SlideShare a Scribd company logo
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 3, Ver. IV (May – Jun. 2015), PP 01-04
www.iosrjournals.org
DOI: 10.9790/0661-17340104 www.iosrjournals.org 1 | Page
Application for Women Safety
1
S.Sangeetha, 2
P.Radhika PG Scholar,
Department of MCA, Panimalar Engineering College
1
sangeemca1991@gmail.com,2
radhika91mca@gmail.com
Abstract: This project presents an alert system for Women safety detection using common commercially
available electronic devices to both detect the problem and alert authorities. We use an Android based smart
phone with an integrated features that alert and provide location based information to alert authorities. Data
from the application is evaluated with several threshold based AES algorithms and position data to determine a
problem.
Our system provides a realizable, cost effective solution to problem detection using a simple graphical interface
while not overwhelming the user with uncomfortable sensors. Problem is very powerful software especially
developed for the safety of girls, whenever some body is in trouble they don’t have to sit and find contacts or
find ways to send short message service, or message the near ones. They might not have so much time.. All that
they have to do is shake the smart phone above the threshold value, vigorously. Immediately a message alert is
sent to the person’s mom, dad and whoever they wish to, if their guardians also have a smart phone. Even
though if it is in silent mode. When a message called alert is received it automatically changes its profile to
general, and gives a message notification YOUR DAUGHTER IS IN TROUBLE PLZ HELPS…. PLZ HELP….
PLZ HELP…. REPEATEDLY AS A message until they seen and stop it..
Now a day security of women is becoming very poor and the need for this kind of this application is steadily
increasing work wise, we will develop a routine schedule based mechanism to monitor the women’s security
using GPS (Global Positioning System), GPRS (General Packet Radio Service), etc.…
Keywords: Smartphone, GPS, GPRS…
I. Introduction
This application is generally meant for the attention of the authorities or public in the emergency
response capabilities such as terrorist attacks and the natural disaster by facilitating the communication We will
be tracking the location of the person via GPS and storing the details of the current location into a remote server
via GPRS consecutively, we will also be tracking the schedule of the person as per the schedule list which is
being uploaded by the person and we will be sending SMS to the relatives of the concerned person about the
schedule their current location of the concerned person that time. So that they will come to know about the
status and if something is wrong, we will be having another set of oppositions to give a call to a police, social
workers, volunteer organizations, etc.
With their respective along the mobile phones. The difficulties in the existing application are the lack
of situational awareness and communication terminology among their respective. Due to this response and
recovery is Difficult to the authorities. In respect of the public safety with the support of the network provider
the application runs in the android phones in efficient way to identify and recover the problem by the natural
disaster or terrorist attacks etc… Furthermore users are likely to operate the mobile devices for the security
purpose to intimate the problem detection to their respective in the emergency cases.
II. Application Requirements
To develop the application android based mobile application the station and the environment of the
surrounding has to been interviewed then the dangerous and the suspicious activates should be notified to the
device by the user .if the device detects the problem then only other process creates the attention for reporting to
the authority.
1)Time Schedule:
When the apps get installed it traces out the IMEI, SIM, mobile number and stores on the remote
server, the daily schedule list gets uploaded by the person from her mobile and get tracked as per the schedule
list, if there is any deviation in the schedule they relatives of the person will get an SMS along with the current
location and the schedule and Police station members will get a call from the mobile.
Application for Women Safety
DOI: 10.9790/0661-17340104 www.iosrjournals.org 2 | Page
2) Tracking:
The GPS will regularly transmit the latitude and longitude of the person and via GPRS we will store
the entire transmitted cloud server; if the person is lost we can trace the end location with this kind of approach.
3) Notification:
When the person is in trouble, when she presses an alarm in the application all her relatives,
voluntary organization members, police men will get an SMS with her full contact details along with the current
location from where the message has been delivered. Using the IMEI number the policemen can track the
location where they are travelling.
4) Network provider support:
Network provider has got the important role, by sending the commands through the short message type
to the different applications.
5) GPS (Global positioning system)
The GPS, elaborated as Global Positioning System, is a satellite based navigation system made up of a
network of 24 satel-lites placed into orbit by the U.S. GPS works in any weather conditions, anywhere in the
world, 24 hours a day. There are no subscription fees or setup charges to use GPS . A GPS can help us to
determine exactly where we are at any given moment. Not only can a GPS give us the name of the street we
might be traveling on, but many GPS systems can also give us the exact latitude and longitude of where you are
located. On the other hand, Android mobile platform is becoming more popular to the users for its multi-
dimensional purposes.Tracking System via Android Device” uses GPS and any mo-bile phones having an
Android operating system to track the location of a person whenever necessary.
III. System Study
Existing system
The women have to dial a number to call a police or send a Short Messaging Service (SMS) to the
particular subscriber code, after they received the service they will get in touch with you later and there is no
time to make a call or SMS. There are also so many volunteer organizations all over the world to help them, but
they could not able to get those messages.
Proposed system
We will be tracking the location of the person via GPS and storing the details of the current location
into a remote server via GPRS consecutively, we will also be tracking the schedule of the person as per the
schedule list which is being uploaded by the person and we will be sending SMS to the relatives of the
concerned person about the schedule their current location of the concerned person that time. So that they will
come to know about the status and if something is wrong, we will be having another set of oppositions to give a
call to a police, social workers, volunteer organizations, etc.
Features
 This project presents an alert system for Women safety detection.
 The system provides a realizable and efficient.
 The application is used Advanced Encryption Standard (AES) algorithm.
 The application is easier to use all the woman.
 The application is normal budget.
Application for Women Safety
DOI: 10.9790/0661-17340104 www.iosrjournals.org 3 | Page
IV. Architecture
V. Operating System
By considering the today’s environment most of the people using the android based mobile phones and
android is the open source which can be used and adapted easily so android operating system can be used.
Android is an operating system based on the Linux kernel, and designed primarily for touch screen
mobile devices such as smart phones and tablet computers. Initially developed by Android, Inc., which Google
backed financially .Android was unveiled in 2007 along with the founding of the Open Handset Alliance: a
consortium of hardware, software, and telecommunication companies devoted to advancing open standards for
mobile devices. The first publicly available Smartphone running Android, the HTC Dream, was released on
October 22, 2008
The user interface of Android is based on direct manipulation, using touch inputs that loosely
correspond to real-world actions, like swiping, tapping, pinching and reverse pinching to manipulate on-screen
objects. Internal hardware such as accelerometers, gyroscopes and proximity sensors are used by some
applications to respond to additional user actions, for example adjusting the screen from portrait to landscape
depending on how the device is oriented. Android allows users to customize their home screens with shortcuts
to applications and widgets, which allow users to display live content, such as emails and weather information,
directly on the home screen. Applications can further send notifications to the user to inform them of relevant
information, such as new emails and text messages.
Android is open source and Google releases the source code under the Apache License. This open-
source code and permissive licensing allows the software to be freely modified and distributed by device
manufacturers, wireless carriers and enthusiast developers. In practice, Android devices ship with a combination
of open source and proprietary software. Android has a large community of developers writing applications
("apps") that extend the functionality of devices, written primarily in the Java programming language. In
October 2012, there were approximately 700,000 apps available for Android, and the estimated number of
applications downloaded from Google Play, Android's primary app store, was 25 billion. A developer survey
conducted in April–May 2013 found that Android is the most popular platform for developers, used by 71% of
the mobile developer population.
Android is the world's most widely used Smartphone platform, overtaking Symbian in the fourth
quarter of 2010. Android is popular with technology companies who require a ready-made, low-cost,
customizable and lightweight operating system for high tech devices. Despite being primarily designed for
phones and tablets, it also has been used in televisions, games consoles, digital cameras and other electronics.
Android's open nature has encouraged a large community of developers and enthusiasts to use the open-source
Application for Women Safety
DOI: 10.9790/0661-17340104 www.iosrjournals.org 4 | Page
code as a foundation for community-driven projects, which add new features for advanced user or bring Android
to devices which were officially released running other operating systems.
As of November 2013, Android's share of the global Smartphone market, led by Samsung products, has
reached 81%.The operating system's success has made it a target for patent litigation as part of the so-called
"Smartphone" between technology companies. As of May 2013, 48 billion apps have been installed from the
Google Play store, and as of September 2013, 1 billion Android devices have been activated.
1.Applications
These are applications written in Java. Some of basic applications include a calendar, email client, SMS
program, maps, making phone calls, accessing the Web browser, accessing your contacts list and others.
If you are an average user, this is the layer you will us most, rest all layers are used by Google programmers,
developers and hardware manufacturers.
2. Application Framework
This is the skeleton or framework which all android developers has to follow. The developers can
access all framework APIs an manage phone’s n to keyword ki: basic functions like resource allocation,
switching between processes or programs, telephone applications, and keeping track of the phone’s physical
location. The architecture is well designed to simplify the reuse of components. Think of the application
framework as a set of basic tools with which a developer can build much more complex tools.
3. Libraries
This layer consists of Android libraries written in C, C++, and used by various systems. This library
tells the device how to handle different kinds of data and are exposed to Android developers via Android
Application framework. Some of these libraries includes media, graphics, 3d, SQLite, web browser library etc.
The Android runtime layer which includes set of core java libraries and DVM (Dalvik Virtual Machine) is also
located in same layer.
4. Runtime Android
This layer includes set of base libraries that are required for java libraries. Every Android application
gets its own instance of Dalvik virtual machine. Dalvik has been written so that a device can run multiple VMs
efficiently and it executes files in executable (.Dex) optimized for minimum memory.
5. Kernel – Linux:
This layer includes Android’s memory management programs, security settings, power management
software and several drivers for hardware, file system access, networking and inter-process-communication. The
kernel also acts as an abstraction layer between hardware and the rest of the software stac.
VI. Conclusion
The problem of the women safety is increased rapidly in this environment, so I proposed as an effective
Android application to prevent such type of the suspicious or natural disaster, by alerting the concern authorities
using the android mobile phone which helps to stop such type of illegal activates and to trace the concern..
References
[1]. Michael Burton ,Dohn Ferker (2012). Android Application For Dummies. 2nd ed. 111,river street,Hoboker: jhon wiely and
sons,inc. p12-90.
[2]. Cook book,reipeng liu (2013). Android Application devlopment kit. Mumbai: packt bimingam. p1-50,p67-90..
[3]. Peter Erickson, Andrew Weinert, and Dr. Paul Breimyer,Matt Samperi, Jason Huff, Carlos Parra, and Dr. Scarlett Miller. (2013).
Designing Public Safety Mobile Applications for Disconnected, Interrupted, and Low Bandwidth Communication Environments.
IEEE. 10 (978-1-4799-1535-4/13/$31.00), p790-796.

