlideShare a Scribd company logo
1 of 6
Download to read offline
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 1, Ver. I (Jan – Feb. 2015), PP 29-34
www.iosrjournals.org
DOI: 10.9790/0661-17112934 www.iosrjournals.org 29 | Page
A Mobile Based Women Safety Application (I Safe Apps)
Dr. Sridhar Mandapati1
, Sravya Pamidi2
, Sriharitha Ambati3
1
Associate Professor, Department of Computer Applications, R.V.R & J.C College of Engineering, Guntur,
India
2
Department of Computer Applications, R.V.R & J.C College of Engineering, Guntur, India
3
Department of Computer Science & Engineering, R.V.R & J.C College of Engineering, Guntur, India
Abstract: Many unfortunate incidents have been taking place in woman’s case. Problems may come from any
direction such as women walking on the road after the work, going to super market or many other reasons for
which they go alone. People at home are not sure of their return safely. Another factor is woman die without
knowing the reason as they attend excursions and industrial trips conducted by the organizations. It happens
due to attacks on woman but not suicides. In 2013 there happened an incident which is a gag rape in New Delhi
in the case of 23 year old woman in bus at 9:30 PM. Another incident that has taken place at Mumbai in the
case of woman who is leaving her native place after Christmas holidays has been kidnapped and killed. These
are some of the problems that have taken place in the day to day life of women. In order to overcome such
problems faced by women the I Safety (women security apps) mobile based application is not only necessary to
use but also plays a pivotal role with android software.
Keywords: apps, android, mobile, safety, Women.
I. Introduction
Ban Ki-Moon, the secretary general of United Nations stated that “There is one universal truth,
applicable to all countries, cultures and communities: violence against women is never acceptable, never
excusable, and never tolerable” [1]. Violence against women is a significant public health problem, as well as a
fundamental violation of women‟s human rights [2]. There are three reasons why mobile technology will reduce
violence against women in public places. They are easily accessible, crowd sourcing and affordable scalability
[3]
The capital city New Delhi in 2012 arrested the attention of not only the people of the nation but also
the entire world. A rape incident captured the attention of the entire human kind that occurred on 16th
December
2012 at a place Munirka, a neighbourhood in south Delhi which was a fatal assault. A 23 year old woman
physiotherapy (intern) was hit and molested by a gang at 9:30 PM when she was travelling in a private bus with
a male counterpart. They were returning after watching the film Life of Pi in saket, south Delhi and boarded an
of duty charter bus at Munirka to Dwaraka, which was driven by joy riders at that time.
The family members and colleagues of TCS software engineer Esther Anuhaya found her body with
the help of a Vijayawada police team. Her parents spent the entire Thursday looking for her in Bhandup (East)
as her last call signal on January 5th
was from Bhandupeshwar Kund in Kanjurmarg, which falls under Bhandup
(East) jurisdiction. The family had been trying to trace her where about by showing the locals her photographs.
Locals said that the spot where her body was found is a hangout for criminals. The body of Anuhaya has been
procured by Vijayawada police.
Another 19-year old Pharmacy student named Ayesha Miran was raped and murdered brutally by 22-
year old P. Satyam Babu in a hostel at Vijayawada. A body with stab injuries was found in the bathroom on Dec
27, 2007. A letter dropped by the 'murderer' stated that the girl was raped and murdered for refusing his request
for 'love'.
An „app‟ is a small, specialised software program, easily downloadable and installed onto mobile
devices such as Smartphone‟s or tablet computers. The use of „apps‟ has been popularised by the Apple‟s „App
Store‟ and also by Google‟s „Play Store‟ [4]. In this paper, some app‟s created to know whether a woman is safe
or not? Which indicates the present state of affairs of the woman by touching the option, which also indicates
the location of the endangered woman they gave a phone call, video forwarding, fake calls, and location of the
person, first-aid details, and application having the instructions that is the way to use the application. The rest of
the paper is organized as follows. A literature review is presented in section 2 followed by some methods and
materials in section 3. The experimental setup described in section 4 followed by the results and discussions in
section 5. Finally, the paper concludes with future research direction in section 6.
A Mobile Based Women Safety Application (I Safe Apps)
DOI: 10.9790/0661-17112934 www.iosrjournals.org 30 | Page
II. Related Research
Nicole Westmarland et al [4] discussed on protecting women‟s safety? The main purpose of their study
is to explore the use of smartphone‟s in relation to domestic and sexual violence. In report [2] violence against
women is a global public health problem, 35% of women worldwide have experienced either physical and/or
sexual intimate partner violence or non-partner sexual violence. The report also details the effects of violence on
women‟s reproductive and mental health. In [5] the authors seek to place questions of surveillance technologies
into a theoretical framework that foregrounds the challenges that new surveillance technologies pose to anti-
violence movements. Specifically they address the impact of surveillance technologies in the practice of
violence and some proposed solutions, and consider the ways that surveillance technologies are used
disproportionately in the criminalization of marginalized groups. By placing violence against women at the
centre of analysis aim to complicate concerns related to surveillance technologies.
In [6] the author discussed that the technology is used in circumstances of intimate terrorism. It will
examine how technology is used as a batterer's tool in exerting coercive control over a victim. It will also look at
the changes in the laws as the legal system strives to keep pace with the rapid advancement of technology. In
particular, the recent use of GPS monitoring of intimate terrorists will be analyzed. This analysis will identify
some of the problems associated with the on-going legal changes. However, the same advancements may also
allow perpetrators to adapt and/or escalate their offending behaviour [7]. In a US study on domestic violence
and information technology, Dimond et al [8] found that users of mobiles and social networks were making
trade-offs between potential harm (e.g. continued abuse) and benefit (e.g. support).
Worldwide, the sales of new smartphones are forecast to reach 700 million by 2015 [9]. In the UK,
92% of adults personally own or use a mobile phone and 39% use their mobile handset to access the internet
[10]. Furthermore, 40% of UK adults own a smartphone, and tablet ownership jumped from 2% to 11% in just
12 months. Based on the advanced mobile and software capabilities, the smartphone has become a ubiquitous
everyday communication device, offering access to powerful computational software that is often a
multiplatform and sensor rich[11].
In the study [12] provided insight into the opportunities and challenges involved in delivering health-
related behavioral interventions through smartphone apps. The findings suggested a number of valued features
and characteristics that app developers may wish to consider when creating health behavior apps. Findings also
highlighted several major challenges that appeared the need to further consideration and research to ensure the
development of effective and well-accepted behavior change apps. In report [13] by Vodafone on Connected
Women, How mobile can support women‟s economic and social empowerment. The use of mobiles improves
the women‟s access to literacy, banking, health, empowerment and business opportunities.
III. Methods And Materials
There might be a situation in which the person has to travel alone a long distance at an odd hour and
perhaps even by public transport and may face some danger. At such a time, a personal safety app might not
only be wise to have easy access to, it might also give you a lot of confidence needed. There might be a situation
that when women had an accident in the late night and there are no one to help and to take care of them. In such
situations the person will not be able to tell the situation that he/she facing. And they do not know the basic first-
aid details and to know the person where the incident has happened.
To escape from the un-wanted meetings we do not know the way to escape from that meeting because
we do not know the fake calls working. There are no mobile applications for the person‟s safety, if the person is
in danger the people have to make a call to his friends or relatives and have to be explaining the position and
problem and generally we do not know the first aid details.
Some drawbacks in the existing system are discussed below:
 The person who is in danger (he/she) can‟t explain and show his/her position and situation.
 The person doesn‟t know the first aid details.
In proposed system with the push of one button, people can alert selected contacts that the person is in
danger and share the location. With this personal safety app, you'll never walk alone!!
There might be a situation in which have you to travel alone a long distance at an odd hour and perhaps
even by public transport and may face some danger. At such a time, a personal safety app might not only be
