In worldwide situation, the prime inquiry in each woman mind is about her safety and the badgering issues. Women everywhere throughout the world are confronting much deceptive physical provocation. The main idea frequenting each woman is the point at which they will have the capability to move frankly in the city even in odd hours without stressing over their security. Our task is a dare to determine this issue. This paper describes about a smart intelligent security system for women. This venture concentrates on a security for women so they will never feel vulnerable. The system comprises of different modules such as GPS receiver, shock circuit, buzzer, spray mechanism, Webcam, pulse rate sensor, Raspberry pi-3 module. Today there are many cases which are going on about women all over in the world. It was high time where women required a change. This task depends on women security where women feel ensured. This venture portrays about safety electronic system for women, worked out in the open transport vehicles such as, car, buses and auto-rickshaws as these days women are being at molested, kidnapped and badgering by the drivers. In each field there is an uncommon effect of women like games, dance, training, business, in legislative issues moreover. Women are driving in each field. The question arises that, Are the women in India are extremely secured? Always get the solution No. Henceforth executed Internet of Things based women tracking and security with auto-defender system which is interfaced with Raspberry pi 3 board that will track the location of the women also will auto defend in bad situation.
This project describes about a smart intelligent security system for women. Women all over the world are facing much unethical physical harassment. This acquires a fast pace due to lack of a suitable surveillance system. Our project is a venture to resolve this problem. We are using two objects wrist band and spectacles that are used in day to day life. The system resembles a band on the wrist incorporated with pressure switch as an input which when activates shows the result Screaming alarm and tear gas mechanism are imposed for self-defensing purpose and send location and messages to the emergency contacts and also figure out the attacker using live streaming video. Tear gas mechanism and live streaming video using webcam is incorporated in the spectacles that act as a weapon of the smart technology. We really believe that this endeavor will make a difference in the women life.
Presentation is designed as a part of my seminar report with reference to ieee paper which deals with the design and implementation of rescue system for women safety
India's greatest threat is the safety of its women. Women do not feel safe in a variety of situations. This needs to be addressed as quickly as feasible. Technology evolves and develops on a daily basis, affecting how people live. As a result, the focus of this article is on modernising the technological framework in order to strengthen women's safety mechanisms. We introduce a new security method in this study to protect women during unusual behaviours. A new security technique based on a patrolling robot using the Raspberry Pi has been proposed. In this case, a night vision camera can be employed to secure any location. Various machine learning methods are applied to improve the classifier's accuracy. The findings suggest that the suggested method outperforms existing methods.
This project describes about a smart intelligent security system for women. Women all over the world are facing much unethical physical harassment. This acquires a fast pace due to lack of a suitable surveillance system. Our project is a venture to resolve this problem. We are using two objects wrist band and spectacles that are used in day to day life. The system resembles a band on the wrist incorporated with pressure switch as an input which when activates shows the result Screaming alarm and tear gas mechanism are imposed for self-defensing purpose and send location and messages to the emergency contacts and also figure out the attacker using live streaming video. Tear gas mechanism and live streaming video using webcam is incorporated in the spectacles that act as a weapon of the smart technology. We really believe that this endeavor will make a difference in the women life.
Presentation is designed as a part of my seminar report with reference to ieee paper which deals with the design and implementation of rescue system for women safety
India's greatest threat is the safety of its women. Women do not feel safe in a variety of situations. This needs to be addressed as quickly as feasible. Technology evolves and develops on a daily basis, affecting how people live. As a result, the focus of this article is on modernising the technological framework in order to strengthen women's safety mechanisms. We introduce a new security method in this study to protect women during unusual behaviours. A new security technique based on a patrolling robot using the Raspberry Pi has been proposed. In this case, a night vision camera can be employed to secure any location. Various machine learning methods are applied to improve the classifier's accuracy. The findings suggest that the suggested method outperforms existing methods.
In global scenario, the prime question in every girls mind is about her safety and the harassment issues. The only thought haunting every girl is when they will be able to move freely on the streets even in odd hours without worrying about their security. This project suggests a new technology to protect women. This project focuses on a security for women so that they will never feel helpless. The system consists of various modules such as GSM, GPS, memory card, shock circuit, buzzer, camera, Raspberry pi-3 module. by Ms. Aayesha M. Shaikh and Mr. Desai P. B 2018. Women’s Safety Jacket. International Journal on Integrated Education. 1, 1 (Dec. 2018), 77-81 https://journals.researchparks.org/index.php/IJIE/article/view/788/757 https://journals.researchparks.org/index.php/IJIE/article/view/788
Project report on Vehicle accident and Alcohol sensing alert with Engine Lock...Hitesh Kumar Singh
The main purpose behind this project is “Drunk driving detection”. Now a days, many accidents are happening because of the alcohol consumption of the driver or the person who is driving the vehicle. Thus, Drunk driving is a major reason of accidents in almost all the countries in the world. Alcohol Detector in Car project is designed for the safety of the people seating inside the car. This project should be fitted / installed inside the vehicle. If any Accident occurs then engine goes off and Alarm goes on. If there is no alcohol / no accident, then the Engine remains on and Alarm remains off. Even, if the Alcohol is detected, the engine goes off Alarm starts beeping.
