SlideShare a Scribd company logo
BByy MMdd.. SSyyeeffuull IIssllaamm 
SSrr.. SSooffttwwaarree EEnnggiinneeeerr 
SSaammssuunngg RReesseeaarrcchh IInnssttiittuuttee BBaannggllaaddeesshh
Presentation Covered 
 
 Introduction 
 Objective 
 System Description 
 System Work Flow 
 Target People 
 Implication on Socio-Economic Development 
 Business Scope 
 Q&A
Introduction Cont. 
 
 In emergency cases needs to inform the family 
members, concern person or a group of person. 
 All these situation, needs to be done manually by 
sending SMS or Call via mobile phone. 
 At emergency case no time to do it manually to send 
SMS or Call 
 Or there is no situation to call or send SMS.
Introduction Cont. 
 
 Emergency Notification is an interactive, user 
friendly and more efficient notification system for 
smartphone. 
 In emergency case it can notify concern person 
automatically if user fall any incident. 
 It can broadcast victim current location with 
notification. 
 The End user can track the location of victim
Objective 
 
 An application which can automatically send 
message to the concern person on emergency 
incidence. 
 It makes our life easier and smart phone act as a best 
friend, family member or good wisher.
System Description 
 
 In emergency case user make an input. 
 System make a notification based on input 
command. 
 Send notification to desired person. 
 System take voice command as a input. 
 Receiver received and read notification. 
 Receiver can track the position of sender if needed.
System Work Flow Cont. 

System Work Flow Cont. 
 
Prerequisite: 
User must identify his/her danger situation and make a 
list of incident. 
It also needs to make contact of concern person or group 
of concern person who can help or user wants to notify for 
particular incident. 
Set contact with incident. 
Set input command for each incident. Because notification 
makes based on input command and corresponding 
incident type.
System Work Flow Cont. 
 
 Makes incident list, notification template and 
corresponding input command and contact list. 
 In emergency case user use voice command which 
already been set for this case to notified concern 
person. 
 User phone application process input voice and make 
a notification using template.
System Work Flow Cont. 
 
 Search for preset contact based on input command. 
 Send notification to desired contact. 
 After read notification receiver can track the location 
of victim using GPS system. 
 Receiver can track movement of victim.
Target People 
 
 The general people(All ages people) 
 The VIP citizen 
 Police 
 School/college/University 
 Office/Bank/Hospital
Implication on Socio- 
Economic Development 
 
• Helps us to minimize our life risk or our tension when we 
are out of home or away from family members or there’s. 
• The position of the Victim will be track instantly. 
• Increase our lifestyle. 
• Decrease terrorism and other crime and make awareness. 
• Decrease tension to take care of family member’s. 
 Life will be more secure. 
 Government will get more feedback of frequent 
incidents.
Business Scope 
 
• I think this features on cell phone can increase the user 
of cell phone. 
• This is more realistic feature and more users friendly 
and efficient. 
• I hope this also minimize our life risk or our tension 
when we are out of home or away from family 
members or there’s.
 
Q & A
 
THANK YOU

More Related Content

Viewers also liked

How does your media product represent particular social
How does your media product represent particular socialHow does your media product represent particular social
How does your media product represent particular social
salesian2014as
 
Septic Tank Bacteria Treatment
Septic Tank Bacteria TreatmentSeptic Tank Bacteria Treatment
Septic Tank Bacteria Treatment
HenryJordan12
 
Mature, Episode 9: "Hipsters"
Mature, Episode 9: "Hipsters"Mature, Episode 9: "Hipsters"
Mature, Episode 9: "Hipsters"
stealmyscripts
 
Online reputation management for car dealerships car dealer reputation mark...
Online reputation management for car dealerships   car dealer reputation mark...Online reputation management for car dealerships   car dealer reputation mark...
Online reputation management for car dealerships car dealer reputation mark...
Andrew Wroblewski
 
The making of Lys-de-Membre - Part 1
The making of Lys-de-Membre - Part 1The making of Lys-de-Membre - Part 1
The making of Lys-de-Membre - Part 1
Iris Casteleyn
 
Evaluation 4
Evaluation 4Evaluation 4
Evaluation 4
salesian2014as
 
Syedtrimzi
SyedtrimziSyedtrimzi
Quarter 3 Project
Quarter 3 ProjectQuarter 3 Project
Quarter 3 Project
almiklas
 

Viewers also liked (8)

How does your media product represent particular social
How does your media product represent particular socialHow does your media product represent particular social
How does your media product represent particular social
 
Septic Tank Bacteria Treatment
Septic Tank Bacteria TreatmentSeptic Tank Bacteria Treatment
Septic Tank Bacteria Treatment
 
Mature, Episode 9: "Hipsters"
Mature, Episode 9: "Hipsters"Mature, Episode 9: "Hipsters"
Mature, Episode 9: "Hipsters"
 
Online reputation management for car dealerships car dealer reputation mark...
Online reputation management for car dealerships   car dealer reputation mark...Online reputation management for car dealerships   car dealer reputation mark...
Online reputation management for car dealerships car dealer reputation mark...
 