wise to have easy access to, it might also give you a lot of much needed confidence.
The personal safety application requires the name and number of the person who is to be contacted in
times of emergency. Users can add multiple people in the emergency contacts list. These are the people who
will receive notifications or SMS in case of an emergency.
All it requires is the user's action to trigger an SOS button provided and it shoots messages as fast as
the device can manage. Once the SOS button is hit, the people in the emergency contacts will get a message
like: I am in an emergency; followed by another message, which has the exact or approximate GPS location of
A Mobile Based Women Safety Application (I Safe Apps)
DOI: 10.9790/0661-17112934 www.iosrjournals.org 31 | Page
the cell phone. The user can also make audio or video call. This app also provides necessary first-aid measures
that should be taken at the time of emergency situations.
Features:
 Let the family and friends know that you are in danger and where you are? Declare an emergency whenever
you sense a danger, when you can disengage the emergency.
 Provides necessary first-aid measures that should be taken at the time of some dangerous situations.
 Let your family and friends know your path to the destination.
 Creates emergency contacts that will be notified by default of all the actions you make in the application.
Also display a list of detail contacts of cops, firemen, hospitals etc., nearby your location.
IV. Experimental Setup
The experiments were performed using a Intel(R) Core(TM) i3 M380@2.53GHz CPU with 4GB RAM
and 80 GB hard disk, android mobile with the support of wifi. In the development of the I safety (woman
security application) mobile app the software requirements are Front End is Android Application, Web
Application is Servlet Java development kit 1.6.0 or above, Eclipse IDE for Android , My Eclipse IDE for java
web Applications Android SDK 20.0.1 , Connective wifi router software.
V. Results And Discussion
By just touching the application from the mobile screen the options will appear and by choosing the
particular options the appropriate function will take place. In Fig. 1, it is seen that the available options in the
apps. By choosing the option “Add guardians” from the main screen then the screen navigates to the other
screen and the other screen is having two options they are “Add from contacts”, “Add new contacts” is shown in
Fig. 2. If the option Add from contacts is selected then it retrieves from the phone contacts and then again it
should be saved in JSON data base is shown in Fig. 3. After selecting the guardians from the phone contacts the
selected mobile numbers are displayed is shown in Fig. 4 and the contact numbers are stored in the JBOS. It is
nothing but memory used in the android based mobile phones. If the option Add new contacts is selected then it
gives the other popup box having the text boxes to enter the contact name and contact number and it also saved
in JSON database is shown in Fig. 5. The call sending is done by simply touching the option SOS from main
screen then it retrieves the contacts which are saved in the JSON database is shown in Fig. 6 and it performs the
action and at the same time it sends the location url of the person through the message format where she/he used
this application when they are in danger is shown in Fig. 7. By just touching the location URL got from the
message then it gets the location where the person is in danger by showing us in blue colour spot in the Google
Map is shown in Fig. 8. By zooming the Map guardian can easily find out the accurate location of the unsafe
woman is shown in Fig. 9.
Fig. 1: Main Screen Fig. 2: Add Guardians Fig. 3: Select Contacts
A Mobile Based Women Safety Application (I Safe Apps)
DOI: 10.9790/0661-17112934 www.iosrjournals.org 32 | Page
Fig. 4: Selected Guardian Fig. 5: Add New Contact Fig. 6: SOS
Fig. 7: Message Format Fig. 8: Google Map Fig. 9: Map Zooming
Another important option from main screen is Fake call. This option is very much helpful while the un-
necessary conversations is going in between the people then to protect over self we think that if anybody calls
then I can leave from this meeting. In such situations this option fake call is very much helpful. The
functionality is just it gets ring tone just like getting incoming call through that person can easy to escape from
the un-necessary conversations is shown in Fig. 10. When the Fake call is activated it means that a fake call is
accepted then it stops the ringing and it also has another option that is Hang Up option just like call cutting is
shown in Fig. 11.
There is another important option in the main screen is video call. This option gives the video of the
person that he/she has taken. That is if the person is in danger position that is unable to tell the position then
she/he can take the video and share via Email or Gmail shown in Fig. 12. By clicking on the First aid option
from the main screen only person can know the First-aid details for various problems like unconscious and not
breathing, choking, bleeding heavily, burns, heart attack, diabetes shown in Fig. 13.
If the person has touch the option to know the first aid details of unconscious and not breathing then
click on that option then it navigates to the other screen shown in Fig. 14. To know the details of choking then
touch on that option then it gets the information about that is shown in Fig. 15. If the person will want to know
the details of bleeding and burns are shown in Fig. 16 and Fig. 17.
A Mobile Based Women Safety Application (I Safe Apps)
DOI: 10.9790/0661-17112934 www.iosrjournals.org 33 | Page
Fig. 10: Fake call Fig. 11: Hang up call Fig. 12: Video Call
Fig. 13: First aid details Fig. 14: Unconscious details Fig. 15: Chocking details
Fig. 16: Bleeding details Fig. 17: Burns Details Fig. 18: Heart attack details
A Mobile Based Women Safety Application (I Safe Apps)
DOI: 10.9790/0661-17112934 www.iosrjournals.org 34 | Page
Another important problem now a day‟s many people face is heart attack. The people will want to
know about the first aid details of Heart attack then by just touching the related option then it gets the related
information which shown in Fig. 18. Now a day‟s most of the people are suffering from diabetes and this app
also provide information regarding this problem shown in Fig. 19. This app also provides the details of
instruction by touching this option from the main screen shown in Fig. 20.
Fig. 19: Diabetes details Fig. 20: Instructions
VI. Conclusion And Future Work
This mobile application is very much helpful for any woman. Because when a woman is in danger
position then she simply touch this I Safety mobile app and alert their guardians that the woman is in danger. By
simply touching the app it sends the call for the first added guardian number and sends the message that she was
in danger and sends the location message to the all saved guardian contacts. Through this mobile app we can
alert the people at home that a woman belonging to their house is safe or not.
Future Enhancements:
This mobile application is helpful in future when any problem arises in travelling or any kind of situations.
 As the technology emerges, it is possible to upgrade the system and can be adaptable to desired
environment.
 Because it is based on object-oriented design, any further changes can be easily adaptable.
 Based on the future security issues, security can be improved using emerging technologies.
References
[1]. Report of the Fourth World Conference on Women. New York, United Nations, 1995 (A/CONF.177/20/Rev.1)
(http://www.un.org/womenwatch/confer/beijing/reports/, accessed 1 April 2013).
[2]. World Health Organization, “Global and regional estimates of violence against women: prevalence and health effects of intimate
partner violence and non-partner sexual violence, Geneva: World Health Organization (2013).
[3]. http://www.mappsafe.com/blog-1-feb-14-three-reasons-why-mobile-technology-will-reduce-violence-against-women
[4]. Nicole Westmarland, Mariann Hardey, et al. “Protecting Women‟s Safety? The use of smartphone „apps‟ in relation to domestic and
sexual violence‟, Durham University, Durham centre for research into violence and abuse (2013).
[5]. Mason, C and Shoshana Magnet, “Surveillance studies and violence against women”, surveillance & society 10(2):105 – 118
(2012).
[6]. Justine A. Dunlap, Intimate Terrorism and Technology: There's an App for That, 7 U. Mass. L. Rev. 10 (2012).
[7]. Elliott, J. and McCartan K. The Reality of Trafficked People‟s Access to Technology. The Journal of Criminal Law 77(3): 255-
273(2013).
[8]. Dimond, J.P., Fiesler, C. and Bruckman, A.S. Domestic violence and information communication technologies, Interacting with
Computers, 23(5): 413-421(2011).
[9]. Portio Research. Portio research mobile factbook 2011. Chippenham, UK. Retrieved from
http://www.portioresearch.com/Portio%20Research%20Ltd%20Mobile%20Factbook%202011.pdf (2011).
[10]. Ofcom. Children and Parents: Media Use and Attitudes Report (2012).
[11]. Dennison, L., Morrison, L., Conway, G., & Yardley, L. (2013).Opportunities and Challenges for Smartphone Applications in
Supporting Health Behavior Change: Qualitative Study, Journal of medical Internet research, 15(4): e86.
[12]. Qualcomm Wireless ReachTM, Vital Wave, and GSMA. Transforming Women‟s Livelihoods Through Mobile Broadband. Report,
February 2014. Available at: http://www.qualcomm.com/mwomenreport
[13]. Vodafone. “Connected Women: How mobile can support women‟s economic and social empowerment”. Report, March, 2014.

