SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3810
WOMEN SECURITY SYSTEM USING IOT
Syed Zainuddin1, M. Satish Yadav2
1UG Student, Department of Electronics & Communication Engineering, Methodist College of Engineering and
Technology, Hyderabad, Telangana, India
2Assistant Professor, Department of Electronics & Communication Engineering, Methodist College of Engineering and
Technology, Hyderabad, Telangana, India
--------------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - As we know the present era is with equal rights,
where in both men and women are taking equal
responsibility in their respective works. Because of some
reasons’ women can’t step out of their house. The Women
Security System consists of an on-site deployment of an IoT
module that is used to monitor and signalize the state of
each individual which enables the user to convey
information about their location, and if they are in danger
the information is conveyed to the respective officials and
house members. These systems use effective sensors, by
tracking information from various sources and also
deployed active data processing units. Here our proposed
idea is implemented using WIA cloud and TWILIO
Communication API so that the corresponding officials or
end users could get the information via Wi-Fi or Internet. It
mainly focuses on reducing the crimes against women which
might destroy their lives.
Key Words: Women Security, Internet of things (IOT),
WIA Cloud, TWILIO API,
1. INTRODUCTION
IOT technology grows in various fields of smart
applications but we have not yet found boundary
constraints of this technology. Some smart applications
which it has implementing currently such as on smart
grids, smart lighting, smart energy, smart city, smart
health etc. [4]. Because of some reasons’ women can’t step
out of their house. The only thought haunting in every
woman`s mind is when they will be able to move freely on
the streets even in odd hours without worrying about their
security. In critical situations the women will not feel
insecure or helpless if they have some kind of safety device
with them. Here are some reasons why we need a women
security device:
 About 10% of all the crimes committed in the
country are those of women abuse.
 A woman is raped every 20 minutes in India
 One in three ever married women report having
been slapped by their husband.
 Around two-third of married women in India are
victims of domestic violence.
1.1 EXISTING SYSTEM
1. SHE (Society Harnessing Equipment): It is a garment
embedded with an electronic device. This garment has an
electric circuit that can generate 3800kV which can help
the victim to escape. The garment delivers an electric
shock to attackers strong enough to cause severe burns,
protecting the victim from any of the electricity.
2. ILA SECURITY: The co-founders of this system, have
designed three personal alarms that can shock and
disorient potential attackers and hence safeguard the
victim from perilous situations.
1.2 PROPOSED SYSTEM
We propose to have a device which is the integration of
multiple devices, hardware comprises of a “Smart gadget”
which continuously communicates with the cloud and API.
The complete gadget also ensures to provide self-defense
application which helps her to escape critical situations.
This system can be used at places like bus stops, railway
stations, offices, footpaths, shopping malls, markets, etc.
The status of the individual is monitored continuously in
real time and the information is updated. Using the data,
we can identify patterns and reduce crimes against
women.
2. LITERATURE SURVEY
In today’s world women are less secure, they are facing a
greater number of situations like kidnapping, rape case, &
abuse. Because of these reasons’ women can’t step out of
their house. The prime question in every Woman’s mind,
taking into account the ever-rising increase of issues on
women harassment in recent past, is only about her safety
and security. The only thought haunting every Woman’s is
when they will be able to move freely on the streets even
in odd hours without worrying about their security. When
such incident happens with women’s they will not feel
insecure or helpless if they have some kind of device with
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3811
them. With the help of these devices girls & women can
stay out without any fear at any time [1].
At the present scenario Women are competing with men in
every prospect of society. Nowadays, women and children
safety are a prime issue of our society. The count of the
victim is increasing day by day. Women contribute fifty
percent to the development of our nation. But the women
have fear of getting harassed and killed. All these types of
women harassment cases are increasing day by day. So, it
is very important to ensure the safety of women [3].
Women security is a major issue of concern in today’s
world. Women are subjected to unethical physical
harassment. Women safety methods such as various
mobile apps have been tried and implemented, but the
need of the time is that they need is a device that can be
carried everywhere easily. The idea to develop a smart
device for women is that it’s completely comfortable and
easy to use as compared with already existing women
security solutions such as a separate garment, bulky belts
and in famous mobile apps that are just very abstract and
obsolete. If a woman is subjected to attack by an
adversary, then a switch has to be pressed by her,
manually [5].
3. SOFTWARE AND HARDWARE REQUIREMENTS
3.1 SOFTWARE AND CLOUD REQUIREMENETS
1. Python
Python is an interpreted high-level programming language
for general-purpose programming. Python is a multi-
paradigm programming language. Object-oriented
programming and structured programming are fully
supported, and many of its features support functional
programming and programming.
 It is used in Web and Internet Development,
Software Development and Business Applications.
 It has many more applications as it has features
like Multiple Programming Paradigms.
 Compatible with Major Platforms and Systems and
Robust Standard Library.
