This document describes a smart and ubiquitous defense monitoring system based on the Internet of Things (IoT) that is designed to provide security for individuals. The system uses sensors like a Global Positioning System (GPS), temperature sensor, heartbeat sensor, and Passive Infrared Sensor embedded in a wearable device. When the sensors detect an abnormal heartbeat rate or increase in temperature, indicating distress, the system automatically sends alerts with the person's location to registered contacts and nearby police stations using IoT technologies like SIM800A modules and WiFi. The system is implemented using an Arduino Uno microcontroller, embedded C programming, and the Proteus simulation software. It aims to help individuals in dangerous situations by quickly notifying authorities and
In global scenario, the prime question in every girls mind is about her safety and the harassment issues. The only thought haunting every girl is when they will be able to move freely on the streets even in odd hours without worrying about their security. This project suggests a new technology to protect women. This project focuses on a security for women so that they will never feel helpless. The system consists of various modules such as GSM, GPS, memory card, shock circuit, buzzer, camera, Raspberry pi-3 module. by Ms. Aayesha M. Shaikh and Mr. Desai P. B 2018. Women’s Safety Jacket. International Journal on Integrated Education. 1, 1 (Dec. 2018), 77-81 https://journals.researchparks.org/index.php/IJIE/article/view/788/757 https://journals.researchparks.org/index.php/IJIE/article/view/788
In current period an enormous rise in crime against women can be observed and along with women even children, old age people are also suffering with inhuman activities as kidnapping. Women feel insecure roaming around the city alone, even the family members are always worried about their security till the time they get back safe. Many personal security solutions are available in the market in form of mobile applications and wearable devices as wrist bands, pendants, etc.. But all these already available solutions prove useless if the user is unable to trigger the device or mobile app in case of danger and also if device is lost or broken or battery goes low. This paper proposes a new improved personal security solution that will overcome these drawbacks of wearable devices and mobile applications making it more reliable solution for security.
In global scenario, the prime question in every girls mind is about her safety and the harassment issues. The only thought haunting every girl is when they will be able to move freely on the streets even in odd hours without worrying about their security. This project suggests a new technology to protect women. This project focuses on a security for women so that they will never feel helpless. The system consists of various modules such as GSM, GPS, memory card, shock circuit, buzzer, camera, Raspberry pi-3 module. by Ms. Aayesha M. Shaikh and Mr. Desai P. B 2018. Women’s Safety Jacket. International Journal on Integrated Education. 1, 1 (Dec. 2018), 77-81 https://journals.researchparks.org/index.php/IJIE/article/view/788/757 https://journals.researchparks.org/index.php/IJIE/article/view/788
In current period an enormous rise in crime against women can be observed and along with women even children, old age people are also suffering with inhuman activities as kidnapping. Women feel insecure roaming around the city alone, even the family members are always worried about their security till the time they get back safe. Many personal security solutions are available in the market in form of mobile applications and wearable devices as wrist bands, pendants, etc.. But all these already available solutions prove useless if the user is unable to trigger the device or mobile app in case of danger and also if device is lost or broken or battery goes low. This paper proposes a new improved personal security solution that will overcome these drawbacks of wearable devices and mobile applications making it more reliable solution for security.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewIJSRD
In this system we have proposed to implement the technique to improve antitheft for android based mobile phones by using various services like MMS over the SMS. Today’s most popular android operating system is contains many scenarios that already been proposed that are related to anti-theft also many applications are available onto play store but these application are not so useful to find the thief e.g. GPS tracking for the devices like smart phones, tablets and phablets. We can use new technology likes Multimedia Messaging Service (MMS), which enhances the present scenario. This scenario is totally dependent on the hardware of your smart phone device that is camera (front or rear) also support for multimedia messages. First, we just need to install this software then, it work’s in the background, stores the current SIM number in a variable and keeps continuously checking for SIM change, whenever SIM gets changed from device, it will takes snapshots, record a video in the background with the use of camera of device and also records surrounding audio i.e., without taking user permission and then it will send an MMS to an alternate mobile number and an email id, which was provided during installation for authorized user’s registration. The most benefit of this application is very easy to configure and keeps running in the background without interrupting the user. To some extent it helps the authorized user to identify and find the thief.