More Related Content

What's hot

Real Time Vehicle Tracking System
Real Time Vehicle Tracking SystemReal Time Vehicle Tracking System
Real Time Vehicle Tracking SystemDiLip ChauDhary
 
IRJET - Women’s Safety System using IoT
IRJET -  	  Women’s Safety System using IoTIRJET -  	  Women’s Safety System using IoT
IRJET - Women’s Safety System using IoTIRJET Journal
 
IRJET- Women Security System using GSM and GPS
IRJET-  	  Women Security System using GSM and GPSIRJET-  	  Women Security System using GSM and GPS
IRJET- Women Security System using GSM and GPSIRJET Journal
 
Android Application on Location sharing and message sender
Android Application on Location sharing and message senderAndroid Application on Location sharing and message sender
Android Application on Location sharing and message senderKavita Sharma
 
Fake Currency detction Using Image Processing
Fake Currency detction Using Image ProcessingFake Currency detction Using Image Processing
Fake Currency detction Using Image ProcessingSavitaHanchinal
 
Home automation using google assistant ppt
Home automation using google assistant ppt Home automation using google assistant ppt
Home automation using google assistant ppt Somu Gupta
 
Vehicle Tracking System by Arduino UNO
Vehicle Tracking System by Arduino UNOVehicle Tracking System by Arduino UNO
Vehicle Tracking System by Arduino UNOPulkit Singhal
 
Vehicle tracking system using gps and google map
Vehicle tracking system using gps and google mapVehicle tracking system using gps and google map
Vehicle tracking system using gps and google mapsanchit bhargava
 
Suspicious Activity Detection
Suspicious Activity DetectionSuspicious Activity Detection
Suspicious Activity DetectionMushahid Ali
 
Vehicle tracking system using gps and gsm techniques
Vehicle tracking system using gps and gsm techniquesVehicle tracking system using gps and gsm techniques
Vehicle tracking system using gps and gsm techniquesBharath Chapala
 
IoT Solution To Regulate Vehicular Traffic
IoT Solution To Regulate Vehicular TrafficIoT Solution To Regulate Vehicular Traffic
IoT Solution To Regulate Vehicular TrafficMphasis
 
Android Internship report presentation
Android Internship report presentationAndroid Internship report presentation
Android Internship report presentationvinayh.vaghamshi _
 
Software engineering project on gps based Bus management system (GPS BMS)
Software engineering project on gps based Bus management system (GPS BMS)Software engineering project on gps based Bus management system (GPS BMS)
Software engineering project on gps based Bus management system (GPS BMS)Neeraj Kansal
 
Final Year Projects (Computer Science 2013) - Syed Ubaid Ali Jafri
Final Year Projects (Computer Science 2013) - Syed Ubaid Ali JafriFinal Year Projects (Computer Science 2013) - Syed Ubaid Ali Jafri
Final Year Projects (Computer Science 2013) - Syed Ubaid Ali JafriSyed Ubaid Ali Jafri
 
Geofencing for mobile applications
Geofencing for mobile applicationsGeofencing for mobile applications
Geofencing for mobile applicationsRajith Rajan
 
Vulnerability in ai
 Vulnerability in ai Vulnerability in ai
Vulnerability in aiSrajalTiwari1
 