Gas Leakage Detection Based on IOT
Cloud Technologies providing Complete Solution for all
Academic Projects Final Year/Semester Student Projects
For More Details,
Contact:
Mobile:- +91 8121953811,
whatsapp:- +91 8522991105,
Email ID: cloudtechnologiesprojects@gmail.com
This system is based on sensors and microcontroller. The features are to detect the obstacle for collision avoidance and it detects the object in directions left, right, down and front. The system is composed of the ultrasonic sensor, IR sensor and Arduino Mega 2560. It has a low cost and lightweight system design. By using these three items, it senses the distance with sensors and the blind stick frame is designed. And then send distance data to Arduino mega2560 controller. In emergency situations, the blind walker knows the distance or safe area for themselves. Ma Naing | Nwe Nwe Oo | May Thwe Oo "Smart Blind Walking Stick Using Arduino" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26601.pdfPaper URL: https://www.ijtsrd.com/engineering/electrical-engineering/26601/smart-blind-walking-stick-using-arduino/ma-naing
The purpose of this project is to control robot with an interface board of the Raspberry Pi, sensors and software to full fill real time requirement.
Controlling DC motors, different sensors, camera interfacing with raspberry Pi using GPIO pin.
Live streaming, Command the robot easily, sends data of different sensors which works automatically or control from anywhere at any time.
Design of the website and control page of robot is done using Java tools and HTML. This system works on IOT concept.
This will enable Raspberry Pi to be used for more robotic applications and cut down the cost for building an IOT Robot.
This paper detailed about a smart alarm system for
women’s security. Women all over the world are facing much
unscrupulous physical irritation. This acquires a fast pace
due to lack of a suitable investigation system. The system look
like a group on the wrist merged with pressure switch as an
input which when triggers shows the result loud alarm
imposed for self-defensing purpose and send location and
messages to the emergency contacts. The whole process will
be held in Arduino Microcontroller. The digital switch
incorporates with the controlling unit. Whenever the user
presses the digital switch, the emergency message will be
passed to the server unit via GSM SIM 800A module. By
implementing the proposed system, the physical harassment
on the women will be reduced.
In global scenario, the prime question in every girls mind is about her safety and the harassment issues. The only thought haunting every girl is when they will be able to move freely on the streets even in odd hours without worrying about their security. This project suggests a new technology to protect women. This project focuses on a security for women so that they will never feel helpless. The system consists of various modules such as GSM, GPS, memory card, shock circuit, buzzer, camera, Raspberry pi-3 module. by Ms. Aayesha M. Shaikh and Mr. Desai P. B 2018. Women’s Safety Jacket. International Journal on Integrated Education. 1, 1 (Dec. 2018), 77-81 https://journals.researchparks.org/index.php/IJIE/article/view/788/757 https://journals.researchparks.org/index.php/IJIE/article/view/788
Project report on Vehicle accident and Alcohol sensing alert with Engine Lock...Hitesh Kumar Singh
The main purpose behind this project is “Drunk driving detection”. Now a days, many accidents are happening because of the alcohol consumption of the driver or the person who is driving the vehicle. Thus, Drunk driving is a major reason of accidents in almost all the countries in the world. Alcohol Detector in Car project is designed for the safety of the people seating inside the car. This project should be fitted / installed inside the vehicle. If any Accident occurs then engine goes off and Alarm goes on. If there is no alcohol / no accident, then the Engine remains on and Alarm remains off. Even, if the Alcohol is detected, the engine goes off Alarm starts beeping.
Gas Leakage Detection Based on IOT
Cloud Technologies providing Complete Solution for all
Academic Projects Final Year/Semester Student Projects
For More Details,
Contact:
Mobile:- +91 8121953811,
whatsapp:- +91 8522991105,
Email ID: cloudtechnologiesprojects@gmail.com
This system is based on sensors and microcontroller. The features are to detect the obstacle for collision avoidance and it detects the object in directions left, right, down and front. The system is composed of the ultrasonic sensor, IR sensor and Arduino Mega 2560. It has a low cost and lightweight system design. By using these three items, it senses the distance with sensors and the blind stick frame is designed. And then send distance data to Arduino mega2560 controller. In emergency situations, the blind walker knows the distance or safe area for themselves. Ma Naing | Nwe Nwe Oo | May Thwe Oo "Smart Blind Walking Stick Using Arduino" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26601.pdfPaper URL: https://www.ijtsrd.com/engineering/electrical-engineering/26601/smart-blind-walking-stick-using-arduino/ma-naing
The purpose of this project is to control robot with an interface board of the Raspberry Pi, sensors and software to full fill real time requirement.
Controlling DC motors, different sensors, camera interfacing with raspberry Pi using GPIO pin.
Live streaming, Command the robot easily, sends data of different sensors which works automatically or control from anywhere at any time.
Design of the website and control page of robot is done using Java tools and HTML. This system works on IOT concept.
This will enable Raspberry Pi to be used for more robotic applications and cut down the cost for building an IOT Robot.
This paper detailed about a smart alarm system for
women’s security. Women all over the world are facing much
unscrupulous physical irritation. This acquires a fast pace
due to lack of a suitable investigation system. The system look
like a group on the wrist merged with pressure switch as an
input which when triggers shows the result loud alarm
imposed for self-defensing purpose and send location and
messages to the emergency contacts. The whole process will
be held in Arduino Microcontroller. The digital switch
incorporates with the controlling unit. Whenever the user
presses the digital switch, the emergency message will be
passed to the server unit via GSM SIM 800A module. By
implementing the proposed system, the physical harassment
on the women will be reduced.
In current period an enormous rise in crime against women can be observed and along with women even children, old age people are also suffering with inhuman activities as kidnapping. Women feel insecure roaming around the city alone, even the family members are always worried about their security till the time they get back safe. Many personal security solutions are available in the market in form of mobile applications and wearable devices as wrist bands, pendants, etc.. But all these already available solutions prove useless if the user is unable to trigger the device or mobile app in case of danger and also if device is lost or broken or battery goes low. This paper proposes a new improved personal security solution that will overcome these drawbacks of wearable devices and mobile applications making it more reliable solution for security.
