International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
In current period an enormous rise in crime against women can be observed and along with women even children, old age people are also suffering with inhuman activities as kidnapping. Women feel insecure roaming around the city alone, even the family members are always worried about their security till the time they get back safe. Many personal security solutions are available in the market in form of mobile applications and wearable devices as wrist bands, pendants, etc.. But all these already available solutions prove useless if the user is unable to trigger the device or mobile app in case of danger and also if device is lost or broken or battery goes low. This paper proposes a new improved personal security solution that will overcome these drawbacks of wearable devices and mobile applications making it more reliable solution for security.
A women secure mobile app for emergency usage (go safe app)eSAT Journals
Abstract Many unfortunate incidents have been taking place . Problems may come from any direction such as walking on the road after the
work, going to super market or many other reasons for which they go alone. People at home are not sure of their return safely. In
order to overcome such problems the GO SAFE (security app) mobile based application is not only necessary to use but also
plays a pivotal role with android software. The usage of smart phones equipped with GPS navigation unit have increased rapidly.
The “GO SAFE” application is mainly developed to safeguard. By clicking on the buttons (power & volume button) alert message
is sent. Application communicates the user’s location to the registered contacts in the form of message. Thus, it acts like a sentinel
following behind the person till the user feels she is safe. Also, the registered contacts and GPS location are saved from time to
time in a database.
Keywords: Apps, Android, Mobile, Safety. Etc…
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
In current period an enormous rise in crime against women can be observed and along with women even children, old age people are also suffering with inhuman activities as kidnapping. Women feel insecure roaming around the city alone, even the family members are always worried about their security till the time they get back safe. Many personal security solutions are available in the market in form of mobile applications and wearable devices as wrist bands, pendants, etc.. But all these already available solutions prove useless if the user is unable to trigger the device or mobile app in case of danger and also if device is lost or broken or battery goes low. This paper proposes a new improved personal security solution that will overcome these drawbacks of wearable devices and mobile applications making it more reliable solution for security.
A women secure mobile app for emergency usage (go safe app)eSAT Journals
Abstract Many unfortunate incidents have been taking place . Problems may come from any direction such as walking on the road after the
work, going to super market or many other reasons for which they go alone. People at home are not sure of their return safely. In
order to overcome such problems the GO SAFE (security app) mobile based application is not only necessary to use but also
plays a pivotal role with android software. The usage of smart phones equipped with GPS navigation unit have increased rapidly.
The “GO SAFE” application is mainly developed to safeguard. By clicking on the buttons (power & volume button) alert message
is sent. Application communicates the user’s location to the registered contacts in the form of message. Thus, it acts like a sentinel
following behind the person till the user feels she is safe. Also, the registered contacts and GPS location are saved from time to
time in a database.
Keywords: Apps, Android, Mobile, Safety. Etc…
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewIJSRD
In this system we have proposed to implement the technique to improve antitheft for android based mobile phones by using various services like MMS over the SMS. Today’s most popular android operating system is contains many scenarios that already been proposed that are related to anti-theft also many applications are available onto play store but these application are not so useful to find the thief e.g. GPS tracking for the devices like smart phones, tablets and phablets. We can use new technology likes Multimedia Messaging Service (MMS), which enhances the present scenario. This scenario is totally dependent on the hardware of your smart phone device that is camera (front or rear) also support for multimedia messages. First, we just need to install this software then, it work’s in the background, stores the current SIM number in a variable and keeps continuously checking for SIM change, whenever SIM gets changed from device, it will takes snapshots, record a video in the background with the use of camera of device and also records surrounding audio i.e., without taking user permission and then it will send an MMS to an alternate mobile number and an email id, which was provided during installation for authorized user’s registration. The most benefit of this application is very easy to configure and keeps running in the background without interrupting the user. To some extent it helps the authorized user to identify and find the thief.
Networking smartphones for disaster recovery using teamphoneIJARIIT
In this paper, we examine how to use networks with smartphones for providing communications in disaster recovery.