What's hot (20)

Real Time Vehicle Tracking System
Real Time Vehicle Tracking SystemReal Time Vehicle Tracking System
Real Time Vehicle Tracking System
 
IRJET - Women’s Safety System using IoT
IRJET -  	  Women’s Safety System using IoTIRJET -  	  Women’s Safety System using IoT
IRJET - Women’s Safety System using IoT
 
IRJET- Women Security System using GSM and GPS
IRJET-  	  Women Security System using GSM and GPSIRJET-  	  Women Security System using GSM and GPS
IRJET- Women Security System using GSM and GPS
 
Android Application on Location sharing and message sender
Android Application on Location sharing and message senderAndroid Application on Location sharing and message sender
Android Application on Location sharing and message sender
 
Fake Currency detction Using Image Processing
Fake Currency detction Using Image ProcessingFake Currency detction Using Image Processing
Fake Currency detction Using Image Processing
 
Home automation using google assistant ppt
Home automation using google assistant ppt Home automation using google assistant ppt
Home automation using google assistant ppt
 
Vehicle Tracking System by Arduino UNO
Vehicle Tracking System by Arduino UNOVehicle Tracking System by Arduino UNO
Vehicle Tracking System by Arduino UNO
 
SIXTH SENSE-TECHNOLOGY
SIXTH SENSE-TECHNOLOGYSIXTH SENSE-TECHNOLOGY
SIXTH SENSE-TECHNOLOGY
 
Ppt
PptPpt
Ppt
 
Vehicle tracking system using gps and google map
Vehicle tracking system using gps and google mapVehicle tracking system using gps and google map
Vehicle tracking system using gps and google map
 
Suspicious Activity Detection
Suspicious Activity DetectionSuspicious Activity Detection
Suspicious Activity Detection
 
Vehicle tracking system using gps and gsm techniques
Vehicle tracking system using gps and gsm techniquesVehicle tracking system using gps and gsm techniques
Vehicle tracking system using gps and gsm techniques
 
IoT Solution To Regulate Vehicular Traffic
IoT Solution To Regulate Vehicular TrafficIoT Solution To Regulate Vehicular Traffic
IoT Solution To Regulate Vehicular Traffic
 
Android Internship report presentation
Android Internship report presentationAndroid Internship report presentation
Android Internship report presentation
 
Software engineering project on gps based Bus management system (GPS BMS)
Software engineering project on gps based Bus management system (GPS BMS)Software engineering project on gps based Bus management system (GPS BMS)
Software engineering project on gps based Bus management system (GPS BMS)
 
Final Year Projects (Computer Science 2013) - Syed Ubaid Ali Jafri
Final Year Projects (Computer Science 2013) - Syed Ubaid Ali JafriFinal Year Projects (Computer Science 2013) - Syed Ubaid Ali Jafri
Final Year Projects (Computer Science 2013) - Syed Ubaid Ali Jafri
 
Embedded system seminar
Embedded system seminarEmbedded system seminar
Embedded system seminar
 
Geofencing for mobile applications
Geofencing for mobile applicationsGeofencing for mobile applications
Geofencing for mobile applications
 
Vulnerability in ai
 Vulnerability in ai Vulnerability in ai
Vulnerability in ai
 
smart Home security
smart Home securitysmart Home security
smart Home security
 

Viewers also liked

Project Report on "Women Safety and Empowerment"
Project Report on "Women Safety and Empowerment"Project Report on "Women Safety and Empowerment"
Project Report on "Women Safety and Empowerment"Abhishek Suman
 
Mata Yasoda - Mobile Application for Anganwadi Centers (ICDS)
Mata Yasoda - Mobile Application for Anganwadi Centers (ICDS)Mata Yasoda - Mobile Application for Anganwadi Centers (ICDS)
Mata Yasoda - Mobile Application for Anganwadi Centers (ICDS)Nagarajan M
 
Location sharing and automatic message sender Android Application
Location sharing and automatic message sender Android ApplicationLocation sharing and automatic message sender Android Application
Location sharing and automatic message sender Android ApplicationKavita Sharma
 
SMART INTELLIGENT SECURITY SYSTEM FOR WOMEN
SMART INTELLIGENT SECURITY SYSTEM FOR WOMENSMART INTELLIGENT SECURITY SYSTEM FOR WOMEN
SMART INTELLIGENT SECURITY SYSTEM FOR WOMENIAEME Publication
 
Neural interfacing
Neural interfacingNeural interfacing
Neural interfacingKirtan Shah
 
Sagar Project Report (2)
Sagar Project Report (2)Sagar Project Report (2)
Sagar Project Report (2)Sagar Divetiya
 
Final Year Project Report on Self Tacit Zone (Location Based Android App)
Final Year Project Report on Self Tacit Zone (Location Based Android App)Final Year Project Report on Self Tacit Zone (Location Based Android App)
Final Year Project Report on Self Tacit Zone (Location Based Android App)Parthik Poshiya
 
Vehicle tracking system,be computer android report,android project report,gps...
Vehicle tracking system,be computer android report,android project report,gps...Vehicle tracking system,be computer android report,android project report,gps...
Vehicle tracking system,be computer android report,android project report,gps...Sujit9561
 
Location Tracking of Android Device Based on SMS.
Location Tracking of Android Device Based on SMS.Location Tracking of Android Device Based on SMS.
Location Tracking of Android Device Based on SMS.iCreateWorld
 
Microfinance : Project Report
Microfinance : Project ReportMicrofinance : Project Report
Microfinance : Project Reportyogi3250
 
Women safety in india
Women safety in indiaWomen safety in india
Women safety in indiaMahender Mahi
 
My Project Report Documentation with Abstract & Snapshots
My Project Report Documentation with Abstract & SnapshotsMy Project Report Documentation with Abstract & Snapshots
My Project Report Documentation with Abstract & SnapshotsUsman Sait
 
Android College Application Project Report
Android College Application Project ReportAndroid College Application Project Report
Android College Application Project Reportstalin george
 

Viewers also liked (19)

Project Report on "Women Safety and Empowerment"
Project Report on "Women Safety and Empowerment"Project Report on "Women Safety and Empowerment"
Project Report on "Women Safety and Empowerment"
 
Session 6.2 – Gender Security & Public Transport
Session 6.2 – Gender Security & Public TransportSession 6.2 – Gender Security & Public Transport
Session 6.2 – Gender Security & Public Transport
 