Implementation of Women Safety System using Internet of Thingsijtsrd
In today's world both men and women are having equal responsibility in their works and competing with each other in all the fields. Thus the proposed system is reliable, low cost and user friendly helps women to overcome their fear in critical situation.. S Pradeep | Kanikannan | M Meedunganesh | A. Anny Leema "Implementation of Women Safety System using Internet of Things" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-4 , June 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30945.pdf Paper Url :https://www.ijtsrd.com/computer-science/world-wide-web/30945/implementation-of-women-safety-system-using-internet-of-things/s-pradeep
Activity Tracker Wrist Band for Children Monitoring using IOTrahulmonikasharma
Today in present world of digital technology and global computing every person is connected with each other in number of ways. In current global computing world, the children and women harassment, chain snatchings, kidnapping, sexual harassments, eve teasing, etc. are increased day-by day, becoming more unsafe and helpless. When these perilous situations occur there must be a trending technology to be comfortable to handle. So we are proposing a system that works on the controversy of children using IOT. In this project we proposed a device which is integrated with multiple devices, comprising of wearable “Activity Tracker Wrist Band” which is programmed with all the required data which includes the behavior of the human reactions like anger, anxiety, nervousness and fear. When these situations are faced by the victim, the various sensors generate the emergency signals which are to be transmitted to the smart phone. The system effectively monitors the children presence within the expected zone. When the person crosses the monitoring zone, then based on IOT Monitoring system, GSM sends help request by sending messages to the nearest police station, parents and the people in the near radius.
The 2008 Batman movie "Dark Knight" is still remembered because of its many contributions to the superhero genre. The actors in this film are highly praised for their superb performances, the most famous of which is the late actor Heath Ledger. In addition, the high-tech weapons in the movie have also raised our expectations for action movies.
Data Mining is a significant field in today’s data-driven world. Understanding and implementing its concepts can lead to discovery of useful insights. This paper discusses the main concepts of data mining, focusing on two main concepts namely Association Rule Mining and Time Series Analysis
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...rahulmonikasharma
We are describes the technique for real time human face detection and counting the number of passengers in vehicle and also gender of the passengers.The Image processing technology is very popular,now at present all are going to use it for various purpose. It can be applied to various applications for detecting and processing the digital images. Face detection is a part of image processing. It is used for finding the face of human in a given area. Face detection is used in many applications such as face recognition, people tracking, or photography. In this paper,The webcam is installed in public vehicle and connected with Raspberry Pi model. We use face detection technique for detecting and counting the number of passengers in public vehicle via webcam with the help of image processing and Raspberry Pi.
Considering Two Sides of One Review Using Stanford NLP Frameworkrahulmonikasharma
Sentiment analysis is a type of natural language processing for tracking the mood of the public about a particular product or a topic and is useful in several ways. Polarity shift is the most classical task which aims at classifying the reviews either positive or negative. But in many cases, in addition to the positive and negative reviews, there still many neutral reviews exist. However, the performance sometimes limited due to the fundamental deficiencies in handling the polarity shift problem. We propose an Improvised Dual Sentiment Analysis (IDSA) model to address this problem for sentiment classification. We first propose a novel data expansion technique by creating sentiment-reversed review for each training and test review. We develop a corpus based method to construct a pseudo-antonym dictionary. It removes DSA’s dependency on an external antonym dictionary for review reversion. We conduct a range of experiments and the results demonstrates the effectiveness of DSA in addressing the polarity shift in sentiment classification. .
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systemsrahulmonikasharma
The requirements of fifth generation new radio (5G- NR) access networks are very high capacity and ultra-reliability. In this paper, we proposed a V-BLAST2 × N_r MIMO system that is analyzed, improved, and expected to achieve both very high throughput and ultra- reliability simultaneously.A new detection technique called parallel detection algorithm is proposed. The performance of the proposed algorithm compared with existing linear detection algorithms. It was seen that the proposed technique increases the speed of signal transmission and prevents error propagation which may be present in serial decoding techniques. The new algorithm reduces the bit error probability and increases the capacity simultaneouslywithout using a standard STC technique. However, it was seen that the BER of systems using the proposed algorithm is slightly higher than a similar system using only STC technique. Simulation results show the advantages of using the proposed technique.
Broadcasting Scenario under Different Protocols in MANET: A Surveyrahulmonikasharma
A wireless network enables people to communicate and access applications and information without wires. This provides freedom of movement and the ability to extend applications to different parts of a building, city, or nearly anywhere in the world. Wireless networks allow people to interact with e-mail or browse the Internet from a location that they prefer. Adhoc Networks are self-organizing wireless networks, absent any fixed infrastructure. broadcasting of data through proper channel is essential. Various protocols are designed to avoid the loss of data. In this paper an overview of different broadcast protocols are discussed.
Sybil Attack Analysis and Detection Techniques in MANETrahulmonikasharma
Security is important for many sensor network applications. A particularly harmful attack against sensor and ad hoc networks is known as the Sybil attack [6], where a node Illegitimately claims multiple identities.Mobility cause a main problem when we talk about security in Mobile Ad-hoc networks. It doesn’t depend on fixed architecture, the nodes are continuously moving in a random fashion. In this article we will focus on identifying the Sybil attack in MANET. It uses air medium for communication so it is more prone to the attack. Sybil attack is one in which single node present multiple fake identities to other nodes, which cause destruction.