Personal Security Tracking based on Android and Web ApplicationTELKOMNIKA JOURNAL
Nowadays, the frequency of abduction is increasing significantly. Information technology provide
many social media which is causing the leaked of personal information where abductor can find out the
information. Using social media, people can share location, life event, and anything related about their life
event, these become the useful information for the abductor. To anticipate this, a lot of personal tracking
device is developed, but the response is too late. Because, the family or relative of the victims will notice
that abduction had happen after the victim is lost. According to the problem, this research will focus on
develop the personal tracking device which trigger by the victims who own the phone based on android
and web application. Whenever the abduction happens, the victim just need to click the button and the
system will send a message to the relatives and family in their contact also trigger the notification to the
local security. Software development life cycle that will be used is scrum which is divided into several
processes like backlog, sprints, scrum meetings, and demos. The result of this research is android
application for user and web application for managing application.
The most of the technical challenges for the society to detect and find a solution for visually impaired, with increased security and service motto towards the society helped to bring a solution which would help the visually impaired in the industries and other companies. Here we had come out with a prototype as a way of finding a solution to the visually impaired. The navigation assistant technology using RFID Tag Grid minimizes the dependency. The reader used in this system is embedded in the mobile and shoes to avoid dependency on travel. The RFID reader matches with the information specified to that ID and a voice signal is generated. Wireless RF links is placed in the Bluetooth device/ headphone for voice guidance. The proximity sensing unit is an auxiliary unit is added as a solution to address unexpected and non-mapped obstacles in the user’s path. Basically it contains ultrasonic Sensor Unit interfaced with microcontroller which is inter-linked to a vibrator that would be activated when nearing obstacles. This system is technically and economically feasible and may offer a maximum benefit to the disabled.
This paper regards about the safety system for children and women that allows instant reactions in any molestation and intimidation in public places, societies and in anywhere. All around the globe women are experiencing immoral physical abuses and Children also being accused of harassment in social event or outside the home. Our project resolves both the complications. This movable device which will have a pressure switch. When the attacker is ready to assailing the women/child or at the point when they detects any uncertainty from a more bizarre, women or child would then be able to squeeze the gadget by pressing or compacting it. In a split second the pressure sensor detects this pressure and a customary SMS, with the casualty's area will be sent to their folks/parents/guardian mobile phone numbers put away in the gadget while buying it, trailed by a call. On the off chance that the call is unanswered for a drawn out time, a call will be diverted to the police and a similar message will be sent. The fundamental element of our framework is less reaction time will be required for helping the victim.
Activity Tracker Wrist Band for Children Monitoring using IOTrahulmonikasharma
Today in present world of digital technology and global computing every person is connected with each other in number of ways. In current global computing world, the children and women harassment, chain snatchings, kidnapping, sexual harassments, eve teasing, etc. are increased day-by day, becoming more unsafe and helpless. When these perilous situations occur there must be a trending technology to be comfortable to handle. So we are proposing a system that works on the controversy of children using IOT. In this project we proposed a device which is integrated with multiple devices, comprising of wearable “Activity Tracker Wrist Band” which is programmed with all the required data which includes the behavior of the human reactions like anger, anxiety, nervousness and fear. When these situations are faced by the victim, the various sensors generate the emergency signals which are to be transmitted to the smart phone. The system effectively monitors the children presence within the expected zone. When the person crosses the monitoring zone, then based on IOT Monitoring system, GSM sends help request by sending messages to the nearest police station, parents and the people in the near radius.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewIJSRD
In this system we have proposed to implement the technique to improve antitheft for android based mobile phones by using various services like MMS over the SMS. Today’s most popular android operating system is contains many scenarios that already been proposed that are related to anti-theft also many applications are available onto play store but these application are not so useful to find the thief e.g. GPS tracking for the devices like smart phones, tablets and phablets. We can use new technology likes Multimedia Messaging Service (MMS), which enhances the present scenario. This scenario is totally dependent on the hardware of your smart phone device that is camera (front or rear) also support for multimedia messages. First, we just need to install this software then, it work’s in the background, stores the current SIM number in a variable and keeps continuously checking for SIM change, whenever SIM gets changed from device, it will takes snapshots, record a video in the background with the use of camera of device and also records surrounding audio i.e., without taking user permission and then it will send an MMS to an alternate mobile number and an email id, which was provided during installation for authorized user’s registration. The most benefit of this application is very easy to configure and keeps running in the background without interrupting the user. To some extent it helps the authorized user to identify and find the thief.