By lessening the communication gap among different kinds of wireless networks, we have designed and implemented a system
called TeamPhone, which provides Android phones the capabilities on communications in disaster helper. TeamPhone
consists of two components: a messaging system between rescue worker and the victim and a self-rescue system. The
messaging system between rescue worker and victim integrates cellular networking, ad-hoc networking, and opportunistic
networking seamlessly, and enables proper communication. The self-rescue system finds different communication network
ways for trapped survivors. Such a group of Android phones can cooperatively get a notification and send out emergency
messages in an energy-efficient manner with their location and position information so as to help rescue operations. We have
implemented TeamPhone as a prototype application on the Android platform and deployed it on all types of smartphones from
Samsung to Redmi and others. Results demonstrate that TeamPhone can properly enhance communication requirements and
increase the pace of disaster recovery. We are creating three applications with a centralized cloud for communication. First for
the admin who will monitor victim and rescue worker on Google map and other two for rescue worker and disaster victim.
Activity Tracker Wrist Band for Children Monitoring using IOTrahulmonikasharma
Today in present world of digital technology and global computing every person is connected with each other in number of ways. In current global computing world, the children and women harassment, chain snatchings, kidnapping, sexual harassments, eve teasing, etc. are increased day-by day, becoming more unsafe and helpless. When these perilous situations occur there must be a trending technology to be comfortable to handle. So we are proposing a system that works on the controversy of children using IOT. In this project we proposed a device which is integrated with multiple devices, comprising of wearable “Activity Tracker Wrist Band” which is programmed with all the required data which includes the behavior of the human reactions like anger, anxiety, nervousness and fear. When these situations are faced by the victim, the various sensors generate the emergency signals which are to be transmitted to the smart phone. The system effectively monitors the children presence within the expected zone. When the person crosses the monitoring zone, then based on IOT Monitoring system, GSM sends help request by sending messages to the nearest police station, parents and the people in the near radius.
Personal Security Tracking based on Android and Web ApplicationTELKOMNIKA JOURNAL
Nowadays, the frequency of abduction is increasing significantly. Information technology provide
many social media which is causing the leaked of personal information where abductor can find out the
information. Using social media, people can share location, life event, and anything related about their life
event, these become the useful information for the abductor. To anticipate this, a lot of personal tracking
device is developed, but the response is too late. Because, the family or relative of the victims will notice
that abduction had happen after the victim is lost. According to the problem, this research will focus on
develop the personal tracking device which trigger by the victims who own the phone based on android
and web application. Whenever the abduction happens, the victim just need to click the button and the
system will send a message to the relatives and family in their contact also trigger the notification to the
local security. Software development life cycle that will be used is scrum which is divided into several
processes like backlog, sprints, scrum meetings, and demos. The result of this research is android
application for user and web application for managing application.
Multi-Purpose Robot using Raspberry Pi & Controlled by SmartphoneIJERA Editor
This paper proposes a method for controlling a Wireless robot for multi-purpose in the sense surveillance, rescue operations and weather reporting, human detection, geo-graphical location etc., Generally surveillance robots consists a high cost microcontroller, Bluetooth module or Wi-Fi modules, audio systems and a costly and complicated communication system. Raspberry pi b model is a credit card size single board computer. It is built with the Wi-Fi, Bluetooth modules and USB ports and in built Broadcom BCM2837 processor that gives very speed processing and audio, video jacks and camera interfacing port, HDMI port and Ethernet ports is available. This board will meet our requirements. The Robot is equipped with various critical sensors, detectors and Camera. The live video feedback is obtained from the camera. Data from the sensors is send to the Smartphone at user end. Latest Raspberry pi board is used on robot to interface with sensors and camera. It is having an in built Wi-Fi. An Android Smartphone sends a wireless command through robot controlled app which is received by Raspberry pi board and accordingly robot moves
A Survey on Security for Server Using Spontaneous Face DetectionIJERA Editor
In today’s computerized world, cyber crime has increased. The web network of www also increases day by day. So the protection of software and data in our computers has become very important. For this purpose we are developing the “Server Security System” with the help of some technologies such as GPRS, TCP-IP, SMTP, and MIME. In our project we are developing a system such that we get the image of an unauthorized person or user. To do this we are using a webcam. We send a mail to the authorized person's GPRS phone. For this purpose we use a mobile it can be any mobile. In parallel we are changing the password by generating a random string & then Shutting-Down the computer remotely. By using java programming we can create such applications which will help us to stop the cyber crime. It is not visible to new user so that he is unaware from this software so this will definitely helpful to make them fool.