A Landmark Based Shortest Path Detection by Using A* and Haversine Formularahulmonikasharma
In 1900, less than 20 percent of the world populace lived in cities, in 2007, fair more than 50 percent of the world populace lived in cities. In 2050, it has been anticipated that more than 70 percent of the worldwide population (about 6.4 billion individuals) will be city tenants. There's more weight being set on cities through this increment in population [1]. With approach of keen cities, data and communication technology is progressively transforming the way city regions and city inhabitants organize and work in reaction to urban development. In this paper, we create a nonspecific plot for navigating a route throughout city A asked route is given by utilizing combination of A* Algorithm and Haversine equation. Haversine Equation gives least distance between any two focuses on spherical body by utilizing latitude and longitude. This least distance is at that point given to A* calculation to calculate minimum distance. The method for identifying the shortest path is specify in this paper.
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...rahulmonikasharma
Internet of Things (IoT) is the developing technologies that would be the biggest agents to modify the current world. Machine-to-machine communications perform with virtual, mobile and instantaneous connections. In IoT system, it consists of data-gathering sensors various other household devices. Intended for protecting IoT system, the end-to-end secure communication is a necessary measure to protect against unauthorized entities (e.g., modification attacks and eavesdropping,) and the data unprotected on the Cloud. The most important concern hereby is how to preserve the insightful information and to provide the privacy of user data. In IoT, the encrypted data computing is based on techniques appear to be promising approaches. In this paper, we discuss about the recent secure database systems, which are capable to execute SQL queries over encrypted data.
Quality Determination and Grading of Tomatoes using Raspberry Pirahulmonikasharma
In India cultivation of tomatoes is carried out by traditional methods and techniques. Today tremendous improvement in field of agriculture technologies and products can be seen. The tomatoes affect the overall production drastically. Image processing technique can be key technique for finding good qualities of tomatoes and grading. This work aimed to study different types of algorithms used for quality grading and sorting of fruit from the acquire image. In previous years several types of techniques are applied to analyses the good quality fruits. A simple system can be implemented using Raspberry pi with computer vision technology and image processing algorithms.
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...rahulmonikasharma
Network management and Routing is supportively done by performing with the nodes, due to infrastructure-less nature of the network in Ad hoc networks or MANET. The nodes are maintained itself from the functioning of the network, for that reason the MANET security challenges several defects. Routing process and Scheduling is a significant idea to enhance the security in MANET. Other than, scheduling has been recognized to be a key issue for implementing throughput/capacity optimization in Ad hoc networks. Designed underneath conventional (LT) light tailed assumptions, traffic fundamentally faces Heavy-tailed (HT) assumption of the validity of scheduling algorithms. Scheduling policies are utilized for communication networks such as Max-Weight, backpressure and ACO, which are provably throughput optimality and the Pareto frontier of the feasible throughput region under maximal throughput vector. In wireless ad-hoc network, the issue of routing and optimal scheduling performs with time varying channel reliability and multiple traffic streams. Depending upon the security issues within MANETs in this paper presents a comparative analysis of existing scheduling policies based on their performance to progress the delay performance in most scenarios. The security issues of MANETs considered from this paper presents a relative analysis of existing scheduling policies depend on their performance to progress the delay performance in most developments.
DC Conductivity Study of Cadmium Sulfide Nanoparticlesrahulmonikasharma
The dc conductivity of consolidated nanoparticle of CdS has been studied over the temperature range from 303 K to 523 K and the conductivity has been found to be much larger than that of single crystals.
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDMrahulmonikasharma
OFDM (Orthogonal Frequency Division Multiplexing) is generally preferred for high data rate transmission in digital communication. The Long-Term Evolution (LTE) standards for the fourth generation (4G) wireless communication systems. Orthogonal Frequency Division Multiple Access (OFDMA) and Single Carrier Frequency Division Multiple Access (SC-FDMA) are the two multiple access techniques which are generally used in LTE.OFDM system has a major shortcoming of high peak to average power ratio (PAPR) value. This paper explains different PAPR reduction techniques and presents a comparison of the various techniques based on theoretical results. It also presents a survey of the various PAPR reduction techniques and the state of the art in this area.
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoringrahulmonikasharma
Home automation has been a dream of sciences for so many years. It could wind up conceivable in twentieth century simply after power all family units and web administrations were begun being utilized on across the board level. The point of home robotization is to give enhanced accommodation, comfort, vitality effectiveness and security. Vitality checking and protection holds prime significance in this day and age in view of the irregularity between control age and request observing frameworks accessible in the market. Ordinarily, customers are disappointed with the power charge as it doesn't demonstrate the power devoured at the gadget level. This paper shows the outline and execution of a vitality meter utilizing Arduino microcontroller which can be utilized to gauge the power devoured by any individual electrical apparatus. The primary expectation of the proposed vitality meter is to screen the power utilization at the gadget level, transfer it to the server and build up remote control of any apparatus. So we can screen the power utilization remotely and close down gadgets if vital. The car segment is additionally one of the application spaces where vehicle can be made keen by utilizing "IOT". So a vehicle following framework is additionally executed to screen development of vehicles remotely.
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...rahulmonikasharma
An anticipated outcome that is intended chapter is to investigate effects of magnetic field on an oscillatory flow of a viscoelastic fluid with thermal radiation, viscous dissipation with Ohmic heating which bounded by a vertical plane surface, have been studied. Analytical solutions for the quasi – linear hyperbolic partial differential equations are obtained by perturbation technique. Solutions for velocity and temperature distributions are discussed for various values of physical parameters involving in the problem. The effects of cooling and heating of a viscoelastic fluid compared to the Newtonian fluid have been discussed.