Mata Yasoda - Mobile Application for Anganwadi Centers (ICDS)
Mata Yasoda - Mobile Application for Anganwadi Centers (ICDS)Mata Yasoda - Mobile Application for Anganwadi Centers (ICDS)
Mata Yasoda - Mobile Application for Anganwadi Centers (ICDS)
 
CONNECTKaro 2015 - 4B - Women's Safety in Public Transport
CONNECTKaro 2015 - 4B - Women's Safety in Public TransportCONNECTKaro 2015 - 4B - Women's Safety in Public Transport
CONNECTKaro 2015 - 4B - Women's Safety in Public Transport
 
Location sharing and automatic message sender Android Application
Location sharing and automatic message sender Android ApplicationLocation sharing and automatic message sender Android Application
Location sharing and automatic message sender Android Application
 
SMART INTELLIGENT SECURITY SYSTEM FOR WOMEN
SMART INTELLIGENT SECURITY SYSTEM FOR WOMENSMART INTELLIGENT SECURITY SYSTEM FOR WOMEN
SMART INTELLIGENT SECURITY SYSTEM FOR WOMEN
 
Neural interfacing
Neural interfacingNeural interfacing
Neural interfacing
 
Sagar Project Report (2)
Sagar Project Report (2)Sagar Project Report (2)
Sagar Project Report (2)
 
advanced security system for women
advanced security system for womenadvanced security system for women
advanced security system for women
 
Mobile GPS Tracking
Mobile GPS TrackingMobile GPS Tracking
Mobile GPS Tracking
 
Safety of women
Safety of womenSafety of women
Safety of women
 
Final Year Project Report on Self Tacit Zone (Location Based Android App)
Final Year Project Report on Self Tacit Zone (Location Based Android App)Final Year Project Report on Self Tacit Zone (Location Based Android App)
Final Year Project Report on Self Tacit Zone (Location Based Android App)
 
Vehicle tracking system,be computer android report,android project report,gps...
Vehicle tracking system,be computer android report,android project report,gps...Vehicle tracking system,be computer android report,android project report,gps...
Vehicle tracking system,be computer android report,android project report,gps...
 
Location Tracking of Android Device Based on SMS.
Location Tracking of Android Device Based on SMS.Location Tracking of Android Device Based on SMS.
Location Tracking of Android Device Based on SMS.
 
Microfinance : Project Report
Microfinance : Project ReportMicrofinance : Project Report
Microfinance : Project Report
 
Women safety in india
Women safety in indiaWomen safety in india
Women safety in india
 
My Project Report Documentation with Abstract & Snapshots
My Project Report Documentation with Abstract & SnapshotsMy Project Report Documentation with Abstract & Snapshots
My Project Report Documentation with Abstract & Snapshots
 
Security of women ppt
Security of women pptSecurity of women ppt
Security of women ppt
 
Android College Application Project Report
Android College Application Project ReportAndroid College Application Project Report
Android College Application Project Report
 

Similar to A Mobile Based Women Safety Application (I Safe Apps)

A women secure mobile app for emergency usage (go safe app)
A women secure mobile app for emergency usage (go safe app)A women secure mobile app for emergency usage (go safe app)
A women secure mobile app for emergency usage (go safe app)eSAT Journals
 
Women Safety Application
Women Safety ApplicationWomen Safety Application
Women Safety ApplicationIRJET Journal
 
Suicide Analysis and Prevention Application using Machine Learning Classifiers
Suicide Analysis and Prevention Application using Machine Learning ClassifiersSuicide Analysis and Prevention Application using Machine Learning Classifiers
Suicide Analysis and Prevention Application using Machine Learning ClassifiersIRJET Journal
 
A Mobile Based Application for Journey Safety
A Mobile Based Application for Journey SafetyA Mobile Based Application for Journey Safety
A Mobile Based Application for Journey SafetyIOSRjournaljce
 
Mobile computing application risks in Zimbabwe
Mobile computing application risks in ZimbabweMobile computing application risks in Zimbabwe
Mobile computing application risks in ZimbabweIOSR Journals
 
A review on notification sending methods to the recipients in different techn...
A review on notification sending methods to the recipients in different techn...A review on notification sending methods to the recipients in different techn...
A review on notification sending methods to the recipients in different techn...IJICTJOURNAL
 
An Improved Personal Security System
An Improved Personal Security SystemAn Improved Personal Security System
An Improved Personal Security SystemIJERA Editor
 
Ericsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson
 
A Smart Alarm System for Women’s Security
A Smart Alarm System for Women’s SecurityA Smart Alarm System for Women’s Security
A Smart Alarm System for Women’s SecurityDr. Amarjeet Singh
 
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...Lisa Muthukumar
 
Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...
Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...
Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...AIRCC Publishing Corporation
 
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATIONA REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATIONClaire Webber
 
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION 2
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION 2A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION 2
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION 2Claire Webber
 
Igf 2013 daily news edititon 5
Igf 2013 daily news   edititon 5Igf 2013 daily news   edititon 5
Igf 2013 daily news edititon 5mataharitimoer MT
 
A review of cyberbullying and cyber threats in education 2
A review of cyberbullying and cyber threats in education 2A review of cyberbullying and cyber threats in education 2
A review of cyberbullying and cyber threats in education 2IAEME Publication
 
Psychological Factors of Mobile Phone Users and Social Media Networks on Indi...
Psychological Factors of Mobile Phone Users and Social Media Networks on Indi...Psychological Factors of Mobile Phone Users and Social Media Networks on Indi...
Psychological Factors of Mobile Phone Users and Social Media Networks on Indi...journal ijrtem
 
Smartphone For Mental Health Patients: A Double Edged Weapon?
Smartphone For Mental Health Patients: A Double Edged Weapon?Smartphone For Mental Health Patients: A Double Edged Weapon?
Smartphone For Mental Health Patients: A Double Edged Weapon?Yasir Hameed
 
IRJET- Modern Era and Security of Women: An Intellectual Device
IRJET- Modern Era and Security of Women: An Intellectual DeviceIRJET- Modern Era and Security of Women: An Intellectual Device
IRJET- Modern Era and Security of Women: An Intellectual DeviceIRJET Journal
 
IRJET- Modern Era and Security of Women: An Intellectual Device
IRJET- Modern Era and Security of Women: An Intellectual DeviceIRJET- Modern Era and Security of Women: An Intellectual Device
IRJET- Modern Era and Security of Women: An Intellectual DeviceIRJET Journal
 
SMART SECURITY DEVICE FOR WOMEN USING IOT
SMART SECURITY DEVICE FOR WOMEN USING IOTSMART SECURITY DEVICE FOR WOMEN USING IOT
SMART SECURITY DEVICE FOR WOMEN USING IOTIRJET Journal
 