More Related Content

What's hot

An Intelligence Security System for Women
An Intelligence Security System for WomenAn Intelligence Security System for Women
An Intelligence Security System for Women
Aishwarya K. M.
 
SIXTH SENSE TECHNOLOGY
SIXTH SENSE TECHNOLOGYSIXTH SENSE TECHNOLOGY
SIXTH SENSE TECHNOLOGY
Chaitanya Ram
 
advanced security system for women
advanced security system for womenadvanced security system for women
advanced security system for women
Thooyavan Venkatachalam
 
Sixth sense tech. from vikas
Sixth sense tech. from vikasSixth sense tech. from vikas
Sixth sense tech. from vikas
vikasthegod
 
women security on IOT
women security on IOTwomen security on IOT
women security on IOT
Nandhini30mani
 
Sixth Sense Technology
Sixth Sense TechnologySixth Sense Technology
Sixth Sense Technology
Raga Deepthi
 
Women’s Safety Jacket
Women’s Safety JacketWomen’s Safety Jacket
Women’s Safety Jacket
SubmissionResearchpa
 
ATM System by image processing
ATM System by image processingATM System by image processing
ATM System by image processing
shahab islam
 
Accident messaging system using GPS,GSM and MEMS
Accident messaging system using GPS,GSM and MEMSAccident messaging system using GPS,GSM and MEMS
Accident messaging system using GPS,GSM and MEMS
Jithin Prasad
 
Touchless Touchscreen
Touchless TouchscreenTouchless Touchscreen
Touchless Touchscreen
Saptarshi Dey
 
PIR sensing with arduino
PIR sensing  with  arduinoPIR sensing  with  arduino
PIR sensing with arduino
chetan kadiwal
 
TelePresence
TelePresenceTelePresence
SMART BLIND STICK
SMART BLIND STICK SMART BLIND STICK
SMART BLIND STICK
UpendraSingamsetty
 
CHILD TRACKING SYSTEM
CHILD TRACKING SYSTEMCHILD TRACKING SYSTEM
CHILD TRACKING SYSTEM
Techno Electronics
 
soldier tracking and health monitoring system
soldier tracking and health monitoring systemsoldier tracking and health monitoring system
soldier tracking and health monitoring system
Joshpin Bala.B
 
ACCIDENT DETECTION SYSTEM PPT
ACCIDENT DETECTION SYSTEM PPTACCIDENT DETECTION SYSTEM PPT
ACCIDENT DETECTION SYSTEM PPT
Joshnasai
 
Sixth sense technology ppt
Sixth sense technology pptSixth sense technology ppt
Sixth sense technology ppt
Mohammad Adil
 