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...rahulmonikasharma
In fast growing database repository system, image as data is one of the important concern despite text or numeric. Still we can’t replace test on any cost but for advancement, information may be managed with images. Therefore image processing is a wide area for the researcher. Many stages of processing of image provide researchers with new ideas to keep information safe with better way. Feature extraction, segmentation, recognition are the key areas of the image processing which helps to enhance the quality of working with images. Paper presents the comparison between image formats like .jpg, .png, .bmp, .gif. This paper is focused on the feature extraction and segmentation stages with background removal process. There are two filters, one is integer filter and second one is floating point Filter, which is used for the key feature extraction from image. These filters applied on the different images of different formats and visually compare the results.
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM Systemrahulmonikasharma
The examination on various looks into on MIMO STBC framework in order to accomplish the higher framework execution is standard that the execution of the remote correspondence frameworks can be improved by usage numerous transmit and get radio wires, that is normally gathered on the grounds that the MIMO procedure, and has been incorporated. The Alamouti STBC might be a promising because of notice the pick up inside the remote interchanges framework misuse MIMO. To broaden the code rate and furthermore the yield of the symmetrical zone time square code for more than 4 transmit reception apparatuses is examined. The outlined framework is beated once forced with M-PSK (i.e upto 32-PSK) regulation. The channel estimation examine in these conditions.
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosisrahulmonikasharma
A vibration investigation is about the specialty of searching for changes in the vibration example, and after that relating those progressions back to the machines mechanical outline. The level of vibration and the example of the vibration reveal to us something about the interior state of the turning segment. The vibration example can let us know whether the machine is out of adjust or twisted. Al-so blames with the moving components and coupling issues can be distinguished. This paper shows an approach for equip blame investigation utilizing signal handling plans. The information has been taken from college of ohio, joined states. The investigation has done utilizing MATLAB software.
This paper discusses a new algorithm of a univariate method, which is vitally important to develop a short-term load forecasting module for planning and operation of distribution system. It has many applications including purchasing of energy, generation and infrastructure development etc. We have discussed different time series forecasting approaches in this paper. But ARIMA has proved itself as the most appropriate method in forecasting of the load profile for West Bengal using the historical data of the year of 2017. Auto Regressive Integrated Moving Average model gives more accuracy level of load forecast than any other techniques. Mean Absolute Percentage Error (MAPE) has been calculated for the mentioned forecasted model.
Impact of Coupling Coefficient on Coupled Line Couplerrahulmonikasharma
The coupled line coupler is a type of directional coupler which finds practical utility. It is mainly used for sampling the microwave power. In this paper, 3 couplers A,B & C are designed with different values of coupling coefficient 6dB,10dB & 18dB respectively at a frequency of 2.5GHz using ADS tool. The return loss, isolation loss & transmission loss are determined. The design & simulation is done using microstrip line technology.
Design Evaluation and Temperature Rise Test of Flameproof Induction Motorrahulmonikasharma
The ignition of flammable gases, vapours or dust in presence of oxygen contained in the surrounding atmosphere may lead to explosion. Flameproof three phase induction motors are the most common and frequently used in the process industries such as oil refineries, oil rigs, petrochemicals, fertilizers, etc. The design of flameproof motor is such that it allows and sustain explosion within the enclosure caused by ignition of hazardous gases without transmitting it to the external flammable atmosphere. The enclosure is mechanically strong enough to withstand the explosion pressure developed inside it. To prevent an explosion due to hot spot on the surface of the motor, flameproof induction motors are subjected to heat run test to determine the maximum surface temperature and temperature class with respect to the ignition temperature of the surrounding flammable gas atmosphere. This paper highlights the design features of flameproof motors and their surface temperature classification for different sizes.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
HEAP SORT ILLUSTRATED WITH HEAPIFY, BUILD HEAP FOR DYNAMIC ARRAYS.
Heap sort is a comparison-based sorting technique based on Binary Heap data structure. It is similar to the selection sort where we first find the minimum element and place the minimum element at the beginning. Repeat the same process for the remaining elements.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Water billing management system project report.pdfKamal Acharya
Our project entitled “Water Billing Management System” aims is to generate Water bill with all the charges and penalty. Manual system that is employed is extremely laborious and quite inadequate. It only makes the process more difficult and hard.
The aim of our project is to develop a system that is meant to partially computerize the work performed in the Water Board like generating monthly Water bill, record of consuming unit of water, store record of the customer and previous unpaid record.
We used HTML/PHP as front end and MYSQL as back end for developing our project. HTML is primarily a visual design environment. We can create a android application by designing the form and that make up the user interface. Adding android application code to the form and the objects such as buttons and text boxes on them and adding any required support code in additional modular.
MySQL is free open source database that facilitates the effective management of the databases by connecting them to the software. It is a stable ,reliable and the powerful solution with the advanced features and advantages which are as follows: Data Security.MySQL is free open source database that facilitates the effective management of the databases by connecting them to the software.
Internet of Things Based Women Tracking and Security with Auto-Defender System
1. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 6 Issue: 6 63 – 68
_______________________________________________________________________________________________
63
IJRITCC | June 2018, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
Internet of Things Based Women Tracking and Security with Auto-defender
System
Roshni S. Sune
PG student, Electronics and Telecommunication
Government College of Engineering
Jalgaon, India
e-mail: roshnisune@gmail.com
Mohan H. Nerkar
Professor, Electronics and Telecommunication
Government College of Engineering
Jalgaon, India
e-mail: mhnerkar@gmail.com
Abstract— In worldwide situation, the prime inquiry in each woman mind is about her safety and the badgering issues. Women
everywhere throughout the world are confronting much deceptive physical provocation. The main idea frequenting each woman is
the point at which they will have the capability to move frankly in the city even in odd hours without stressing over their security.