INNOVATIVE AUTOMOBILE SECURITY SYSTEM USING VARIOUS SECURITY MODULESEditor IJMTER
This dissertation project presents Design & Development of Innovative Automobile
security system to control the theft of a vehicle using GSM, GPS and Fingerprint module. The main
objective of this is to offer an advanced security system in multiple levels to protect the car from
unauthorized access using GSM & RFID technology. It provides a protected password to unlock the
car and real time biometric user authentication in second level to start the ignition after finger print
verification is done. If the fingerprint is not match with that in database, P89v51rd2fn produces the
interrupt signal to disable the engine and initiates an alarm and also inform the car owner about the
unauthorized access via short Message Services (SMS) based.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewIJSRD
In this system we have proposed to implement the technique to improve antitheft for android based mobile phones by using various services like MMS over the SMS. Today’s most popular android operating system is contains many scenarios that already been proposed that are related to anti-theft also many applications are available onto play store but these application are not so useful to find the thief e.g. GPS tracking for the devices like smart phones, tablets and phablets. We can use new technology likes Multimedia Messaging Service (MMS), which enhances the present scenario. This scenario is totally dependent on the hardware of your smart phone device that is camera (front or rear) also support for multimedia messages. First, we just need to install this software then, it work’s in the background, stores the current SIM number in a variable and keeps continuously checking for SIM change, whenever SIM gets changed from device, it will takes snapshots, record a video in the background with the use of camera of device and also records surrounding audio i.e., without taking user permission and then it will send an MMS to an alternate mobile number and an email id, which was provided during installation for authorized user’s registration. The most benefit of this application is very easy to configure and keeps running in the background without interrupting the user. To some extent it helps the authorized user to identify and find the thief.
Networking smartphones for disaster recovery using teamphoneIJARIIT
In this paper, we examine how to use networks with smartphones for providing communications in disaster recovery.
By lessening the communication gap among different kinds of wireless networks, we have designed and implemented a system
called TeamPhone, which provides Android phones the capabilities on communications in disaster helper. TeamPhone
consists of two components: a messaging system between rescue worker and the victim and a self-rescue system. The
messaging system between rescue worker and victim integrates cellular networking, ad-hoc networking, and opportunistic
networking seamlessly, and enables proper communication. The self-rescue system finds different communication network
ways for trapped survivors. Such a group of Android phones can cooperatively get a notification and send out emergency
messages in an energy-efficient manner with their location and position information so as to help rescue operations. We have
implemented TeamPhone as a prototype application on the Android platform and deployed it on all types of smartphones from
Samsung to Redmi and others. Results demonstrate that TeamPhone can properly enhance communication requirements and
increase the pace of disaster recovery. We are creating three applications with a centralized cloud for communication. First for
the admin who will monitor victim and rescue worker on Google map and other two for rescue worker and disaster victim.
Activity Tracker Wrist Band for Children Monitoring using IOTrahulmonikasharma
Today in present world of digital technology and global computing every person is connected with each other in number of ways. In current global computing world, the children and women harassment, chain snatchings, kidnapping, sexual harassments, eve teasing, etc. are increased day-by day, becoming more unsafe and helpless. When these perilous situations occur there must be a trending technology to be comfortable to handle. So we are proposing a system that works on the controversy of children using IOT. In this project we proposed a device which is integrated with multiple devices, comprising of wearable “Activity Tracker Wrist Band” which is programmed with all the required data which includes the behavior of the human reactions like anger, anxiety, nervousness and fear. When these situations are faced by the victim, the various sensors generate the emergency signals which are to be transmitted to the smart phone. The system effectively monitors the children presence within the expected zone. When the person crosses the monitoring zone, then based on IOT Monitoring system, GSM sends help request by sending messages to the nearest police station, parents and the people in the near radius.
Personal Security Tracking based on Android and Web ApplicationTELKOMNIKA JOURNAL
Nowadays, the frequency of abduction is increasing significantly. Information technology provide
many social media which is causing the leaked of personal information where abductor can find out the
information. Using social media, people can share location, life event, and anything related about their life
event, these become the useful information for the abductor. To anticipate this, a lot of personal tracking
device is developed, but the response is too late. Because, the family or relative of the victims will notice
that abduction had happen after the victim is lost. According to the problem, this research will focus on
develop the personal tracking device which trigger by the victims who own the phone based on android
and web application. Whenever the abduction happens, the victim just need to click the button and the
system will send a message to the relatives and family in their contact also trigger the notification to the
local security. Software development life cycle that will be used is scrum which is divided into several
processes like backlog, sprints, scrum meetings, and demos. The result of this research is android
application for user and web application for managing application.