Technical seminar on virtual smart phone
Technical seminar on virtual smart phoneTechnical seminar on virtual smart phone
Technical seminar on virtual smart phone
Akshitha Chutke
 
Sixth Sence Technology
Sixth Sence TechnologySixth Sence Technology
Sixth Sence Technology
Beat Boyz
 
Browser Security
Browser SecurityBrowser Security
Browser Security
Roberto Suggi Liverani
 

What's hot (20)

An Intelligence Security System for Women
An Intelligence Security System for WomenAn Intelligence Security System for Women
An Intelligence Security System for Women
 
SIXTH SENSE TECHNOLOGY
SIXTH SENSE TECHNOLOGYSIXTH SENSE TECHNOLOGY
SIXTH SENSE TECHNOLOGY
 
advanced security system for women
advanced security system for womenadvanced security system for women
advanced security system for women
 
Sixth sense tech. from vikas
Sixth sense tech. from vikasSixth sense tech. from vikas
Sixth sense tech. from vikas
 
women security on IOT
women security on IOTwomen security on IOT
women security on IOT
 
Sixth Sense Technology
Sixth Sense TechnologySixth Sense Technology
Sixth Sense Technology
 
Women’s Safety Jacket
Women’s Safety JacketWomen’s Safety Jacket
Women’s Safety Jacket
 
ATM System by image processing
ATM System by image processingATM System by image processing
ATM System by image processing
 
Accident messaging system using GPS,GSM and MEMS
Accident messaging system using GPS,GSM and MEMSAccident messaging system using GPS,GSM and MEMS
Accident messaging system using GPS,GSM and MEMS
 
Touchless Touchscreen
Touchless TouchscreenTouchless Touchscreen
Touchless Touchscreen
 
PIR sensing with arduino
PIR sensing  with  arduinoPIR sensing  with  arduino
PIR sensing with arduino
 
TelePresence
TelePresenceTelePresence
TelePresence
 
SMART BLIND STICK
SMART BLIND STICK SMART BLIND STICK
SMART BLIND STICK
 
CHILD TRACKING SYSTEM
CHILD TRACKING SYSTEMCHILD TRACKING SYSTEM
CHILD TRACKING SYSTEM
 
soldier tracking and health monitoring system
soldier tracking and health monitoring systemsoldier tracking and health monitoring system
soldier tracking and health monitoring system
 
ACCIDENT DETECTION SYSTEM PPT
ACCIDENT DETECTION SYSTEM PPTACCIDENT DETECTION SYSTEM PPT
ACCIDENT DETECTION SYSTEM PPT
 
Sixth sense technology ppt
Sixth sense technology pptSixth sense technology ppt
Sixth sense technology ppt
 
Technical seminar on virtual smart phone
Technical seminar on virtual smart phoneTechnical seminar on virtual smart phone
Technical seminar on virtual smart phone
 
Sixth Sence Technology
Sixth Sence TechnologySixth Sence Technology
Sixth Sence Technology
 
Browser Security
Browser SecurityBrowser Security
Browser Security
 

Viewers also liked

Mata Yasoda - Mobile Application for Anganwadi Centers (ICDS)
Mata Yasoda - Mobile Application for Anganwadi Centers (ICDS)Mata Yasoda - Mobile Application for Anganwadi Centers (ICDS)
Mata Yasoda - Mobile Application for Anganwadi Centers (ICDS)
Nagarajan M
 
Session 6.2 – Gender Security & Public Transport
Session 6.2 – Gender Security & Public TransportSession 6.2 – Gender Security & Public Transport
Session 6.2 – Gender Security & Public Transport
WRI Ross Center for Sustainable Cities
 
CONNECTKaro 2015 - 4B - Women's Safety in Public Transport
CONNECTKaro 2015 - 4B - Women's Safety in Public TransportCONNECTKaro 2015 - 4B - Women's Safety in Public Transport
CONNECTKaro 2015 - 4B - Women's Safety in Public Transport
WRI Ross Center for Sustainable Cities
 
Location sharing and automatic message sender Android Application
Location sharing and automatic message sender Android ApplicationLocation sharing and automatic message sender Android Application
Location sharing and automatic message sender Android Application
Kavita Sharma
 
SMART INTELLIGENT SECURITY SYSTEM FOR WOMEN
SMART INTELLIGENT SECURITY SYSTEM FOR WOMENSMART INTELLIGENT SECURITY SYSTEM FOR WOMEN
SMART INTELLIGENT SECURITY SYSTEM FOR WOMEN
IAEME Publication
 
Sagar Project Report (2)
Sagar Project Report (2)Sagar Project Report (2)
Sagar Project Report (2)
Sagar Divetiya
 
Mobile GPS Tracking
Mobile GPS TrackingMobile GPS Tracking
Mobile GPS Tracking
Sunil Kumar R
 
Project Report on "Women Safety and Empowerment"
Project Report on "Women Safety and Empowerment"Project Report on "Women Safety and Empowerment"
Project Report on "Women Safety and Empowerment"
Abhishek Suman
 
Final Year Project Report on Self Tacit Zone (Location Based Android App)
Final Year Project Report on Self Tacit Zone (Location Based Android App)Final Year Project Report on Self Tacit Zone (Location Based Android App)
Final Year Project Report on Self Tacit Zone (Location Based Android App)
Parthik Poshiya
 
Vehicle tracking system,be computer android report,android project report,gps...
Vehicle tracking system,be computer android report,android project report,gps...Vehicle tracking system,be computer android report,android project report,gps...
Vehicle tracking system,be computer android report,android project report,gps...
Sujit9561
 
Location Tracking of Android Device Based on SMS.
Location Tracking of Android Device Based on SMS.Location Tracking of Android Device Based on SMS.
Location Tracking of Android Device Based on SMS.
iCreateWorld
 
Microfinance : Project Report
Microfinance : Project ReportMicrofinance : Project Report
Microfinance : Project Report
yogi3250
 
My Project Report Documentation with Abstract & Snapshots
My Project Report Documentation with Abstract & SnapshotsMy Project Report Documentation with Abstract & Snapshots
My Project Report Documentation with Abstract & Snapshots
Usman Sait
 
Security of women ppt
Security of women pptSecurity of women ppt
Security of women ppt
abhilashamehta
 
Android College Application Project Report
Android College Application Project ReportAndroid College Application Project Report
Android College Application Project Report
stalin george
 

Viewers also liked (15)

Mata Yasoda - Mobile Application for Anganwadi Centers (ICDS)
Mata Yasoda - Mobile Application for Anganwadi Centers (ICDS)Mata Yasoda - Mobile Application for Anganwadi Centers (ICDS)
Mata Yasoda - Mobile Application for Anganwadi Centers (ICDS)
 