The making of Lys-de-Membre - Part 1
The making of Lys-de-Membre - Part 1The making of Lys-de-Membre - Part 1
The making of Lys-de-Membre - Part 1
 
Evaluation 4
Evaluation 4Evaluation 4
Evaluation 4
 
Syedtrimzi
SyedtrimziSyedtrimzi
Syedtrimzi
 
Quarter 3 Project
Quarter 3 ProjectQuarter 3 Project
Quarter 3 Project
 

Similar to Emergency notification at your phone

A novel approach for rescue through wireless emergency alert message
A novel approach for rescue through wireless emergency alert messageA novel approach for rescue through wireless emergency alert message
A novel approach for rescue through wireless emergency alert message
BRNSSPublicationHubI
 
Savdhaan (Women Security App)
Savdhaan (Women Security App)Savdhaan (Women Security App)
Savdhaan (Women Security App)
Poojaagrawal130
 
LEAF SMART COMMUNITY
LEAF SMART COMMUNITYLEAF SMART COMMUNITY
LEAF SMART COMMUNITY
LIN SHIH WEI
 
E paper-IOT based-medical-emergency-detection-and-rescue
E paper-IOT based-medical-emergency-detection-and-rescueE paper-IOT based-medical-emergency-detection-and-rescue
E paper-IOT based-medical-emergency-detection-and-rescue
Ashish Agrawal
 
Mass Notification System 3.pptx
Mass Notification System 3.pptxMass Notification System 3.pptx
Mass Notification System 3.pptx
Alisha593601
 
marketing project
marketing projectmarketing project
marketing project
Neha Gupta
 
Reasons to Own a Personal Emergency Response System(PERS)
Reasons to Own a Personal Emergency Response System(PERS)Reasons to Own a Personal Emergency Response System(PERS)
Reasons to Own a Personal Emergency Response System(PERS)
Senior Protection
 
IRJET - Women’s Safety using IoT
IRJET - Women’s Safety using IoTIRJET - Women’s Safety using IoT
IRJET - Women’s Safety using IoT
IRJET Journal
 
Activity Tracker Wrist Band for Children Monitoring using IOT
Activity Tracker Wrist Band for Children Monitoring using IOTActivity Tracker Wrist Band for Children Monitoring using IOT
Activity Tracker Wrist Band for Children Monitoring using IOT
rahulmonikasharma
 
Iaetsd habitual descend recognition
Iaetsd habitual descend recognitionIaetsd habitual descend recognition
Iaetsd habitual descend recognition
Iaetsd Iaetsd
 
An Improved Personal Security System
An Improved Personal Security SystemAn Improved Personal Security System
An Improved Personal Security System
IJERA Editor
 
Discussion Forum.300 wordsInclude at least. words in your po
Discussion Forum.300 wordsInclude at least. words in your poDiscussion Forum.300 wordsInclude at least. words in your po
Discussion Forum.300 wordsInclude at least. words in your po
widdowsonerica
 
Design Document Final for HELP application
Design Document Final for HELP applicationDesign Document Final for HELP application
Design Document Final for HELP application
Mamoon Ismail Khalid
 
Blue star savior
Blue star saviorBlue star savior
Blue star savior
phong9
 
SOS - Solution-for-Emergencies-hiddenbrains.pdf
SOS - Solution-for-Emergencies-hiddenbrains.pdfSOS - Solution-for-Emergencies-hiddenbrains.pdf
SOS - Solution-for-Emergencies-hiddenbrains.pdf
philipthomas428223
 
IRJET- Convenient Address Book Management
IRJET- Convenient Address Book ManagementIRJET- Convenient Address Book Management
IRJET- Convenient Address Book Management
IRJET Journal
 
A world of events where news travels fast
A world of events where news travels fastA world of events where news travels fast
A world of events where news travels fast
Lucas Jellema
 