Similar to A Mobile Based Women Safety Application (I Safe Apps) (20)

A women secure mobile app for emergency usage (go safe app)
A women secure mobile app for emergency usage (go safe app)A women secure mobile app for emergency usage (go safe app)
A women secure mobile app for emergency usage (go safe app)
 
Women Safety Application
Women Safety ApplicationWomen Safety Application
Women Safety Application
 
Suicide Analysis and Prevention Application using Machine Learning Classifiers
Suicide Analysis and Prevention Application using Machine Learning ClassifiersSuicide Analysis and Prevention Application using Machine Learning Classifiers
Suicide Analysis and Prevention Application using Machine Learning Classifiers
 
A Mobile Based Application for Journey Safety
A Mobile Based Application for Journey SafetyA Mobile Based Application for Journey Safety
A Mobile Based Application for Journey Safety
 
Mobile computing application risks in Zimbabwe
Mobile computing application risks in ZimbabweMobile computing application risks in Zimbabwe
Mobile computing application risks in Zimbabwe
 
A review on notification sending methods to the recipients in different techn...
A review on notification sending methods to the recipients in different techn...A review on notification sending methods to the recipients in different techn...
A review on notification sending methods to the recipients in different techn...
 
An Improved Personal Security System
An Improved Personal Security SystemAn Improved Personal Security System
An Improved Personal Security System
 
Ericsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety online
 
A Smart Alarm System for Women’s Security
A Smart Alarm System for Women’s SecurityA Smart Alarm System for Women’s Security
A Smart Alarm System for Women’s Security
 
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...
 
Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...
Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...
Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...
 
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATIONA REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION
 
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION 2
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION 2A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION 2
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION 2
 
Igf 2013 daily news edititon 5
Igf 2013 daily news   edititon 5Igf 2013 daily news   edititon 5
Igf 2013 daily news edititon 5
 
A review of cyberbullying and cyber threats in education 2
A review of cyberbullying and cyber threats in education 2A review of cyberbullying and cyber threats in education 2
A review of cyberbullying and cyber threats in education 2
 
Psychological Factors of Mobile Phone Users and Social Media Networks on Indi...
Psychological Factors of Mobile Phone Users and Social Media Networks on Indi...Psychological Factors of Mobile Phone Users and Social Media Networks on Indi...
Psychological Factors of Mobile Phone Users and Social Media Networks on Indi...
 
Smartphone For Mental Health Patients: A Double Edged Weapon?
Smartphone For Mental Health Patients: A Double Edged Weapon?Smartphone For Mental Health Patients: A Double Edged Weapon?
Smartphone For Mental Health Patients: A Double Edged Weapon?
 
IRJET- Modern Era and Security of Women: An Intellectual Device
IRJET- Modern Era and Security of Women: An Intellectual DeviceIRJET- Modern Era and Security of Women: An Intellectual Device
IRJET- Modern Era and Security of Women: An Intellectual Device
 
IRJET- Modern Era and Security of Women: An Intellectual Device
IRJET- Modern Era and Security of Women: An Intellectual DeviceIRJET- Modern Era and Security of Women: An Intellectual Device
IRJET- Modern Era and Security of Women: An Intellectual Device
 
SMART SECURITY DEVICE FOR WOMEN USING IOT
SMART SECURITY DEVICE FOR WOMEN USING IOTSMART SECURITY DEVICE FOR WOMEN USING IOT
SMART SECURITY DEVICE FOR WOMEN USING IOT
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 

Recently uploaded (20)

(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 

A Mobile Based Women Safety Application (I Safe Apps)