Multi-Purpose Robot using Raspberry Pi & Controlled by SmartphoneIJERA Editor
This paper proposes a method for controlling a Wireless robot for multi-purpose in the sense surveillance, rescue operations and weather reporting, human detection, geo-graphical location etc., Generally surveillance robots consists a high cost microcontroller, Bluetooth module or Wi-Fi modules, audio systems and a costly and complicated communication system. Raspberry pi b model is a credit card size single board computer. It is built with the Wi-Fi, Bluetooth modules and USB ports and in built Broadcom BCM2837 processor that gives very speed processing and audio, video jacks and camera interfacing port, HDMI port and Ethernet ports is available. This board will meet our requirements. The Robot is equipped with various critical sensors, detectors and Camera. The live video feedback is obtained from the camera. Data from the sensors is send to the Smartphone at user end. Latest Raspberry pi board is used on robot to interface with sensors and camera. It is having an in built Wi-Fi. An Android Smartphone sends a wireless command through robot controlled app which is received by Raspberry pi board and accordingly robot moves
A Survey on Security for Server Using Spontaneous Face DetectionIJERA Editor
In today’s computerized world, cyber crime has increased. The web network of www also increases day by day. So the protection of software and data in our computers has become very important. For this purpose we are developing the “Server Security System” with the help of some technologies such as GPRS, TCP-IP, SMTP, and MIME. In our project we are developing a system such that we get the image of an unauthorized person or user. To do this we are using a webcam. We send a mail to the authorized person's GPRS phone. For this purpose we use a mobile it can be any mobile. In parallel we are changing the password by generating a random string & then Shutting-Down the computer remotely. By using java programming we can create such applications which will help us to stop the cyber crime. It is not visible to new user so that he is unaware from this software so this will definitely helpful to make them fool.
INNOVATIVE AUTOMOBILE SECURITY SYSTEM USING VARIOUS SECURITY MODULESEditor IJMTER
This dissertation project presents Design & Development of Innovative Automobile
security system to control the theft of a vehicle using GSM, GPS and Fingerprint module. The main
objective of this is to offer an advanced security system in multiple levels to protect the car from
unauthorized access using GSM & RFID technology. It provides a protected password to unlock the
car and real time biometric user authentication in second level to start the ignition after finger print
verification is done. If the fingerprint is not match with that in database, P89v51rd2fn produces the
interrupt signal to disable the engine and initiates an alarm and also inform the car owner about the
unauthorized access via short Message Services (SMS) based.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Women safety is a prime concern in today’s world, considering the spurt in the number of incidents and crime rate against women, especially in the metro cities where women have to stay out for long.
As women need to travel late at night sometimes, it is important for them to stay alert and safe. The government regularly takes necessary measures to ensure women’s safety. However, it is still important to take the matter into your own hands and download safety apps for women.
This paper detailed about a smart alarm system for
women’s security. Women all over the world are facing much
unscrupulous physical irritation. This acquires a fast pace
due to lack of a suitable investigation system. The system look
like a group on the wrist merged with pressure switch as an
input which when triggers shows the result loud alarm
imposed for self-defensing purpose and send location and
messages to the emergency contacts. The whole process will
be held in Arduino Microcontroller. The digital switch
incorporates with the controlling unit. Whenever the user
presses the digital switch, the emergency message will be
passed to the server unit via GSM SIM 800A module. By
implementing the proposed system, the physical harassment
on the women will be reduced.
Running head mobile application security1mobile application se.docxtodd581
Running head: mobile application security 1
mobile application security 8
Project Report On Mobile Application Security
ISOL534 Application Security
Submitted By
Guided By Dr. Suanu Bliss Wikina
Contents
Executive Summary……………………………………………………………………...3
Introduction………………………………………………………………………..……..4
Types of Mobile Applications……………………………………………………..……..5
Importance of Mobile Application Security…………………………………..………..7
Recommendations for Using Mobile Applications……………………………..………9
Top Three Best Mobile Security Applications…………………………………..…….10
Conclusion………………………………………………………………………………12
References……………………………………………………………………………….13
Executive Summary
This report is about the mobile application security and importance to have installed the mobile application security in the mobile gadgets like the Smartphones or the tablet computers. The use of mobile gadgets have increased in the recent past and it has also brought danger to our personal information as well which are generally saved in our mobiles like the credit card information, contacts, business particulars, etc. Therefore, the importance of mobile application security shall be discussed in detail in the report so that ho we can save our personal data from the external threats in the shape of malwares.