Session 6.2 – Gender Security & Public Transport
Session 6.2 – Gender Security & Public TransportSession 6.2 – Gender Security & Public Transport
Session 6.2 – Gender Security & Public Transport
 
CONNECTKaro 2015 - 4B - Women's Safety in Public Transport
CONNECTKaro 2015 - 4B - Women's Safety in Public TransportCONNECTKaro 2015 - 4B - Women's Safety in Public Transport
CONNECTKaro 2015 - 4B - Women's Safety in Public Transport
 
Location sharing and automatic message sender Android Application
Location sharing and automatic message sender Android ApplicationLocation sharing and automatic message sender Android Application
Location sharing and automatic message sender Android Application
 
SMART INTELLIGENT SECURITY SYSTEM FOR WOMEN
SMART INTELLIGENT SECURITY SYSTEM FOR WOMENSMART INTELLIGENT SECURITY SYSTEM FOR WOMEN
SMART INTELLIGENT SECURITY SYSTEM FOR WOMEN
 
Sagar Project Report (2)
Sagar Project Report (2)Sagar Project Report (2)
Sagar Project Report (2)
 
Mobile GPS Tracking
Mobile GPS TrackingMobile GPS Tracking
Mobile GPS Tracking
 
Project Report on "Women Safety and Empowerment"
Project Report on "Women Safety and Empowerment"Project Report on "Women Safety and Empowerment"
Project Report on "Women Safety and Empowerment"
 
Final Year Project Report on Self Tacit Zone (Location Based Android App)
Final Year Project Report on Self Tacit Zone (Location Based Android App)Final Year Project Report on Self Tacit Zone (Location Based Android App)
Final Year Project Report on Self Tacit Zone (Location Based Android App)
 
Vehicle tracking system,be computer android report,android project report,gps...
Vehicle tracking system,be computer android report,android project report,gps...Vehicle tracking system,be computer android report,android project report,gps...
Vehicle tracking system,be computer android report,android project report,gps...
 
Location Tracking of Android Device Based on SMS.
Location Tracking of Android Device Based on SMS.Location Tracking of Android Device Based on SMS.
Location Tracking of Android Device Based on SMS.
 
Microfinance : Project Report
Microfinance : Project ReportMicrofinance : Project Report
Microfinance : Project Report
 
My Project Report Documentation with Abstract & Snapshots
My Project Report Documentation with Abstract & SnapshotsMy Project Report Documentation with Abstract & Snapshots
My Project Report Documentation with Abstract & Snapshots
 
Security of women ppt
Security of women pptSecurity of women ppt
Security of women ppt
 
Android College Application Project Report
Android College Application Project ReportAndroid College Application Project Report
Android College Application Project Report
 

Similar to Application for Women Safety

WOMEN’s SAFETY APP
WOMEN’s SAFETY APPWOMEN’s SAFETY APP
WOMEN’s SAFETY APP
IRJET Journal
 
IRJET- A Survey on Child Safety & Tracking Management System
IRJET- A Survey on Child Safety & Tracking Management SystemIRJET- A Survey on Child Safety & Tracking Management System
IRJET- A Survey on Child Safety & Tracking Management System
IRJET Journal
 
IRJET- Online Event Location Tracking using GPS
IRJET-  	  Online Event Location Tracking using GPSIRJET-  	  Online Event Location Tracking using GPS
IRJET- Online Event Location Tracking using GPS
IRJET Journal
 
A women secure mobile app for emergency usage (go safe app)
A women secure mobile app for emergency usage (go safe app)A women secure mobile app for emergency usage (go safe app)
A women secure mobile app for emergency usage (go safe app)
eSAT Journals
 
Personal Security Tracking based on Android and Web Application
Personal Security Tracking based on Android and Web ApplicationPersonal Security Tracking based on Android and Web Application
Personal Security Tracking based on Android and Web Application
TELKOMNIKA JOURNAL
 
Activity Tracker Wrist Band for Children Monitoring using IOT
Activity Tracker Wrist Band for Children Monitoring using IOTActivity Tracker Wrist Band for Children Monitoring using IOT
Activity Tracker Wrist Band for Children Monitoring using IOT
rahulmonikasharma
 
Swarma – A Women Safety Device
Swarma – A Women Safety DeviceSwarma – A Women Safety Device
Swarma – A Women Safety Device
IRJET Journal
 
Child tracking system
Child tracking systemChild tracking system
Child tracking system
balaji1986
 
Biometric Security Bags
Biometric Security BagsBiometric Security Bags
Biometric Security Bags
ijtsrd
 
[IJET-V1I3P1] Authors :Sayli Nikumbh,Suchal Gujarathi,Shubham Pawar,S.P.Pingat
[IJET-V1I3P1] Authors :Sayli Nikumbh,Suchal Gujarathi,Shubham Pawar,S.P.Pingat[IJET-V1I3P1] Authors :Sayli Nikumbh,Suchal Gujarathi,Shubham Pawar,S.P.Pingat
[IJET-V1I3P1] Authors :Sayli Nikumbh,Suchal Gujarathi,Shubham Pawar,S.P.Pingat
IJET - International Journal of Engineering and Techniques
 
Ej4301823826
Ej4301823826Ej4301823826
Ej4301823826
IJERA Editor
 
Ijacsa published research paper march 2020
Ijacsa published research paper march 2020Ijacsa published research paper march 2020
Ijacsa published research paper march 2020
shoaibulhassanuos
 
76201975
7620197576201975
76201975
IJRAT
 
DasGreenPerezMurphy_Paper
DasGreenPerezMurphy_PaperDasGreenPerezMurphy_Paper
DasGreenPerezMurphy_Paper
Michael Murphy
 
Advancement in Android Authentication System Using Direct Significance Service
Advancement in Android Authentication System Using Direct Significance ServiceAdvancement in Android Authentication System Using Direct Significance Service
Advancement in Android Authentication System Using Direct Significance Service
IRJET Journal
 
Paper id 71201905
Paper id 71201905Paper id 71201905
Paper id 71201905
IJRAT
 
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoTIRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET Journal
 
Cloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewCloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature Review
IJSRD
 
Cloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewCloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature Review
IJSRD
 
Networking smartphones for disaster recovery using teamphone
Networking smartphones for disaster recovery using teamphoneNetworking smartphones for disaster recovery using teamphone
Networking smartphones for disaster recovery using teamphone
IJARIIT
 

Similar to Application for Women Safety (20)