Our task is a dare to determine this issue. This paper describes about a smart intelligent security system for women. This venture
concentrates on a security for women so they will never feel vulnerable. The system comprises of different modules such as GPS
receiver, shock circuit, buzzer, spray mechanism, Webcam, pulse rate sensor, Raspberry pi-3 module. Today there are many cases
which are going on about women all over in the world. It was high time where women required a change. This task depends on
women security where women feel ensured. This venture portrays about safety electronic system for women, worked out in the
open transport vehicles such as, car, buses and auto-rickshaws as these days women are being at molested, kidnapped and
badgering by the drivers. In each field there is an uncommon effect of women like games, dance, training, business, in legislative
issues moreover. Women are driving in each field. The question arises that, Are the women in India are extremely secured?
Always get the solution No. Henceforth executed Internet of Things based women tracking and security with auto-defender
system which is interfaced with Raspberry pi 3 board that will track the location of the women also will auto defend in bad
situation.
Keywords- Raspberry pi 3 B+ module, GPS, Internet of Things (IoT), buzzer, heart Beat Sensor.
__________________________________________________*****_________________________________________________
I. INTRODUCTION
Today in the current worldwide situation, the prime
inquiry in each women mind, considering the regularly rising
increment of issues on women provocation in later past is for
the most part about her wellbeing and security. The main idea
frequenting each woman is the point at which they will have
the capacity to move uninhibitedly in the city even in odd
hours without stressing over their security. This task
recommends another viewpoint to utilize innovation for
women safety. This undertaking depends on women security
where women feel ensured. This venture portrays about
security electronic system for women, worked out in the open
transport vehicles, as these days ladies are being attacked,
kidnapped and harassed by the drivers. As we cannot estimate
the happening of incidents but still one can reduce the chances
of sexual abuse, violence, assault by having all safety tools
nearby and can easily vanish from the danger situations. This
can make a protected domain and furthermore makes a decent
help for the casualties. Long range informal communication is
an integral part of our lives, any awful occurrences can be
intimated in the blink of an eye to their companions, relatives,
and control room and so on to get the assistance. We propose a
thought which changes the way everybody considers women
security. We need the need for a device which automatically
senses and rescues the victim is the venture of our idea.
In present day India, women have adorned high
workplaces in India including that of the President, Prime
Minister, Leader of the Opposition and Speaker of the
LokSabha. Be that as it may, ladies in India keep on facing
social difficulties and are often victims of abuse and violent
crimes and, as indicated by a worldwide survey directed by
Thomson Reuters, India is the fourth most unsafe nation on the
planet for ladies, and the most exceedingly bad nation for
ladies among the G20 nations. Women are driving in each
field. Are the young women in India are extremely secured?
Continuously we find the solution No. Consequently,
actualized electronic system which has GPS, pulse rate sensor,
Webcam, Shock circuit, Buzzer, Spray mechanism which are
interfaced with Raspberry pi- 3 board to control the majority
of the above [1].
The device is the integration of multiple devices,
hardware which continuously communicates with Smart phone
that has access to the internet. The application is programmed
and loaded with all the required data. This generates a signal
which is transmitted to the smart phone. The software or
application has access to GPS and Messaging services which
is pre-programmed in such a way that whenever it receives
emergency signal, it can send help request along with the
location co-ordinates to the nearest Police station, relatives and
the people in the near radius who have application. This action
enables help instantaneously from the Police as well as Public
2. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 6 Issue: 6 63 – 68
_______________________________________________________________________________________________
64
IJRITCC | June 2018, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
in the near radius who can reach the victim with great
accuracy.
II. RELATED WORK
We as a whole are living in present day India.
Everything has changed from devices we utilize, education
and Medical facilities that we get, the positions that women
are holding however the main thing which has not changed is
the picture and security of Indian women. Relatively
consistently when we get the morning newspaper, we shudder
perusing about the young lady who is physically attacked. This
occurs in a nearby shopping center, a stopping or at school.
This has occurred with a young lady of 9-10 years, an office
running proficient or with 80 year old woman. Numerous
terrible episodes have been occurring in women case.
Individuals at home don't know of their arrival securely. In
2013, the occurrence in which a 23 year old paramedical
understudy was gang-raped by 6 men inside a moving bus
close to Delhi region and thrown off the bus is a soul
shattering incident that can’t even be imagined in dreams.
Another incident that has occurred at Mumbai on account of
lady who is abandoning her local place after Christmas
occasions has been kidnapped and killed. These are a portion
of the issues that have occurred in the everyday existence of
women. Although it was a most heinous cases of cruelty, it is
unexpected to take note of that such occurrences are not really
uncommon in our nation. [1]
Overview comes about shows "848 Indian Women
Are Harassed, Raped, and Killed Every Day!!" That's a route
past HUGE number! Likewise there are around more than
25000 bodies of evidence were enrolled against ladies crime
and furthermore from the most recent 10 years, the crime
against ladies measurements is expanding consistently. There
is a noteworthy need of shielding women from disturbances,
sexual manhandle, and violence by executing testing system
with technological requirement, generally a day when media
communicates a greater amount of women' accomplishments
instead of harassment, it's an accomplishment accomplished!
Since people can't react appropriately in basic circumstances.
This worry as a top priority numerous engineers have thought
of imaginative applications. Some of such applications in
existing systems are,
A. Existing Systems
1) Codes like *91# is utilized to give crisis administrations,
which will alarm police control. Free versatile application
'Help me on mobile' to guarantee safety of women was
launched to help the individuals who require crisis. These
applications need a single click to do this task. But when a girl
is in trouble, there can be times that the girl is not capable of
taking the phone and pressing button.