Keywords: Types of Mobile Applications, Importance of Mobile Application Security, Recommendations for using Mobile Applications, Best Mobile Security Applications.
Introduction:
The mobile applications play an important role in our daily life and they are helpful in managing our day to day needs like online banking, chatting to other friends and family, share of online information including photos, banking transactions, codes, etc. However, we are not aware of one thing and that is threats in the shape of malware. The malware are the online threats that can put your personal information and data on risk and you may suffer in various manners like monetary losses, bad repute, etc.
The mobile applications allow users to have mini computers in their mobile phones and enjoy the services. The smart phones allows many built-in applications in their mobile phones which are basic in nature like calculator, calendar, camera, libraries, etc. and the users may download unlimited applications in their mobile phones like emails, video recorders, MP3 players, Medical apps, online organizational applications for sale & purchase of good online, banking applications and most importantly the games. The main advantage is that you can avail functions of such applications without any computer at anywhere with the help of mobile phone and internet.
The previous approach for developing applications were for the desktop computers and laptops but now the trend has changed and the developers are following the approach “Mobile-First” and they are developing such applications that can easily be downloaded on the mobile phones. It is also reported that about 197 Billion different mobile applications are .
Running head mobile application security1mobile application se.docxglendar3
Running head: mobile application security 1
mobile application security 8
Project Report On Mobile Application Security
ISOL534 Application Security
Submitted By
Guided By Dr. Suanu Bliss Wikina
Contents
Executive Summary……………………………………………………………………...3
Introduction………………………………………………………………………..……..4
Types of Mobile Applications……………………………………………………..……..5
Importance of Mobile Application Security…………………………………..………..7
Recommendations for Using Mobile Applications……………………………..………9
Top Three Best Mobile Security Applications…………………………………..…….10
Conclusion………………………………………………………………………………12
References……………………………………………………………………………….13
Executive Summary
This report is about the mobile application security and importance to have installed the mobile application security in the mobile gadgets like the Smartphones or the tablet computers. The use of mobile gadgets have increased in the recent past and it has also brought danger to our personal information as well which are generally saved in our mobiles like the credit card information, contacts, business particulars, etc. Therefore, the importance of mobile application security shall be discussed in detail in the report so that ho we can save our personal data from the external threats in the shape of malwares.
Keywords: Types of Mobile Applications, Importance of Mobile Application Security, Recommendations for using Mobile Applications, Best Mobile Security Applications.
Introduction:
The mobile applications play an important role in our daily life and they are helpful in managing our day to day needs like online banking, chatting to other friends and family, share of online information including photos, banking transactions, codes, etc. However, we are not aware of one thing and that is threats in the shape of malware. The malware are the online threats that can put your personal information and data on risk and you may suffer in various manners like monetary losses, bad repute, etc.
The mobile applications allow users to have mini computers in their mobile phones and enjoy the services. The smart phones allows many built-in applications in their mobile phones which are basic in nature like calculator, calendar, camera, libraries, etc. and the users may download unlimited applications in their mobile phones like emails, video recorders, MP3 players, Medical apps, online organizational applications for sale & purchase of good online, banking applications and most importantly the games. The main advantage is that you can avail functions of such applications without any computer at anywhere with the help of mobile phone and internet.
The previous approach for developing applications were for the desktop computers and laptops but now the trend has changed and the developers are following the approach “Mobile-First” and they are developing such applications that can easily be downloaded on the mobile phones. It is also reported that about 197 Billion different mobile applications are .