WOMEN’s SAFETY APP
WOMEN’s SAFETY APPWOMEN’s SAFETY APP
WOMEN’s SAFETY APP
 
IRJET- A Survey on Child Safety & Tracking Management System
IRJET- A Survey on Child Safety & Tracking Management SystemIRJET- A Survey on Child Safety & Tracking Management System
IRJET- A Survey on Child Safety & Tracking Management System
 
IRJET- Online Event Location Tracking using GPS
IRJET-  	  Online Event Location Tracking using GPSIRJET-  	  Online Event Location Tracking using GPS
IRJET- Online Event Location Tracking using GPS
 
A women secure mobile app for emergency usage (go safe app)
A women secure mobile app for emergency usage (go safe app)A women secure mobile app for emergency usage (go safe app)
A women secure mobile app for emergency usage (go safe app)
 
Personal Security Tracking based on Android and Web Application
Personal Security Tracking based on Android and Web ApplicationPersonal Security Tracking based on Android and Web Application
Personal Security Tracking based on Android and Web Application
 
Activity Tracker Wrist Band for Children Monitoring using IOT
Activity Tracker Wrist Band for Children Monitoring using IOTActivity Tracker Wrist Band for Children Monitoring using IOT
Activity Tracker Wrist Band for Children Monitoring using IOT
 
Swarma – A Women Safety Device
Swarma – A Women Safety DeviceSwarma – A Women Safety Device
Swarma – A Women Safety Device
 
Child tracking system
Child tracking systemChild tracking system
Child tracking system
 
Biometric Security Bags
Biometric Security BagsBiometric Security Bags
Biometric Security Bags
 
[IJET-V1I3P1] Authors :Sayli Nikumbh,Suchal Gujarathi,Shubham Pawar,S.P.Pingat
[IJET-V1I3P1] Authors :Sayli Nikumbh,Suchal Gujarathi,Shubham Pawar,S.P.Pingat[IJET-V1I3P1] Authors :Sayli Nikumbh,Suchal Gujarathi,Shubham Pawar,S.P.Pingat
[IJET-V1I3P1] Authors :Sayli Nikumbh,Suchal Gujarathi,Shubham Pawar,S.P.Pingat
 
Ej4301823826
Ej4301823826Ej4301823826
Ej4301823826
 
Ijacsa published research paper march 2020
Ijacsa published research paper march 2020Ijacsa published research paper march 2020
Ijacsa published research paper march 2020
 
76201975
7620197576201975
76201975
 
DasGreenPerezMurphy_Paper
DasGreenPerezMurphy_PaperDasGreenPerezMurphy_Paper
DasGreenPerezMurphy_Paper
 
Advancement in Android Authentication System Using Direct Significance Service
Advancement in Android Authentication System Using Direct Significance ServiceAdvancement in Android Authentication System Using Direct Significance Service
Advancement in Android Authentication System Using Direct Significance Service
 
Paper id 71201905
Paper id 71201905Paper id 71201905
Paper id 71201905
 
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoTIRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
 
Cloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewCloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature Review
 
Cloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewCloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature Review
 
Networking smartphones for disaster recovery using teamphone
Networking smartphones for disaster recovery using teamphoneNetworking smartphones for disaster recovery using teamphone
Networking smartphones for disaster recovery using teamphone
 

More from iosrjce

An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...
iosrjce
 
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
iosrjce
 
Childhood Factors that influence success in later life
Childhood Factors that influence success in later lifeChildhood Factors that influence success in later life
Childhood Factors that influence success in later life
iosrjce
 
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
iosrjce
 
Customer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in DubaiCustomer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in Dubai
iosrjce
 
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
iosrjce
 
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model ApproachConsumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
iosrjce
 
Student`S Approach towards Social Network Sites
Student`S Approach towards Social Network SitesStudent`S Approach towards Social Network Sites
Student`S Approach towards Social Network Sites
iosrjce
 
Broadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeBroadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperative
iosrjce
 
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
iosrjce
 
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
iosrjce
 
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on BangladeshConsumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
iosrjce
 
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
iosrjce
 
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
iosrjce
 
Media Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & ConsiderationMedia Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & Consideration
iosrjce
 
Customer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative studyCustomer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative study
iosrjce
 
Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...
iosrjce
 
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
iosrjce
 
Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...
iosrjce
 
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
iosrjce
 

More from iosrjce (20)

An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...
 
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
 
Childhood Factors that influence success in later life
Childhood Factors that influence success in later lifeChildhood Factors that influence success in later life
Childhood Factors that influence success in later life
 
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
 
Customer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in DubaiCustomer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in Dubai
 
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
 
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model ApproachConsumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
 
Student`S Approach towards Social Network Sites
Student`S Approach towards Social Network SitesStudent`S Approach towards Social Network Sites
Student`S Approach towards Social Network Sites
 
Broadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeBroadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperative
 
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
 
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
 
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on BangladeshConsumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
 
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
 
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
 
Media Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & ConsiderationMedia Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & Consideration
 
Customer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative studyCustomer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative study
 
Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...
 
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
 
Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...
 
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
 

Recently uploaded

杨洋李一桐做爱视频流出【网芷:ht28.co】国产国产午夜精华>>>[网趾:ht28.co】]<<<
杨洋李一桐做爱视频流出【网芷:ht28.co】国产国产午夜精华>>>[网趾:ht28.co】]<<<杨洋李一桐做爱视频流出【网芷:ht28.co】国产国产午夜精华>>>[网趾:ht28.co】]<<<
杨洋李一桐做爱视频流出【网芷:ht28.co】国产国产午夜精华>>>[网趾:ht28.co】]<<<
amzhoxvzidbke
 
IE-469-Lecture-Notes-3IE-469-Lecture-Notes-3.pptx
IE-469-Lecture-Notes-3IE-469-Lecture-Notes-3.pptxIE-469-Lecture-Notes-3IE-469-Lecture-Notes-3.pptx
IE-469-Lecture-Notes-3IE-469-Lecture-Notes-3.pptx
BehairyAhmed2
 
Girls Call Chennai 000XX00000 Provide Best And Top Girl Service And No1 in City
Girls Call Chennai 000XX00000 Provide Best And Top Girl Service And No1 in CityGirls Call Chennai 000XX00000 Provide Best And Top Girl Service And No1 in City
Girls Call Chennai 000XX00000 Provide Best And Top Girl Service And No1 in City
sunnuchadda
 
Trends in Computer Aided Design and MFG.
Trends in Computer Aided Design and MFG.Trends in Computer Aided Design and MFG.
Trends in Computer Aided Design and MFG.
Tool and Die Tech
 
PPT_grt.pptx engineering criteria grt for accrediation
PPT_grt.pptx engineering criteria  grt for accrediationPPT_grt.pptx engineering criteria  grt for accrediation
PPT_grt.pptx engineering criteria grt for accrediation
SHALINIRAJAN20
 
Tutorial on MySQl and its basic concepts
Tutorial on MySQl and its basic conceptsTutorial on MySQl and its basic concepts
Tutorial on MySQl and its basic concepts
anishacotta2
 
SCADAmetrics Instrumentation for Sensus Water Meters - Core and Main Training...
SCADAmetrics Instrumentation for Sensus Water Meters - Core and Main Training...SCADAmetrics Instrumentation for Sensus Water Meters - Core and Main Training...
SCADAmetrics Instrumentation for Sensus Water Meters - Core and Main Training...
Jim Mimlitz, P.E.
 