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 1, Ver. I (Jan – Feb. 2015), PP 29-34 www.iosrjournals.org DOI: 10.9790/0661-17112934 www.iosrjournals.org 29 | Page A Mobile Based Women Safety Application (I Safe Apps) Dr. Sridhar Mandapati1 , Sravya Pamidi2 , Sriharitha Ambati3 1 Associate Professor, Department of Computer Applications, R.V.R & J.C College of Engineering, Guntur, India 2 Department of Computer Applications, R.V.R & J.C College of Engineering, Guntur, India 3 Department of Computer Science & Engineering, R.V.R & J.C College of Engineering, Guntur, India Abstract: Many unfortunate incidents have been taking place in woman’s case. Problems may come from any direction such as women walking on the road after the work, going to super market or many other reasons for which they go alone. People at home are not sure of their return safely. Another factor is woman die without knowing the reason as they attend excursions and industrial trips conducted by the organizations. It happens due to attacks on woman but not suicides. In 2013 there happened an incident which is a gag rape in New Delhi in the case of 23 year old woman in bus at 9:30 PM. Another incident that has taken place at Mumbai in the case of woman who is leaving her native place after Christmas holidays has been kidnapped and killed. These are some of the problems that have taken place in the day to day life of women. In order to overcome such problems faced by women the I Safety (women security apps) mobile based application is not only necessary to use but also plays a pivotal role with android software. Keywords: apps, android, mobile, safety, Women. I. Introduction Ban Ki-Moon, the secretary general of United Nations stated that “There is one universal truth, applicable to all countries, cultures and communities: violence against women is never acceptable, never excusable, and never tolerable” [1]. Violence against women is a significant public health problem, as well as a fundamental violation of women‟s human rights [2]. There are three reasons why mobile technology will reduce violence against women in public places. They are easily accessible, crowd sourcing and affordable scalability [3] The capital city New Delhi in 2012 arrested the attention of not only the people of the nation but also the entire world. A rape incident captured the attention of the entire human kind that occurred on 16th December 2012 at a place Munirka, a neighbourhood in south Delhi which was a fatal assault. A 23 year old woman physiotherapy (intern) was hit and molested by a gang at 9:30 PM when she was travelling in a private bus with a male counterpart. They were returning after watching the film Life of Pi in saket, south Delhi and boarded an of duty charter bus at Munirka to Dwaraka, which was driven by joy riders at that time. The family members and colleagues of TCS software engineer Esther Anuhaya found her body with the help of a Vijayawada police team. Her parents spent the entire Thursday looking for her in Bhandup (East) as her last call signal on January 5th was from Bhandupeshwar Kund in Kanjurmarg, which falls under Bhandup (East) jurisdiction. The family had been trying to trace her where about by showing the locals her photographs. Locals said that the spot where her body was found is a hangout for criminals. The body of Anuhaya has been procured by Vijayawada police. Another 19-year old Pharmacy student named Ayesha Miran was raped and murdered brutally by 22- year old P. Satyam Babu in a hostel at Vijayawada. A body with stab injuries was found in the bathroom on Dec 27, 2007. A letter dropped by the 'murderer' stated that the girl was raped and murdered for refusing his request for 'love'. An „app‟ is a small, specialised software program, easily downloadable and installed onto mobile devices such as Smartphone‟s or tablet computers. The use of „apps‟ has been popularised by the Apple‟s „App Store‟ and also by Google‟s „Play Store‟ [4]. In this paper, some app‟s created to know whether a woman is safe or not? Which indicates the present state of affairs of the woman by touching the option, which also indicates the location of the endangered woman they gave a phone call, video forwarding, fake calls, and location of the person, first-aid details, and application having the instructions that is the way to use the application. The rest of the paper is organized as follows. A literature review is presented in section 2 followed by some methods and materials in section 3. The experimental setup described in section 4 followed by the results and discussions in section 5. Finally, the paper concludes with future research direction in section 6.
  • 2. A Mobile Based Women Safety Application (I Safe Apps) DOI: 10.9790/0661-17112934 www.iosrjournals.org 30 | Page II. Related Research Nicole Westmarland et al [4] discussed on protecting women‟s safety? The main purpose of their study is to explore the use of smartphone‟s in relation to domestic and sexual violence. In report [2] violence against women is a global public health problem, 35% of women worldwide have experienced either physical and/or sexual intimate partner violence or non-partner sexual violence. The report also details the effects of violence on women‟s reproductive and mental health. In [5] the authors seek to place questions of surveillance technologies into a theoretical framework that foregrounds the challenges that new surveillance technologies pose to anti- violence movements. Specifically they address the impact of surveillance technologies in the practice of violence and some proposed solutions, and consider the ways that surveillance technologies are used disproportionately in the criminalization of marginalized groups. By placing violence against women at the centre of analysis aim to complicate concerns related to surveillance technologies. In [6] the author discussed that the technology is used in circumstances of intimate terrorism. It will examine how technology is used as a batterer's tool in exerting coercive control over a victim. It will also look at the changes in the laws as the legal system strives to keep pace with the rapid advancement of technology. In particular, the recent use of GPS monitoring of intimate terrorists will be analyzed. This analysis will identify some of the problems associated with the on-going legal changes. However, the same advancements may also allow perpetrators to adapt and/or escalate their offending behaviour [7]. In a US study on domestic violence and information technology, Dimond et al [8] found that users of mobiles and social networks were making trade-offs between potential harm (e.g. continued abuse) and benefit (e.g. support). Worldwide, the sales of new smartphones are forecast to reach 700 million by 2015 [9]. In the UK, 92% of adults personally own or use a mobile phone and 39% use their mobile handset to access the internet [10]. Furthermore, 40% of UK adults own a smartphone, and tablet ownership jumped from 2% to 11% in just 12 months. Based on the advanced mobile and software capabilities, the smartphone has become a ubiquitous everyday communication device, offering access to powerful computational software that is often a multiplatform and sensor rich[11]. In the study [12] provided insight into the opportunities and challenges involved in delivering health- related behavioral interventions through smartphone apps. The findings suggested a number of valued features and characteristics that app developers may wish to consider when creating health behavior apps. Findings also highlighted several major challenges that appeared the need to further consideration and research to ensure the development of effective and well-accepted behavior change apps. In report [13] by Vodafone on Connected Women, How mobile can support women‟s economic and social empowerment. The use of mobiles improves the women‟s access to literacy, banking, health, empowerment and business opportunities. III. Methods And Materials There might be a situation in which the person has to travel alone a long distance at an odd hour and perhaps even by public transport and may face some danger. At such a time, a personal safety app might not only be wise to have easy access to, it might also give you a lot of confidence needed. There might be a situation that when women had an accident in the late night and there are no one to help and to take care of them. In such situations the person will not be able to tell the situation that he/she facing. And they do not know the basic first- aid details and to know the person where the incident has happened. To escape from the un-wanted meetings we do not know the way to escape from that meeting because we do not know the fake calls working. There are no mobile applications for the person‟s safety, if the person is in danger the people have to make a call to his friends or relatives and have to be explaining the position and problem and generally we do not know the first aid details. Some drawbacks in the existing system are discussed below:  The person who is in danger (he/she) can‟t explain and show his/her position and situation.  The person doesn‟t know the first aid details. In proposed system with the push of one button, people can alert selected contacts that the person is in danger and share the location. With this personal safety app, you'll never walk alone!! There might be a situation in which have you to travel alone a long distance at an odd hour and perhaps even by public transport and may face some danger. At such a time, a personal safety app might not only be wise to have easy access to, it might also give you a lot of much needed confidence. The personal safety application requires the name and number of the person who is to be contacted in times of emergency. Users can add multiple people in the emergency contacts list. These are the people who will receive notifications or SMS in case of an emergency. All it requires is the user's action to trigger an SOS button provided and it shoots messages as fast as the device can manage. Once the SOS button is hit, the people in the emergency contacts will get a message like: I am in an emergency; followed by another message, which has the exact or approximate GPS location of