Implementation of Women Safety System using Internet of Thingsijtsrd
In today's world both men and women are having equal responsibility in their works and competing with each other in all the fields. Thus the proposed system is reliable, low cost and user friendly helps women to overcome their fear in critical situation.. S Pradeep | Kanikannan | M Meedunganesh | A. Anny Leema "Implementation of Women Safety System using Internet of Things" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-4 , June 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30945.pdf Paper Url :https://www.ijtsrd.com/computer-science/world-wide-web/30945/implementation-of-women-safety-system-using-internet-of-things/s-pradeep
womwn security app whiich is an alert based app it sends sms and location in security
to the girl it can be a very useful type of an app for the girls they will feel safe when thus will be in their phone downloaded
Hyena has built-in security, user authentication, and automated upgrades, among other features. Hyena has built-in security, user authentication, and automated upgrades, among other features. This is probably all you need to create a secure mobile app from scratch. The Hyena app includes security cover for DIY apps, enterprise apps, business apps, in-house employee apps, and more.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Ej4301823826
1. VaijayantiPawar et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.823-826
www.ijera.com 823|P a g e
SCIWARS Android App for Women Safety
VaijayantiPawar, Prof. N.R.Wankhade, DipikaNikam, KanchanJadhav,
NehaPathak
Department of Computer Engineering,Late G.N.S.COE, Nashik, India.
ABSTRACT
Every human on this planet is working hard for a comfortable living and wants to safeguard his investment that
he has made in his day to day work. Ultimately, at the end of the day we all seek for security of life and our
belongings. The major question to ask your self is we really secure?The world is not perfect and we are
susceptible to the dangers that exist in the society hence the urge to feel protected and safe is fulfilled by the use
of hidden cameras. A hidden spy video camera can be available anywhere. We should be conscious about this
aspect, because we might be in a particular place, where our actions will be recorded without us being aware of
it.Unfortunately, the very reasons that make this device so effective can also lead to it's misuse by some. Sex
scandals involving women and children have occurred due to being recorded illegally. Profits are made through
exploiting this to others whose actions have been monitored by a hidden camera. Victims‟ lives are bust through
the same technology that should have been used to make people feel secure.There should be some way or
technique which can help the person from spy cameras to maintain their privacy. So we have to propose
SCIWARS(Spy Camera Identification And Women Attack Rescue System) intelligent alerts system which will
help to prevent from being victim of any kind of attack or spy cameras. This system contains two modules, first
module will detect Hidden cameras, which are hidden in hotels room, changing rooms. The second module will
helps victims from attack like physical violence, if victims feels unsecure and helpless at any time then by
pressing any key of her mobile continuously the alert message is send to nearest police control room, family,
Ambulance, Friends which are in emergency list that alert message will contains the entire location of that
victims place and images of that location which are taken by camera of her mobile. This will helps victims to
avoid attack and it also helps to police to reach that place as fast as possible for provide help to victim and save
her from attack.
Keywords-GPS Terminology, Audio Recording, Auto Call Receiving System, GPS Tracker.
I. INTRODUCTION
Women are adept at mobilizing diverse
groups for a frequent cause. They often work across
racial, sacred, opinionated, and intellectual divides to
encourage serenity. We are all aware of importance
of women's security, but we must recognize that they
should be well secluded. Women's are not physically
powerful as compared to men, in crisis situation a
helping hand would be a relief for them.
The best way to minimize your chances of
becoming a victim of violent crime (robbery, sexual
assault, rape, domestic violence) is to identify and
call on resources to help you out of unsafe situations.
Whether you're in instant trouble or get separated
from friends during a night out and don't know how
to get home, having these apps on your phone can
diminish your risk and bring assistance when you
require it. Although several were formerly developed
for students to reduce the risk of physical attack on
campus, they are also suitable for all women.
In the light of recent outrage in Delhi which shook
the nation and woke us to the safety issues for our
daughters, public are gearing upbeat in different ways
to fight back. A swarm of new apps have been
developed to provide security systems to women on
their phones.
Here we introduce an app which ensures the safety
of women. This reduces risk and brings assistance
when we need it and help us to identify the location
of the one in danger.
We propose our app since it have some key features
which diverse it from others are as follows:
1) At first user have to save some details. These
details consist of: contact numbers like friends,
family etc. And send the Text Message to the
recipient.
2) Then initialize this app as a "widget", so that a
finger touch is enough to alert your recipient
3) It will also record voice in the region of surrounds
for 45 seconds and then save this recording.
This message also includes the current position
(latitude and longitude) of the victim. Android is the
first truly open and comprehensive software platform
for mobile devices, it‟s a comprehensive software to
run a mobile phone but without the proprietary
RESEARCH ARTICLE OPEN ACCESS
2. VaijayantiPawar et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.823-826
www.ijera.com 824|P a g e
obstacles that have stuck mobile modernization. It is
motorized by Linux Kernel. This is the first
complimentary platform which is robust and is
expected to gain much popularity. The idea
originated from Android-Mobile Application
Development. The current system is developed on the
basis of android platform. Android is an open source
software platform and operating system for mobile
devices. It is based on the Linux kernel. It was
developed by Google team and allows writing
managed code in the Java language. There are
number of technologies and the process presented
with an opportunity such to create a foundation for
future development of actual Android-based
hardware with the inputting and tracing functions
built in it.