Women safey an outlook
Women safey   an outlookWomen safey   an outlook
Women safey an outlook
Sasikant Singh
 
G3 syst tech draft pdf
G3 syst tech draft pdfG3 syst tech draft pdf
G3 syst tech draft pdf
tapperkc
 
Instant Communications Duty Of Care
Instant Communications   Duty Of CareInstant Communications   Duty Of Care
Instant Communications Duty Of Care
mariapouney
 

Similar to Emergency notification at your phone (20)

A novel approach for rescue through wireless emergency alert message
A novel approach for rescue through wireless emergency alert messageA novel approach for rescue through wireless emergency alert message
A novel approach for rescue through wireless emergency alert message
 
Savdhaan (Women Security App)
Savdhaan (Women Security App)Savdhaan (Women Security App)
Savdhaan (Women Security App)
 
LEAF SMART COMMUNITY
LEAF SMART COMMUNITYLEAF SMART COMMUNITY
LEAF SMART COMMUNITY
 
E paper-IOT based-medical-emergency-detection-and-rescue
E paper-IOT based-medical-emergency-detection-and-rescueE paper-IOT based-medical-emergency-detection-and-rescue
E paper-IOT based-medical-emergency-detection-and-rescue
 
Mass Notification System 3.pptx
Mass Notification System 3.pptxMass Notification System 3.pptx
Mass Notification System 3.pptx
 
marketing project
marketing projectmarketing project
marketing project
 
Reasons to Own a Personal Emergency Response System(PERS)
Reasons to Own a Personal Emergency Response System(PERS)Reasons to Own a Personal Emergency Response System(PERS)
Reasons to Own a Personal Emergency Response System(PERS)
 
IRJET - Women’s Safety using IoT
IRJET - Women’s Safety using IoTIRJET - Women’s Safety using IoT
IRJET - Women’s Safety using IoT
 
Activity Tracker Wrist Band for Children Monitoring using IOT
Activity Tracker Wrist Band for Children Monitoring using IOTActivity Tracker Wrist Band for Children Monitoring using IOT
Activity Tracker Wrist Band for Children Monitoring using IOT
 
Iaetsd habitual descend recognition
Iaetsd habitual descend recognitionIaetsd habitual descend recognition
Iaetsd habitual descend recognition
 
An Improved Personal Security System
An Improved Personal Security SystemAn Improved Personal Security System
An Improved Personal Security System
 
Discussion Forum.300 wordsInclude at least. words in your po
Discussion Forum.300 wordsInclude at least. words in your poDiscussion Forum.300 wordsInclude at least. words in your po
Discussion Forum.300 wordsInclude at least. words in your po
 
Design Document Final for HELP application
Design Document Final for HELP applicationDesign Document Final for HELP application
Design Document Final for HELP application
 
Blue star savior
Blue star saviorBlue star savior
Blue star savior
 
SOS - Solution-for-Emergencies-hiddenbrains.pdf
SOS - Solution-for-Emergencies-hiddenbrains.pdfSOS - Solution-for-Emergencies-hiddenbrains.pdf
SOS - Solution-for-Emergencies-hiddenbrains.pdf
 
IRJET- Convenient Address Book Management
IRJET- Convenient Address Book ManagementIRJET- Convenient Address Book Management
IRJET- Convenient Address Book Management
 
A world of events where news travels fast
A world of events where news travels fastA world of events where news travels fast
A world of events where news travels fast
 
Women safey an outlook
Women safey   an outlookWomen safey   an outlook
Women safey an outlook
 
G3 syst tech draft pdf
G3 syst tech draft pdfG3 syst tech draft pdf
G3 syst tech draft pdf
 
Instant Communications Duty Of Care
Instant Communications   Duty Of CareInstant Communications   Duty Of Care
Instant Communications Duty Of Care
 

More from Syeful Islam

[Brochure ] mobi manager mdm_software
[Brochure ] mobi manager mdm_software[Brochure ] mobi manager mdm_software
[Brochure ] mobi manager mdm_software
Syeful Islam
 
Business benefit of Mobile device management
Business benefit of Mobile device managementBusiness benefit of Mobile device management
Business benefit of Mobile device management
Syeful Islam
 
Mobi manager mdm
Mobi manager mdmMobi manager mdm
Mobi manager mdm
Syeful Islam
 
A New Approach: Automatically Identify Proper Noun from Bengali Sentence for ...
A New Approach: Automatically Identify Proper Noun from Bengali Sentence for ...A New Approach: Automatically Identify Proper Noun from Bengali Sentence for ...
A New Approach: Automatically Identify Proper Noun from Bengali Sentence for ...
Syeful Islam
 