Chlorine and Nitric Acid application, properties, impacts.pptx
Chlorine and Nitric Acid application, properties, impacts.pptxChlorine and Nitric Acid application, properties, impacts.pptx
Chlorine and Nitric Acid application, properties, impacts.pptx
yadavsuyash008
 
Adv. Digital Signal Processing LAB MANUAL.pdf
Adv. Digital Signal Processing LAB MANUAL.pdfAdv. Digital Signal Processing LAB MANUAL.pdf
Adv. Digital Signal Processing LAB MANUAL.pdf
T.D. Shashikala
 
Rockets and missiles notes engineering ppt
Rockets and missiles notes engineering pptRockets and missiles notes engineering ppt
Rockets and missiles notes engineering ppt
archithaero
 
RECENT DEVELOPMENTS IN RING SPINNING.pptx
RECENT DEVELOPMENTS IN RING SPINNING.pptxRECENT DEVELOPMENTS IN RING SPINNING.pptx
RECENT DEVELOPMENTS IN RING SPINNING.pptx
peacesoul123
 
21CV61- Module 3 (CONSTRUCTION MANAGEMENT AND ENTREPRENEURSHIP.pptx
21CV61- Module 3 (CONSTRUCTION MANAGEMENT AND ENTREPRENEURSHIP.pptx21CV61- Module 3 (CONSTRUCTION MANAGEMENT AND ENTREPRENEURSHIP.pptx
21CV61- Module 3 (CONSTRUCTION MANAGEMENT AND ENTREPRENEURSHIP.pptx
sanabts249
 
Response & Safe AI at Summer School of AI at IIITH
Response & Safe AI at Summer School of AI at IIITHResponse & Safe AI at Summer School of AI at IIITH
Response & Safe AI at Summer School of AI at IIITH
IIIT Hyderabad
 
CONFINED SPACE ENTRY TRAINING FOR OIL INDUSTRY ppt
CONFINED SPACE ENTRY TRAINING FOR OIL INDUSTRY pptCONFINED SPACE ENTRY TRAINING FOR OIL INDUSTRY ppt
CONFINED SPACE ENTRY TRAINING FOR OIL INDUSTRY ppt
ASHOK KUMAR SINGH
 
Thermodynamics Digital Material basics subject
Thermodynamics Digital Material basics subjectThermodynamics Digital Material basics subject
Thermodynamics Digital Material basics subject
JigneshChhatbar1
 
readers writers Problem in operating system
readers writers Problem in operating systemreaders writers Problem in operating system
readers writers Problem in operating system
VADAPALLYPRAVEENKUMA1
 
Data Visualization in Python of b.tech student.pptx
Data Visualization in Python of b.tech student.pptxData Visualization in Python of b.tech student.pptx
Data Visualization in Python of b.tech student.pptx
TelanganaPakkaFolk
 
Monitoring and reporting of transparent forest data and information under the...
Monitoring and reporting of transparent forest data and information under the...Monitoring and reporting of transparent forest data and information under the...
Monitoring and reporting of transparent forest data and information under the...
Pilar Valbuena Perez
 
Time-State Analytics: MinneAnalytics 2024 Talk
Time-State Analytics: MinneAnalytics 2024 TalkTime-State Analytics: MinneAnalytics 2024 Talk
Time-State Analytics: MinneAnalytics 2024 Talk
Evan Chan
 
Quadcopter Dynamics, Stability and Control
Quadcopter Dynamics, Stability and ControlQuadcopter Dynamics, Stability and Control
Quadcopter Dynamics, Stability and Control
Blesson Easo Varghese
 

Recently uploaded (20)

杨洋李一桐做爱视频流出【网芷:ht28.co】国产国产午夜精华>>>[网趾:ht28.co】]<<<
杨洋李一桐做爱视频流出【网芷:ht28.co】国产国产午夜精华>>>[网趾:ht28.co】]<<<杨洋李一桐做爱视频流出【网芷:ht28.co】国产国产午夜精华>>>[网趾:ht28.co】]<<<
杨洋李一桐做爱视频流出【网芷:ht28.co】国产国产午夜精华>>>[网趾:ht28.co】]<<<
 
IE-469-Lecture-Notes-3IE-469-Lecture-Notes-3.pptx
IE-469-Lecture-Notes-3IE-469-Lecture-Notes-3.pptxIE-469-Lecture-Notes-3IE-469-Lecture-Notes-3.pptx
IE-469-Lecture-Notes-3IE-469-Lecture-Notes-3.pptx
 
Girls Call Chennai 000XX00000 Provide Best And Top Girl Service And No1 in City
Girls Call Chennai 000XX00000 Provide Best And Top Girl Service And No1 in CityGirls Call Chennai 000XX00000 Provide Best And Top Girl Service And No1 in City
Girls Call Chennai 000XX00000 Provide Best And Top Girl Service And No1 in City
 
Trends in Computer Aided Design and MFG.
Trends in Computer Aided Design and MFG.Trends in Computer Aided Design and MFG.
Trends in Computer Aided Design and MFG.
 
PPT_grt.pptx engineering criteria grt for accrediation
PPT_grt.pptx engineering criteria  grt for accrediationPPT_grt.pptx engineering criteria  grt for accrediation
PPT_grt.pptx engineering criteria grt for accrediation
 
Tutorial on MySQl and its basic concepts
Tutorial on MySQl and its basic conceptsTutorial on MySQl and its basic concepts
Tutorial on MySQl and its basic concepts
 
SCADAmetrics Instrumentation for Sensus Water Meters - Core and Main Training...
SCADAmetrics Instrumentation for Sensus Water Meters - Core and Main Training...SCADAmetrics Instrumentation for Sensus Water Meters - Core and Main Training...
SCADAmetrics Instrumentation for Sensus Water Meters - Core and Main Training...
 