II. EXISTING SYSTEM
As part of our initial research, we decided to
investigate applications that offer the same or similar
services for android and other platforms. The aim is
to see how these applications work and to see how
they can be improved. To date it is identified
following Android Apps that offer the relatively
similar service
Android Apps for Women Security
Today the cases of atrocities on women are
growing. In these types of cases mobile is play an
important role for safety of women. Now android is
budding some apps for women security purpose.
These apps are as follows –
FIGHTBACK: - This app is developed by
Mahindra faction. In earlier days, this app was not
complimentary, customer have to compensate for
this app. But after Delhi gang rape this app is on
hand at no cost. This app sends a message to your
friend or contacts that “user is in trouble” using E-
mail, GPS, SMS and GPRS. This app works on
that mobile which supports Android Java
Programming. Using this application, you can send
SMS of your location using maps also [3].
Guardly: - This app is developed basically for
women safety intention. This app put a phone call
by your name, instantaneous location, and
emergency hit to your selected friends. In this app
you have to give your details in profile sheet e.g.
birthdate, tallness, weight, eye-color, blood group,
hair-color, etc. This app is also used in i-Phone, i-
Pad, BlackBerry, Windows Phone etc[4].
OnWatch:-This is persona security application. In
urgent situation user can alert through this
applicaton to his friend. Through this app you can
send „Time Based Alert‟ just like if you are not
reached on given time then within one hour it will
alert to your family and friends. This app has 6
custom-made alert methods that allow you the
flexibility to inform your friends, Police Station or
a combination of all two if you need help.[5].
Life 360 Family Locator:-This is free app. In
emergency this app report to your friends and
family. Using this app you can find relative
members on personal map. This app helps you to
know about your family, whether they are safe or
in trouble. Life360 shows wellbeing places like
hospital, police stations, etc near to you as well as
recent crimes nearby and registered sex
offenders[6].
Street Safe:-This application is developed on
worldwide Women‟s day. It will call community to
help you in any situation. This app has 4 features
for crisis which would be started by just clicking
on the button. These features are as – First, it
automatically updates on your Face book account
with your recent location. Second, SMS will be
sent to chosen associates with your locality. Third,
an alarm is started with large volume on your
mobile. Fourth, call is to be found to your chosen
emergency number[7].
III. PROPOSED SYSTEM
To develop a system for android users for
keeping track through several applications. The
application uses some GPS terminology for location
mapping and tracking the restricted zones, and
detecting hidden web camera`s by using android
mobile devices. And women‟s attack handling system
for women‟s security and protecting against rape and
from other harassment.
A] Hidden Camera Detection Module
This module will detects Hidden cameras, which
are hidden in hotel rooms, changing rooms .Every
Night-vision camera emits Infrared Rays, so when
victim will enters in room if there is any hidden
camera she will get Alert message on her mobile that
there is an hidden camera, this will happens by
catching the infrared rays through her mobile while
she entering in a room. After getting Alert message,
she can send this message to Police control room or
NGO‟s to expose the reality of that mall or hotel.
System Diagram:
3. VaijayantiPawar et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.823-826
www.ijera.com 825|P a g e
Fig. 3.1 Hidden Camera Detection System
Fig.3.1 shows the block diagram of hidden camera
detection system. Initially, when the user entered into
the area where hidden cameras are placed. The signal
detecting system will help in detecting infrared rays
coming out from hidden cameras. As soon as camera
will detect infrared rays, it will generate an alert
message to user using action handler. At the same
time, the GPS system will generate address of
location where the hidden camera is detected and its
user responsibility to decide whether to register a
complaint or not.
B] Women’s Attack Handler Module
This module will helps victims from attack like
physical violence, if victims feels unsecure and
helpless at any time then by pressing any key of her
mobile continuously the alert message is send to
nearest police control room, family, Ambulance,
Friends which are in emergency list that alert
message will contains the entire location of that
victims place, and images of that location which are
taken by camera of her mobile. This will helps
victims to avoid attack and it also helps police to
reach that place as fast as possible for providing help
to victim and save her from attack.