Hidden Object Detection for Computer Vision Based Test Automation System
Hidden Object Detection for Computer Vision Based Test Automation SystemHidden Object Detection for Computer Vision Based Test Automation System
Hidden Object Detection for Computer Vision Based Test Automation System
Syeful Islam
 
A New Approach: Automatically Identify Naming Word from Bengali Sentence for ...
A New Approach: Automatically Identify Naming Word from Bengali Sentence for ...A New Approach: Automatically Identify Naming Word from Bengali Sentence for ...
A New Approach: Automatically Identify Naming Word from Bengali Sentence for ...
Syeful Islam
 
Disordered Brain Modeling Using Artificial Network SOFM
Disordered Brain Modeling Using Artificial Network SOFMDisordered Brain Modeling Using Artificial Network SOFM
Disordered Brain Modeling Using Artificial Network SOFM
Syeful Islam
 
Disordered Brain Modeling Using Artificial Network SOFM
Disordered Brain Modeling Using Artificial Network SOFMDisordered Brain Modeling Using Artificial Network SOFM
Disordered Brain Modeling Using Artificial Network SOFM
Syeful Islam
 
jQuery besic
jQuery besicjQuery besic
jQuery besic
Syeful Islam
 
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
Syeful Islam
 
A New Approach: Automatically Identify Naming Word from Bengali Sentence for ...
A New Approach: Automatically Identify Naming Word from Bengali Sentence for ...A New Approach: Automatically Identify Naming Word from Bengali Sentence for ...
A New Approach: Automatically Identify Naming Word from Bengali Sentence for ...
Syeful Islam
 
Design Analysis Rules to Identify Proper Noun from Bengali Sentence for Univ...
Design Analysis Rules to Identify Proper Noun  from Bengali Sentence for Univ...Design Analysis Rules to Identify Proper Noun  from Bengali Sentence for Univ...
Design Analysis Rules to Identify Proper Noun from Bengali Sentence for Univ...
Syeful Islam
 
Performance Evaluation of Finite Queue Switching Under Two-Dimensional M/G/1...
Performance Evaluation of Finite Queue Switching  Under Two-Dimensional M/G/1...Performance Evaluation of Finite Queue Switching  Under Two-Dimensional M/G/1...
Performance Evaluation of Finite Queue Switching Under Two-Dimensional M/G/1...
Syeful Islam
 
Java oop concepts
Java oop conceptsJava oop concepts
Java oop concepts
Syeful Islam
 
Development of analysis rules to identify proper noun from bengali sentence f...
Development of analysis rules to identify proper noun from bengali sentence f...Development of analysis rules to identify proper noun from bengali sentence f...
Development of analysis rules to identify proper noun from bengali sentence f...
Syeful Islam
 

More from Syeful Islam (15)

[Brochure ] mobi manager mdm_software
[Brochure ] mobi manager mdm_software[Brochure ] mobi manager mdm_software
[Brochure ] mobi manager mdm_software
 
Business benefit of Mobile device management
Business benefit of Mobile device managementBusiness benefit of Mobile device management
Business benefit of Mobile device management
 
Mobi manager mdm
Mobi manager mdmMobi manager mdm
Mobi manager mdm
 
A New Approach: Automatically Identify Proper Noun from Bengali Sentence for ...
A New Approach: Automatically Identify Proper Noun from Bengali Sentence for ...A New Approach: Automatically Identify Proper Noun from Bengali Sentence for ...
A New Approach: Automatically Identify Proper Noun from Bengali Sentence for ...
 
Hidden Object Detection for Computer Vision Based Test Automation System
Hidden Object Detection for Computer Vision Based Test Automation SystemHidden Object Detection for Computer Vision Based Test Automation System
Hidden Object Detection for Computer Vision Based Test Automation System
 
A New Approach: Automatically Identify Naming Word from Bengali Sentence for ...
A New Approach: Automatically Identify Naming Word from Bengali Sentence for ...A New Approach: Automatically Identify Naming Word from Bengali Sentence for ...
A New Approach: Automatically Identify Naming Word from Bengali Sentence for ...
 