2) SHE (Society Harnessing Equipment): It is an article of
clothing inserted with an electronic gadget. This article of
clothing has an electric circuit that can produce 3800kV which
can help the casualty to get away. In the event of numerous
assaults it can send around 80 electric stuns [3].
3) ILA security: The prime supporters of this framework have
planned three individual alerts that can stun and perplex
potential aggressors and consequently safety measure the
casualty from dangerous circumstances.
4) AESHS (Advanced Electronics System for Human Safety)
It is a gadget that helps track the area of the casualty when
assaulted utilizing GPS office.
5) VithU application: This is a crisis application started by a
famous Indian crime TV arrangement "Gumrah" circulated on
Channel (V). At the point when the power catch of the
Smartphone is squeezed twice successively, it starts sending
ready messages with a connection of the area of the client at
regular intervals to the contacts.
6) Smart Belt
This framework is composed with a versatile gadget
which looks like a typical belt. It comprises of Arduino Board,
shouting caution and weight sensors. At the point when the
edge of the weight sensor crosses, the gadget will be actuated
naturally. The shouting alert unit will be enacted and send
sirens asking help [4].
7) AVR microcontroller based wearable coat for ladies
security. In this mix of wearable coat and portable innovation
for wellbeing of ladies in the general public [2].
8) Smart Girls Security System, Creators, Basavaraj et al.
Year of Publication -2014
This work concentrates on a security framework that
is planned exclusively to effectively provide security to
women with the goal that they never feel powerless while
confronting such social difficulties. The framework comprises
of different modules, for example, GSM shield (SIM 900A),
Arduino ATMega328 board, GPS (GYGPS6MV2), shouting
alert (APR 9600), an arrangement of weight sensors for
actuation and power supply unit.
10) Women Employee Security System utilizing GPS and
GSM Based Vehicle Tracking. Creators, Poonam Bhilare, et
al. Year of Publication- 2015
This work concentrates on the proposed show that
can be utilized to manage the issue of security issues of ladies
representatives utilizing GPS and GSM based vehicle
following.
11) A Mobile Based Women Safety Application Authors, Dr.
Sridhar Mandapati, et al. Year of Publication- 2015
These are the systems which worked on women
security previously are elaborated in existing systems. Thus,
all the drawbacks which are occurred in existing systems are
recovered in this proposed framework.
III. METHODOLOGY AND COMPONENTS OF SYSTEM
In this system there are majorly the following
sections shown in block diagram Figure 1.
3. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 6 Issue: 6 63 – 68
_______________________________________________________________________________________________
65
IJRITCC | June 2018, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
Figure 1 Block diagram of women tracking and security with Auto
Defender system
A. Raspberry Pi 3 B+ Model
The biggest modification that has been sanctioned with the
Raspberry Pi 3 is advancement to a next generation main
processor and enhanced connectivity with Bluetooth Low
Energy (BLE) and BCM43143 Wi-Fi on board. Additionally,
the Raspberry Pi 3 has enhanced power management, with an
upgraded switched power source up to 2.5 Amps, to support
more powerful external USB devices.
Raspberry Pi-3 has higher performance in comparison with
other boards like arduino and ESP8266 in terms of its storage
and computing speeds but at the cost of higher price.
Raspberry Pi equipped with inbuilt Wifi and Bluetooth serves
as an easy means to connect to internet and push the data to
the cloud servers if required for further processing.
Figure 2: Raspberry Pi 3 B+ Model
The microcontroller raspberry Pi 3 B+ is the very
important part of this paper. This plays a very important role
to run allover programming of software as well as to control
all the functions of hardware of the project.
B. Pulse Rate Measurment Sensor
Pulse rate sensor is designed to give digital output of heart
beat when a finger is placed on it. When the heart beat detector
is working, the beat LED flashes in unison with each pulse
rate. This digital output can be connected to microcontroller
directly to measure the Beats Per Minute (BPM) rate. It works
on the principle of light modulation by blood flow through
finger at each pulse.
Figure 3 Structure of pulse rate sensor
The features of given pulse rate sensor are heart beat
indication by LED, instant output digital signal for directly
connecting to microcontroller, compact Size, working Voltage
+5V DC which is applicable in digital heart rate monitor,
patient monitoring system, bio-Feedback control of robotics
and applications.
C. Global Positioning System
This modem provides longitude and latitude of the woman
current exact location to track her in insecure situations.
SIM28M is a stand-alone or GPS receiver with built-in LNA.
SIM28M can relax antenna requirement and don’t need of
external LNA. SIM28M can track as low as 165dBm signal
even without network assistance.
Figure 4 SIM28M GPS System
The GPS modem receives data from satellite. Then it supply
this bunch of data to Raspberry Pi 3 B+ through serial
communication. The GPS Transmit signals to equipment on
the ground and make it possible for people with ground
receivers to pinpoint their geographic location. The location
accuracy ranges from 10 to 100 meters for most equipments.
GPS
Receiver
Webcam
Heart Beat
Sensor
Buzzer
Shock
Mechanism
Raspberry
Pi 3 B+
Model
WIFI
Spray
Mechanism
4. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 6 Issue: 6 63 – 68
_______________________________________________________________________________________________
66
IJRITCC | June 2018, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
D. Flowcart of the System
NO
YES
NO
YES
Figure 5 Flowchart of System
The IoT based system consist of the main part is
Raspberry pi module gets the signs from GPS system which
has introduce area data and after that the Raspberry pi
controller permits to send the alert Message with the location
of the women to the saved predefined numbers. At the time of
dangerous situation, we know that everyone’s pulse rates get
high, hence we are using a pulse rate sensor that will sense the
pulse rates and send through message as well as E-mail with
the location automatically. A webcam utilized for the
capturing picture of an attacker and outside memory card is
utilized for the capturing picture is save on this card and send
to the receiver so that police can catch culprit and punish him.