System Diagram:
Fig.3.2 Women‟s Attack Handler System
Fig.3.2 shows the Women‟s Attack Handler System.
When there is attack on women, the application will
get activated by pressing any key of mobile phone.
After pressing the key, Geo coder find the location
and send it to members which are included in contact
list. Also it will capture the images of that location
and send it with the message. Audio recording will be
also done and it is stored in secret location of mobile.
Auto-call Receiving system is also done in this
module.
Text Summarization Algorithm
This Summarization is to compress an original
document into a summarized version by extracting
almost all of the essential concepts with text mining
techniques. Text summarization can be performed in
two different approaches: extraction and abstraction
[1]. The extraction approach is to construct the
summary by taking the most important sentences out
of the original document. In contrast, the abstraction
approach is to form summary by paraphrasing
sections of the original document. In general,
abstraction is more powerful and generates closer
results to those composed by humans than extraction.
Fig.3.3 Algorithmic Execution
4. VaijayantiPawar et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.823-826
www.ijera.com 826|P a g e
Text preprocessor
Text preprocessor is used to translate prepared file
like Email file into simple text file for further
processing.
Sentence Separator
This goes through document and separate
documents on basis of some rule or criterion like
sentence should be finish with dot (.) and there
should be gap between sentences etc.
Word Processor
The word separator works like sentence separator
only it separates words based on some regulation or
criterion like space denotes end of word.
Stop Word Eliminator
Stop word eliminate the ordinary English word from
your document for additional processing.
Word Frequency Calculator
This calculates the number of times a word appears in
document and also calculates the word come out in
text. After calculating frequency of word we scored
that document on the basis of scoring algorithm. We
give the rank to that document and summarize that
document [2].
IV. EXPERIMENTAL RESULTS
This will helps victims from attack like
physical violence, if victims feels unsecure and
helpless at any time then by pressing any key of her
mobile continuously the alert message is send to
nearest police control room, family, Ambulance,
Friends which are in emergency list that alert
message will contains the entire location of that
victims place, and images of that location which are
taken by camera of her mobile. This will helps
victims to avoid attack and it also helps police to
reach that place as fast as possible for providing help
to victim and save her from attack.
Following functions are available in system.
To generate the Alert Message, when victim press
any key of her mobile when victim is in trouble,
Automatically capturing real time image and
recording audio, Sending SMS with location details
and images to selected contacts when victim is in
trouble, Automatically converting profile of mobile
phone to silent mode, Auto-call receiving System,
GPS tracker, Detection of Spy Camera.
V. CONCLUSION
In this, there are two modules. One for
Hidden Camera Detection System, which is used to
detect the hidden camera‟s which are placed in areas
like hospital, colleges, Malls, Hotel rooms etc.
Another module for women attack Handler System.
This system will help in Prevention of attacks on
women and being victim of any sex scandal. This
system will give assurance for women to live secured
life. In this, we use Text summarization algorithm for
calculating word frequency.
ACKNOWLEDGEMENTS
We are very thankful to Prof. N. R.
Wankhede and all staff of Late G.N.S.COE, Nashik.
REFERENCES
[1] Munesh Chandra DIT, School of Engg.,
Vikrant Gupta R.K.G.I.T., Santosh Kr.
Paul, R.K.G.I.T. “A Statistical approach for
Automatic Text Summarization by
Extraction”, International Conference on
Communication Systems and Network
Technologies, IEEE 2011
[2] Samadhan R. Manore, Computer Science
Department, Shivaji University. “Email
Document Summarization Using Statistical
Approach”.International Advance Computing
Conference (IACC 2009), IEEE 2009
[3] “Fightback” Android App Developed By
CanvasM Technologies, 26 June
2013,"http://www.fightbackmobile.com/welc
ome”
[4] “Guardly” Android App Developed By
GuardlyCorp.,28 January 2014,
https://www.guardly.com/
[5] “OnWatch” Android App Developed
ByOnWatch, 10 November
2012"https://play.google.com/store/apps/detai
ls?id=com.onwatch".
[6] “Life 360 – Family Locator” Android App
Developed ByLife360, 20 February
2014,"https://www.life360.com/family-
locator/",
[7] “StreetSafe" Android App Developed
ByPeopleGuard LLC", 24 September
2013,“http://streetsafe.com/static-products-
overview”