Disordered Brain Modeling Using Artificial Network SOFM
Disordered Brain Modeling Using Artificial Network SOFMDisordered Brain Modeling Using Artificial Network SOFM
Disordered Brain Modeling Using Artificial Network SOFM
 
Disordered Brain Modeling Using Artificial Network SOFM
Disordered Brain Modeling Using Artificial Network SOFMDisordered Brain Modeling Using Artificial Network SOFM
Disordered Brain Modeling Using Artificial Network SOFM
 
jQuery besic
jQuery besicjQuery besic
jQuery besic
 
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
 
A New Approach: Automatically Identify Naming Word from Bengali Sentence for ...
A New Approach: Automatically Identify Naming Word from Bengali Sentence for ...A New Approach: Automatically Identify Naming Word from Bengali Sentence for ...
A New Approach: Automatically Identify Naming Word from Bengali Sentence for ...
 
Design Analysis Rules to Identify Proper Noun from Bengali Sentence for Univ...
Design Analysis Rules to Identify Proper Noun  from Bengali Sentence for Univ...Design Analysis Rules to Identify Proper Noun  from Bengali Sentence for Univ...
Design Analysis Rules to Identify Proper Noun from Bengali Sentence for Univ...
 
Performance Evaluation of Finite Queue Switching Under Two-Dimensional M/G/1...
Performance Evaluation of Finite Queue Switching  Under Two-Dimensional M/G/1...Performance Evaluation of Finite Queue Switching  Under Two-Dimensional M/G/1...
Performance Evaluation of Finite Queue Switching Under Two-Dimensional M/G/1...
 
Java oop concepts
Java oop conceptsJava oop concepts
Java oop concepts
 
Development of analysis rules to identify proper noun from bengali sentence f...
Development of analysis rules to identify proper noun from bengali sentence f...Development of analysis rules to identify proper noun from bengali sentence f...
Development of analysis rules to identify proper noun from bengali sentence f...
 

Recently uploaded

Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 

Recently uploaded (20)

Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 

Emergency notification at your phone

  • 1. BByy MMdd.. SSyyeeffuull IIssllaamm SSrr.. SSooffttwwaarree EEnnggiinneeeerr SSaammssuunngg RReesseeaarrcchh IInnssttiittuuttee BBaannggllaaddeesshh
  • 2. Presentation Covered   Introduction  Objective  System Description  System Work Flow  Target People  Implication on Socio-Economic Development  Business Scope  Q&A
  • 3. Introduction Cont.   In emergency cases needs to inform the family members, concern person or a group of person.  All these situation, needs to be done manually by sending SMS or Call via mobile phone.  At emergency case no time to do it manually to send SMS or Call  Or there is no situation to call or send SMS.
  • 4. Introduction Cont.   Emergency Notification is an interactive, user friendly and more efficient notification system for smartphone.  In emergency case it can notify concern person automatically if user fall any incident.  It can broadcast victim current location with notification.  The End user can track the location of victim
  • 5. Objective   An application which can automatically send message to the concern person on emergency incidence.  It makes our life easier and smart phone act as a best friend, family member or good wisher.
  • 6. System Description   In emergency case user make an input.  System make a notification based on input command.  Send notification to desired person.  System take voice command as a input.  Receiver received and read notification.  Receiver can track the position of sender if needed.
  • 7. System Work Flow Cont. 
  • 8. System Work Flow Cont.  Prerequisite: User must identify his/her danger situation and make a list of incident. It also needs to make contact of concern person or group of concern person who can help or user wants to notify for particular incident. Set contact with incident. Set input command for each incident. Because notification makes based on input command and corresponding incident type.
  • 9. System Work Flow Cont.   Makes incident list, notification template and corresponding input command and contact list.  In emergency case user use voice command which already been set for this case to notified concern person.  User phone application process input voice and make a notification using template.
  • 10. System Work Flow Cont.   Search for preset contact based on input command.  Send notification to desired contact.  After read notification receiver can track the location of victim using GPS system.  Receiver can track movement of victim.
  • 11. Target People   The general people(All ages people)  The VIP citizen  Police  School/college/University  Office/Bank/Hospital
  • 12. Implication on Socio- Economic Development  • Helps us to minimize our life risk or our tension when we are out of home or away from family members or there’s. • The position of the Victim will be track instantly. • Increase our lifestyle. • Decrease terrorism and other crime and make awareness. • Decrease tension to take care of family member’s.  Life will be more secure.  Government will get more feedback of frequent incidents.
  • 13. Business Scope  • I think this features on cell phone can increase the user of cell phone. • This is more realistic feature and more users friendly and efficient. • I hope this also minimize our life risk or our tension when we are out of home or away from family members or there’s.
  • 14.  Q & A