Personal Security Tracking based on Android and Web ApplicationTELKOMNIKA JOURNAL
Nowadays, the frequency of abduction is increasing significantly. Information technology provide
many social media which is causing the leaked of personal information where abductor can find out the
information. Using social media, people can share location, life event, and anything related about their life
event, these become the useful information for the abductor. To anticipate this, a lot of personal tracking
device is developed, but the response is too late. Because, the family or relative of the victims will notice
that abduction had happen after the victim is lost. According to the problem, this research will focus on
develop the personal tracking device which trigger by the victims who own the phone based on android
and web application. Whenever the abduction happens, the victim just need to click the button and the
system will send a message to the relatives and family in their contact also trigger the notification to the
local security. Software development life cycle that will be used is scrum which is divided into several
processes like backlog, sprints, scrum meetings, and demos. The result of this research is android
application for user and web application for managing application.
The most of the technical challenges for the society to detect and find a solution for visually impaired, with increased security and service motto towards the society helped to bring a solution which would help the visually impaired in the industries and other companies. Here we had come out with a prototype as a way of finding a solution to the visually impaired. The navigation assistant technology using RFID Tag Grid minimizes the dependency. The reader used in this system is embedded in the mobile and shoes to avoid dependency on travel. The RFID reader matches with the information specified to that ID and a voice signal is generated. Wireless RF links is placed in the Bluetooth device/ headphone for voice guidance. The proximity sensing unit is an auxiliary unit is added as a solution to address unexpected and non-mapped obstacles in the user’s path. Basically it contains ultrasonic Sensor Unit interfaced with microcontroller which is inter-linked to a vibrator that would be activated when nearing obstacles. This system is technically and economically feasible and may offer a maximum benefit to the disabled.
This paper regards about the safety system for children and women that allows instant reactions in any molestation and intimidation in public places, societies and in anywhere. All around the globe women are experiencing immoral physical abuses and Children also being accused of harassment in social event or outside the home. Our project resolves both the complications. This movable device which will have a pressure switch. When the attacker is ready to assailing the women/child or at the point when they detects any uncertainty from a more bizarre, women or child would then be able to squeeze the gadget by pressing or compacting it. In a split second the pressure sensor detects this pressure and a customary SMS, with the casualty's area will be sent to their folks/parents/guardian mobile phone numbers put away in the gadget while buying it, trailed by a call. On the off chance that the call is unanswered for a drawn out time, a call will be diverted to the police and a similar message will be sent. The fundamental element of our framework is less reaction time will be required for helping the victim.
Activity Tracker Wrist Band for Children Monitoring using IOTrahulmonikasharma
Today in present world of digital technology and global computing every person is connected with each other in number of ways. In current global computing world, the children and women harassment, chain snatchings, kidnapping, sexual harassments, eve teasing, etc. are increased day-by day, becoming more unsafe and helpless. When these perilous situations occur there must be a trending technology to be comfortable to handle. So we are proposing a system that works on the controversy of children using IOT. In this project we proposed a device which is integrated with multiple devices, comprising of wearable “Activity Tracker Wrist Band” which is programmed with all the required data which includes the behavior of the human reactions like anger, anxiety, nervousness and fear. When these situations are faced by the victim, the various sensors generate the emergency signals which are to be transmitted to the smart phone. The system effectively monitors the children presence within the expected zone. When the person crosses the monitoring zone, then based on IOT Monitoring system, GSM sends help request by sending messages to the nearest police station, parents and the people in the near radius.
This paper detailed about a smart alarm system for
women’s security. Women all over the world are facing much
unscrupulous physical irritation. This acquires a fast pace
due to lack of a suitable investigation system. The system look
like a group on the wrist merged with pressure switch as an
input which when triggers shows the result loud alarm
imposed for self-defensing purpose and send location and
messages to the emergency contacts. The whole process will
be held in Arduino Microcontroller. The digital switch
incorporates with the controlling unit. Whenever the user
presses the digital switch, the emergency message will be
passed to the server unit via GSM SIM 800A module. By
implementing the proposed system, the physical harassment
on the women will be reduced.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.