Chlorine and Nitric Acid application, properties, impacts.pptx
Chlorine and Nitric Acid application, properties, impacts.pptxChlorine and Nitric Acid application, properties, impacts.pptx
Chlorine and Nitric Acid application, properties, impacts.pptx
 
Adv. Digital Signal Processing LAB MANUAL.pdf
Adv. Digital Signal Processing LAB MANUAL.pdfAdv. Digital Signal Processing LAB MANUAL.pdf
Adv. Digital Signal Processing LAB MANUAL.pdf
 
Rockets and missiles notes engineering ppt
Rockets and missiles notes engineering pptRockets and missiles notes engineering ppt
Rockets and missiles notes engineering ppt
 
RECENT DEVELOPMENTS IN RING SPINNING.pptx
RECENT DEVELOPMENTS IN RING SPINNING.pptxRECENT DEVELOPMENTS IN RING SPINNING.pptx
RECENT DEVELOPMENTS IN RING SPINNING.pptx
 
21CV61- Module 3 (CONSTRUCTION MANAGEMENT AND ENTREPRENEURSHIP.pptx
21CV61- Module 3 (CONSTRUCTION MANAGEMENT AND ENTREPRENEURSHIP.pptx21CV61- Module 3 (CONSTRUCTION MANAGEMENT AND ENTREPRENEURSHIP.pptx
21CV61- Module 3 (CONSTRUCTION MANAGEMENT AND ENTREPRENEURSHIP.pptx
 
Response & Safe AI at Summer School of AI at IIITH
Response & Safe AI at Summer School of AI at IIITHResponse & Safe AI at Summer School of AI at IIITH
Response & Safe AI at Summer School of AI at IIITH
 
CONFINED SPACE ENTRY TRAINING FOR OIL INDUSTRY ppt
CONFINED SPACE ENTRY TRAINING FOR OIL INDUSTRY pptCONFINED SPACE ENTRY TRAINING FOR OIL INDUSTRY ppt
CONFINED SPACE ENTRY TRAINING FOR OIL INDUSTRY ppt
 
Thermodynamics Digital Material basics subject
Thermodynamics Digital Material basics subjectThermodynamics Digital Material basics subject
Thermodynamics Digital Material basics subject
 
readers writers Problem in operating system
readers writers Problem in operating systemreaders writers Problem in operating system
readers writers Problem in operating system
 
Data Visualization in Python of b.tech student.pptx
Data Visualization in Python of b.tech student.pptxData Visualization in Python of b.tech student.pptx
Data Visualization in Python of b.tech student.pptx
 
Monitoring and reporting of transparent forest data and information under the...
Monitoring and reporting of transparent forest data and information under the...Monitoring and reporting of transparent forest data and information under the...
Monitoring and reporting of transparent forest data and information under the...
 
Time-State Analytics: MinneAnalytics 2024 Talk
Time-State Analytics: MinneAnalytics 2024 TalkTime-State Analytics: MinneAnalytics 2024 Talk
Time-State Analytics: MinneAnalytics 2024 Talk
 
Quadcopter Dynamics, Stability and Control
Quadcopter Dynamics, Stability and ControlQuadcopter Dynamics, Stability and Control
Quadcopter Dynamics, Stability and Control
 