At the same time when she presses a switch button,
automatically the auto defender system will start working.
Auto defender system is consisting of the buzzer which will
make sound so that someone in the surrounding can listen and
help her, second is shock mechanism which will stun the
attacker, third is the spray mechanism that will sprinkler the
harmful, etching solvent like pepper powder solvent which
will harm an attacker still she gets help. Thus the women can
self-defense themselves.
IV. ANALYTICAL SOLUTION
In this project, when the system get the required
power supply. First it will automatically count the pulse rates
of victim by using heart beat sensor present on the project.
That sensor will be connected to the finger tip of victim. The
pulse rates counting can be seen on command window of
raspbian operating system. After that when pulse rate goes
high, it will send that pulse rate on E-mail. The analytical
solution can be counted the health parameter of the victim at
the time of fear in insecure place by following way,
A. Analytical Solution for Health Parameters
As mentioned here using heart beat sensors to produce
precise and accurate result of the women health, the operational
framework has been given. Hence designed a correlation
formula using the parameter, heart beat rate which is converted
into a single variable. This cumulative value will intimate the
condition of the women at the feared, insecure situation. To get
this heart beat values, calculate mean value first by basic
formula of mean with 10 samples given here as an example.
This formula calculates range and then this calculates the
variance and standard deviation with respect to mean as shown
in Table I.
TABLE I. Health monitoring parameters with Mean and Standard
Deviation
Parameter 1 2 3 4 5 6 7 8 9 10 Me-
an
Std.
Devi-
ation
Heart
Beat BPM
60 61 65 69 70 69 63 65 71 69 66.
2
3.93
The above TABLE I. shows the mean value and standard
deviation of health parameter sensor. Using the mean value
data, it is known that for heart beat increase of 10 bpm. Sample
standard deviation is varies with respect to mean value.
Variance is squared value of sample standard deviation. The
following column chart shows the heart beat sensor value from
the above Table with 10 samples are given and showing BPM.
When the heart beat sensor counts the pulses;
simultaneously it will capture the image by using webcam and
trace the location of victim by using the GPS receiver and send
latitude and longitudinal value on mail as well as SMS with
high pulse rate by using IoT as shown in Figure 7.
Figure 6 Heart beat sensor sensed value
Count the pulse rates
Image is captured and saved in
SD card
Collect co-ordinates of GPS and send
through E-mail with captured Image
Switch is pressed
Buzzer, spray, Shock mechanism is
activated
System is turn OFF
Pulse rate
sensor is sensed
System is turn ON
Start
End
5. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 6 Issue: 6 63 – 68
_______________________________________________________________________________________________
67
IJRITCC | June 2018, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
In Parallel, the location along with the messages is
sent to emergency contacts. The received contact persons open
the IP which is fixed to the emergency contacts to view the
captured image, high pulse rate and location, so that this will
be helpful to get the right justice for the victim.
V. RESULT AND ANALYSIS
The SMS text message on registered contact numbers
and E-mail on registered E-mail Id is shown in below Figure
7,
Figure 7 (a)SMS Text message (b)E-mail sent on registered contacts
The persons with registered emergency numbers in
system may be Police, family, friends or relative receives the
open IP which is fixed to view the captured image of culprit
which gives right justice for the victim against culprit and
location, so that this will be helpful to get the exact location of
victim and tracing that location registered contacts can reach
to the victim.
When the emergency contacts receive the SMS
message and E-mail. The latitude and longitude values sent on
those messages on clicking directly connect us on GOOGLE
MAP. Hence it will very useful to catch culprit and help the
victim by tracing exact location of the victim shown in Figure
8 and as discussed above.
Figure 8 (a) Satellite Map, (b) Road Map on Google Map
On other hand, when the pressing switch is pressed,
the auto-defender system gets turn on. In that buzzer, shock
mechanism, spray mechanism present on project kit as shown
in Figure 6. That will defense the victim.
Figure 9 Internet of Things based Women Tracking Security with
Auto Defender System using Raspberry Pi 3B+
VI. CONCLUSION AND FUTURE SCOPE
The intelligent women safety system has turned out to
be an innovative idea which mainly focuses on women’s
security and safety during harassments or any type of
violence’s which makes use of GPS technology so that the
location of the victim can be traced using latitudes and
longitudes values and by clicking this values on text messages
it can directly connects to GOOGLE MAP. The GOOGLE
MAP traces the exact location of victim. Second the image is
captured by webcam and heart beat sensor senses pulse rate
notations to send through e-mail and SMS. Also the system
consisting of auto-defender system as mentioned above,
defense the victim from culprit. The buzzer gets make a sound
to get help from nearer people, the shock mechanism stun the
attacker with high voltage for 5-10 minutes, and the last spray
mechanism sprinkles some dangerous etching solvent to harm
attacker and make her safe. All over, this concludes that; the
system is very useful to resolve the major issue which is
currently facing not only by India but also by all over world.
The design can be further implemented in a more
advanced way by introducing MIC sensors to record the audio
conversations that can happen between culprit and victim also
in advance it can more record the video.
In future, this system is especially used for the
women that are working at odd hours of the day or who have
to travel long distances at night. And also, as the school
children safety are major concerns for parents as well as
school management due to the recent incidents of child crimes
like children missing, abuse, kidnapping etc. So this system
can also applicable for the child safety when they are
travelling in school buses.
REFERENCES
[1] A. Jatti, M. Kannan, P. Vijayalakshmi, S. Sinha. “Design
and Development of an IoT based wearable device for the
Safety and Security of women and girl children”, IEEE