  • 3. A Mobile Based Women Safety Application (I Safe Apps) DOI: 10.9790/0661-17112934 www.iosrjournals.org 31 | Page the cell phone. The user can also make audio or video call. This app also provides necessary first-aid measures that should be taken at the time of emergency situations. Features:  Let the family and friends know that you are in danger and where you are? Declare an emergency whenever you sense a danger, when you can disengage the emergency.  Provides necessary first-aid measures that should be taken at the time of some dangerous situations.  Let your family and friends know your path to the destination.  Creates emergency contacts that will be notified by default of all the actions you make in the application. Also display a list of detail contacts of cops, firemen, hospitals etc., nearby your location. IV. Experimental Setup The experiments were performed using a Intel(R) Core(TM) i3 M380@2.53GHz CPU with 4GB RAM and 80 GB hard disk, android mobile with the support of wifi. In the development of the I safety (woman security application) mobile app the software requirements are Front End is Android Application, Web Application is Servlet Java development kit 1.6.0 or above, Eclipse IDE for Android , My Eclipse IDE for java web Applications Android SDK 20.0.1 , Connective wifi router software. V. Results And Discussion By just touching the application from the mobile screen the options will appear and by choosing the particular options the appropriate function will take place. In Fig. 1, it is seen that the available options in the apps. By choosing the option “Add guardians” from the main screen then the screen navigates to the other screen and the other screen is having two options they are “Add from contacts”, “Add new contacts” is shown in Fig. 2. If the option Add from contacts is selected then it retrieves from the phone contacts and then again it should be saved in JSON data base is shown in Fig. 3. After selecting the guardians from the phone contacts the selected mobile numbers are displayed is shown in Fig. 4 and the contact numbers are stored in the JBOS. It is nothing but memory used in the android based mobile phones. If the option Add new contacts is selected then it gives the other popup box having the text boxes to enter the contact name and contact number and it also saved in JSON database is shown in Fig. 5. The call sending is done by simply touching the option SOS from main screen then it retrieves the contacts which are saved in the JSON database is shown in Fig. 6 and it performs the action and at the same time it sends the location url of the person through the message format where she/he used this application when they are in danger is shown in Fig. 7. By just touching the location URL got from the message then it gets the location where the person is in danger by showing us in blue colour spot in the Google Map is shown in Fig. 8. By zooming the Map guardian can easily find out the accurate location of the unsafe woman is shown in Fig. 9. Fig. 1: Main Screen Fig. 2: Add Guardians Fig. 3: Select Contacts
  • 4. A Mobile Based Women Safety Application (I Safe Apps) DOI: 10.9790/0661-17112934 www.iosrjournals.org 32 | Page Fig. 4: Selected Guardian Fig. 5: Add New Contact Fig. 6: SOS Fig. 7: Message Format Fig. 8: Google Map Fig. 9: Map Zooming Another important option from main screen is Fake call. This option is very much helpful while the un- necessary conversations is going in between the people then to protect over self we think that if anybody calls then I can leave from this meeting. In such situations this option fake call is very much helpful. The functionality is just it gets ring tone just like getting incoming call through that person can easy to escape from the un-necessary conversations is shown in Fig. 10. When the Fake call is activated it means that a fake call is accepted then it stops the ringing and it also has another option that is Hang Up option just like call cutting is shown in Fig. 11. There is another important option in the main screen is video call. This option gives the video of the person that he/she has taken. That is if the person is in danger position that is unable to tell the position then she/he can take the video and share via Email or Gmail shown in Fig. 12. By clicking on the First aid option from the main screen only person can know the First-aid details for various problems like unconscious and not breathing, choking, bleeding heavily, burns, heart attack, diabetes shown in Fig. 13. If the person has touch the option to know the first aid details of unconscious and not breathing then click on that option then it navigates to the other screen shown in Fig. 14. To know the details of choking then touch on that option then it gets the information about that is shown in Fig. 15. If the person will want to know the details of bleeding and burns are shown in Fig. 16 and Fig. 17.
  • 5. A Mobile Based Women Safety Application (I Safe Apps) DOI: 10.9790/0661-17112934 www.iosrjournals.org 33 | Page Fig. 10: Fake call Fig. 11: Hang up call Fig. 12: Video Call Fig. 13: First aid details Fig. 14: Unconscious details Fig. 15: Chocking details Fig. 16: Bleeding details Fig. 17: Burns Details Fig. 18: Heart attack details
  • 6. A Mobile Based Women Safety Application (I Safe Apps) DOI: 10.9790/0661-17112934 www.iosrjournals.org 34 | Page Another important problem now a day‟s many people face is heart attack. The people will want to know about the first aid details of Heart attack then by just touching the related option then it gets the related information which shown in Fig. 18. Now a day‟s most of the people are suffering from diabetes and this app also provide information regarding this problem shown in Fig. 19. This app also provides the details of instruction by touching this option from the main screen shown in Fig. 20. Fig. 19: Diabetes details Fig. 20: Instructions VI. Conclusion And Future Work This mobile application is very much helpful for any woman. Because when a woman is in danger position then she simply touch this I Safety mobile app and alert their guardians that the woman is in danger. By simply touching the app it sends the call for the first added guardian number and sends the message that she was in danger and sends the location message to the all saved guardian contacts. Through this mobile app we can alert the people at home that a woman belonging to their house is safe or not. Future Enhancements: This mobile application is helpful in future when any problem arises in travelling or any kind of situations.  As the technology emerges, it is possible to upgrade the system and can be adaptable to desired environment.  Because it is based on object-oriented design, any further changes can be easily adaptable.  Based on the future security issues, security can be improved using emerging technologies. References [1]. Report of the Fourth World Conference on Women. New York, United Nations, 1995 (A/CONF.177/20/Rev.1) (http://www.un.org/womenwatch/confer/beijing/reports/, accessed 1 April 2013). [2]. World Health Organization, “Global and regional estimates of violence against women: prevalence and health effects of intimate partner violence and non-partner sexual violence, Geneva: World Health Organization (2013). [3]. http://www.mappsafe.com/blog-1-feb-14-three-reasons-why-mobile-technology-will-reduce-violence-against-women [4]. Nicole Westmarland, Mariann Hardey, et al. “Protecting Women‟s Safety? The use of smartphone „apps‟ in relation to domestic and sexual violence‟, Durham University, Durham centre for research into violence and abuse (2013). [5]. Mason, C and Shoshana Magnet, “Surveillance studies and violence against women”, surveillance & society 10(2):105 – 118 (2012). [6]. Justine A. Dunlap, Intimate Terrorism and Technology: There's an App for That, 7 U. Mass. L. Rev. 10 (2012). [7]. Elliott, J. and McCartan K. The Reality of Trafficked People‟s Access to Technology. The Journal of Criminal Law 77(3): 255- 273(2013). [8]. Dimond, J.P., Fiesler, C. and Bruckman, A.S. Domestic violence and information communication technologies, Interacting with Computers, 23(5): 413-421(2011). [9]. Portio Research. Portio research mobile factbook 2011. Chippenham, UK. Retrieved from http://www.portioresearch.com/Portio%20Research%20Ltd%20Mobile%20Factbook%202011.pdf (2011). [10]. Ofcom. Children and Parents: Media Use and Attitudes Report (2012). [11]. Dennison, L., Morrison, L., Conway, G., & Yardley, L. (2013).Opportunities and Challenges for Smartphone Applications in Supporting Health Behavior Change: Qualitative Study, Journal of medical Internet research, 15(4): e86. [12]. Qualcomm Wireless ReachTM, Vital Wave, and GSMA. Transforming Women‟s Livelihoods Through Mobile Broadband. Report, February 2014. Available at: http://www.qualcomm.com/mwomenreport [13]. Vodafone. “Connected Women: How mobile can support women‟s economic and social empowerment”. Report, March, 2014.