Application for Women Safety

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 3, Ver. IV (May – Jun. 2015), PP 01-04 www.iosrjournals.org DOI: 10.9790/0661-17340104 www.iosrjournals.org 1 | Page Application for Women Safety 1 S.Sangeetha, 2 P.Radhika PG Scholar, Department of MCA, Panimalar Engineering College 1 sangeemca1991@gmail.com,2 radhika91mca@gmail.com Abstract: This project presents an alert system for Women safety detection using common commercially available electronic devices to both detect the problem and alert authorities. We use an Android based smart phone with an integrated features that alert and provide location based information to alert authorities. Data from the application is evaluated with several threshold based AES algorithms and position data to determine a problem. Our system provides a realizable, cost effective solution to problem detection using a simple graphical interface while not overwhelming the user with uncomfortable sensors. Problem is very powerful software especially developed for the safety of girls, whenever some body is in trouble they don’t have to sit and find contacts or find ways to send short message service, or message the near ones. They might not have so much time.. All that they have to do is shake the smart phone above the threshold value, vigorously. Immediately a message alert is sent to the person’s mom, dad and whoever they wish to, if their guardians also have a smart phone. Even though if it is in silent mode. When a message called alert is received it automatically changes its profile to general, and gives a message notification YOUR DAUGHTER IS IN TROUBLE PLZ HELPS…. PLZ HELP…. PLZ HELP…. REPEATEDLY AS A message until they seen and stop it.. Now a day security of women is becoming very poor and the need for this kind of this application is steadily increasing work wise, we will develop a routine schedule based mechanism to monitor the women’s security using GPS (Global Positioning System), GPRS (General Packet Radio Service), etc.… Keywords: Smartphone, GPS, GPRS… I. Introduction This application is generally meant for the attention of the authorities or public in the emergency response capabilities such as terrorist attacks and the natural disaster by facilitating the communication We will be tracking the location of the person via GPS and storing the details of the current location into a remote server via GPRS consecutively, we will also be tracking the schedule of the person as per the schedule list which is being uploaded by the person and we will be sending SMS to the relatives of the concerned person about the schedule their current location of the concerned person that time. So that they will come to know about the status and if something is wrong, we will be having another set of oppositions to give a call to a police, social workers, volunteer organizations, etc. With their respective along the mobile phones. The difficulties in the existing application are the lack of situational awareness and communication terminology among their respective. Due to this response and recovery is Difficult to the authorities. In respect of the public safety with the support of the network provider the application runs in the android phones in efficient way to identify and recover the problem by the natural disaster or terrorist attacks etc… Furthermore users are likely to operate the mobile devices for the security purpose to intimate the problem detection to their respective in the emergency cases. II. Application Requirements To develop the application android based mobile application the station and the environment of the surrounding has to been interviewed then the dangerous and the suspicious activates should be notified to the device by the user .if the device detects the problem then only other process creates the attention for reporting to the authority. 1)Time Schedule: When the apps get installed it traces out the IMEI, SIM, mobile number and stores on the remote server, the daily schedule list gets uploaded by the person from her mobile and get tracked as per the schedule list, if there is any deviation in the schedule they relatives of the person will get an SMS along with the current location and the schedule and Police station members will get a call from the mobile.
  • 2. Application for Women Safety DOI: 10.9790/0661-17340104 www.iosrjournals.org 2 | Page 2) Tracking: The GPS will regularly transmit the latitude and longitude of the person and via GPRS we will store the entire transmitted cloud server; if the person is lost we can trace the end location with this kind of approach. 3) Notification: When the person is in trouble, when she presses an alarm in the application all her relatives, voluntary organization members, police men will get an SMS with her full contact details along with the current location from where the message has been delivered. Using the IMEI number the policemen can track the location where they are travelling. 4) Network provider support: Network provider has got the important role, by sending the commands through the short message type to the different applications. 5) GPS (Global positioning system) The GPS, elaborated as Global Positioning System, is a satellite based navigation system made up of a network of 24 satel-lites placed into orbit by the U.S. GPS works in any weather conditions, anywhere in the world, 24 hours a day. There are no subscription fees or setup charges to use GPS . A GPS can help us to determine exactly where we are at any given moment. Not only can a GPS give us the name of the street we might be traveling on, but many GPS systems can also give us the exact latitude and longitude of where you are located. On the other hand, Android mobile platform is becoming more popular to the users for its multi- dimensional purposes.Tracking System via Android Device” uses GPS and any mo-bile phones having an Android operating system to track the location of a person whenever necessary. III. System Study Existing system The women have to dial a number to call a police or send a Short Messaging Service (SMS) to the particular subscriber code, after they received the service they will get in touch with you later and there is no time to make a call or SMS. There are also so many volunteer organizations all over the world to help them, but they could not able to get those messages. Proposed system We will be tracking the location of the person via GPS and storing the details of the current location into a remote server via GPRS consecutively, we will also be tracking the schedule of the person as per the schedule list which is being uploaded by the person and we will be sending SMS to the relatives of the concerned person about the schedule their current location of the concerned person that time. So that they will come to know about the status and if something is wrong, we will be having another set of oppositions to give a call to a police, social workers, volunteer organizations, etc. Features  This project presents an alert system for Women safety detection.  The system provides a realizable and efficient.  The application is used Advanced Encryption Standard (AES) algorithm.  The application is easier to use all the woman.  The application is normal budget.
  • 3. Application for Women Safety DOI: 10.9790/0661-17340104 www.iosrjournals.org 3 | Page IV. Architecture V. Operating System By considering the today’s environment most of the people using the android based mobile phones and android is the open source which can be used and adapted easily so android operating system can be used. Android is an operating system based on the Linux kernel, and designed primarily for touch screen mobile devices such as smart phones and tablet computers. Initially developed by Android, Inc., which Google backed financially .Android was unveiled in 2007 along with the founding of the Open Handset Alliance: a consortium of hardware, software, and telecommunication companies devoted to advancing open standards for mobile devices. The first publicly available Smartphone running Android, the HTC Dream, was released on October 22, 2008 The user interface of Android is based on direct manipulation, using touch inputs that loosely correspond to real-world actions, like swiping, tapping, pinching and reverse pinching to manipulate on-screen objects. Internal hardware such as accelerometers, gyroscopes and proximity sensors are used by some applications to respond to additional user actions, for example adjusting the screen from portrait to landscape depending on how the device is oriented. Android allows users to customize their home screens with shortcuts to applications and widgets, which allow users to display live content, such as emails and weather information, directly on the home screen. Applications can further send notifications to the user to inform them of relevant information, such as new emails and text messages. Android is open source and Google releases the source code under the Apache License. This open- source code and permissive licensing allows the software to be freely modified and distributed by device manufacturers, wireless carriers and enthusiast developers. In practice, Android devices ship with a combination of open source and proprietary software. Android has a large community of developers writing applications ("apps") that extend the functionality of devices, written primarily in the Java programming language. In October 2012, there were approximately 700,000 apps available for Android, and the estimated number of applications downloaded from Google Play, Android's primary app store, was 25 billion. A developer survey conducted in April–May 2013 found that Android is the most popular platform for developers, used by 71% of the mobile developer population. Android is the world's most widely used Smartphone platform, overtaking Symbian in the fourth quarter of 2010. Android is popular with technology companies who require a ready-made, low-cost, customizable and lightweight operating system for high tech devices. Despite being primarily designed for phones and tablets, it also has been used in televisions, games consoles, digital cameras and other electronics. Android's open nature has encouraged a large community of developers and enthusiasts to use the open-source
  • 4. Application for Women Safety DOI: 10.9790/0661-17340104 www.iosrjournals.org 4 | Page code as a foundation for community-driven projects, which add new features for advanced user or bring Android to devices which were officially released running other operating systems. As of November 2013, Android's share of the global Smartphone market, led by Samsung products, has reached 81%.The operating system's success has made it a target for patent litigation as part of the so-called "Smartphone" between technology companies. As of May 2013, 48 billion apps have been installed from the Google Play store, and as of September 2013, 1 billion Android devices have been activated. 1.Applications These are applications written in Java. Some of basic applications include a calendar, email client, SMS program, maps, making phone calls, accessing the Web browser, accessing your contacts list and others. If you are an average user, this is the layer you will us most, rest all layers are used by Google programmers, developers and hardware manufacturers. 2. Application Framework This is the skeleton or framework which all android developers has to follow. The developers can access all framework APIs an manage phone’s n to keyword ki: basic functions like resource allocation, switching between processes or programs, telephone applications, and keeping track of the phone’s physical location. The architecture is well designed to simplify the reuse of components. Think of the application framework as a set of basic tools with which a developer can build much more complex tools. 3. Libraries This layer consists of Android libraries written in C, C++, and used by various systems. This library tells the device how to handle different kinds of data and are exposed to Android developers via Android Application framework. Some of these libraries includes media, graphics, 3d, SQLite, web browser library etc. The Android runtime layer which includes set of core java libraries and DVM (Dalvik Virtual Machine) is also located in same layer. 4. Runtime Android This layer includes set of base libraries that are required for java libraries. Every Android application gets its own instance of Dalvik virtual machine. Dalvik has been written so that a device can run multiple VMs efficiently and it executes files in executable (.Dex) optimized for minimum memory. 5. Kernel – Linux: This layer includes Android’s memory management programs, security settings, power management software and several drivers for hardware, file system access, networking and inter-process-communication. The kernel also acts as an abstraction layer between hardware and the rest of the software stac. VI. Conclusion The problem of the women safety is increased rapidly in this environment, so I proposed as an effective Android application to prevent such type of the suspicious or natural disaster, by alerting the concern authorities using the android mobile phone which helps to stop such type of illegal activates and to trace the concern.. References [1]. Michael Burton ,Dohn Ferker (2012). Android Application For Dummies. 2nd ed. 111,river street,Hoboker: jhon wiely and sons,inc. p12-90. [2]. Cook book,reipeng liu (2013). Android Application devlopment kit. Mumbai: packt bimingam. p1-50,p67-90.. [3]. Peter Erickson, Andrew Weinert, and Dr. Paul Breimyer,Matt Samperi, Jason Huff, Carlos Parra, and Dr. Scarlett Miller. (2013). Designing Public Safety Mobile Applications for Disconnected, Interrupted, and Low Bandwidth Communication Environments. IEEE. 10 (978-1-4799-1535-4/13/$31.00), p790-796.