2. WIA Cloud
Wia is a cloud platform that enables users to build a
scalable and powerful backend to launch their Internet of
Things (IoT) solutions. This allows makers, startups and
enterprise users to create a fully-fledged, production ready
solution in just minutes without having to worry about
server management, data replication and storage. In
addition to this, Wia offers users device management,
events collection, analytics and highly customizable push
notifications. Wia is a cloud platform that enables users to
build a scalable and powerful backend to launch their
Internet of Things (IoT) solutions. One can publish events
and subscribe to commands via our REST, MQTT, and
CoAP APIs
3. Twilio Communication API
Twilio is a cloud communications platform as a service
(CPaaS) company based in San Francisco, California. Twilio
allows software developers to programmatically make and
receive phone calls, send and receive text messages, and
perform other communication functions using its web
service APIs. Twilio uses Amazon Web Services to host
telephony infrastructure and provide connectivity
between HTTP and the public switched telephone network
(PSTN) through its APIs. Twilio follows a set of
architectural design principles to protect against
unexpected outages. Twilio supports the development of
open-source software and regularly makes contributions
to the open-source community. Twilio lists a number of
other open-source projects on their website including:
Flask Restful:
 Python Flask (web framework) to build REST
APIs.
 Shadow: Runs requests through a release
candidate with real production traffic.
 Banker’s Box: Wrapper for storage backend.
4. Geocoder
Geocoding is the computational process of transforming a
physical address description to a location on the Earth's
surface (spatial representation in numerical coordinates).
Reverse geocoding, on the other hand, converts geographic
coordinates to a description of a location, usually the name
of a place or an addressable location. Geocoding relies on a
computer representation of address points, the street /
road network, together with postal and administrative
boundaries. Geocoder is a simple and consistent geocoding
library written in Python. Dealing with multiple different
geocoding provider such as Google, Bing, OSM & many
more has never been easier.
3.2 HARDWARE REQUIREMENTS
1. Raspberry Pi
The Raspberry Pi is a series of small single-board
computers developed by the Raspberry Pi Foundation. The
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3812
first-generation Raspberry Pi 1 Model A was released in
February 2013. Raspberry Pi 3 Model A+ was released in
February 2018 with a 1.2 GHz 64-bit quad core processor,
on-board Wi-Fi, Bluetooth and USB boot capabilities.
Raspbian is a free operating system based on Debian
GNU/Linux and optimized for the Raspberry Pi hardware.
Here we are using Raspberry Pi 3A+.It has 40 GPIO pins
which are available to us.
2. Vibration Sensor
A vibration sensor is a type of accelerometer. A vibration
sensor typically contains a piezoelectric crystal element
bonded to a mass. When the accelerometer is subject to an
accelerative force, the mass compresses the crystal,
causing it to produce an electrical signal that is
proportional to the level of force applied. The signal is
then amplified and conditioned using inbuilt electronics
that create an output signal, which is suitable for use by
higher level data acquisition or control systems. The
Vibration module based on the vibration sensor SW-420
and Comparator LM393 to detect if there is any vibration
that beyond the threshold. The threshold can be adjusted
by the on-board potentiometer. When this no vibration,
this module output logic LOW the signal indicates LED
light, and vice versa.
3. Jumper Wires
A jump wire is an electrical wire, or group of them in a
cable, with a connector or pin at each end, which is
normally used to interconnect the components of a
breadboard or other prototype or test circuit, internally or
with other equipment or components, without soldering.
Jumper wires are wires that have connector pins at each
end, allowing them to be used to connect two points to
each other without soldering. Jumper wires are typically
used with breadboards and other prototyping tools in
order to make it easy to change a circuit as needed [2].
4. Touch sensor
A touch sensor is a type of equipment that captures and
records physical touch or embrace on a device and/or
object. The Touch Sensor are sensitive to touch, pressure
as well as force. The Touch Sensor works similar to that of
a simple switch. When any physical medium comes in
contact with the touch surface. The internal circuit will be
closed inside the sensor and current starts flowing. On the
other hand, when this physical contact is broken or
released, the circuit will be opened. The TTP22301 Digital
Touch Sensor Capacitive Touch Switch Module is used in
this project. The Capacitive touch sensors are very popular
since they are more robust, durable and user friendly.
Moreover, it is also cost-effective when compared resistive
touch sensors. The capacitive sensor is made just similar to
the normal capacitor. There are two conductors separated
with the insulator.
4. SYSTEM DESIGN
4.1. BLOCK DIAGRAM
Fig 1: Block Diagram
4.2. FLOW CHART
Fig 2: Flow Chart
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3813
5. IMPLEMENTATION OF THE SYSTEM
1. If using a new SD card then download NOOBS from the
official raspberry pi site. Extract and copy the files in a SD
card of size ranging from 8GB to 32 GB to install Raspbian
on the SD card.
2. Place the SD card in the provided slot. Plug in the power
supply, now select Raspbian to install it. It will take a
while. After the installation is complete setup up your
Raspberry pi.
3. Download geocoder, Twilio and Wia installation files
from Github. Install the mentioned software’s in your
raspberry pi by using the terminal.
4. Create an account in Twilio and register the mobile
numbers on which you are sending the messages.
5. Create another account in Wia cloud, create a space and
add your device.
6. Connect the vibration and touch sensors to the
raspberry pi.
7. When a person touches the sensor or if the vibration
sensor detects a big vibration the geocoder gets the
location using the IP address and then sends the data to
Wia cloud to store the information and view it graphically.
Then the location is sent to mobile phones of the desired
personals through Twilio communication API.
6. RESULT AND DISCUSSION
This designed women system which is simple, economic
and provides effective solution to reduce the crimes
against women and increase the feeling of safety among
them. It is well managed to access and map the status of
location from any remote location. Figure 3 shows the
database of Wia cloud. Figure 4 shows the map which is
plotted by the Wia cloud from the coordinates derived
from the geocoder which are sent to it when a person
touches the touch sensor or when a big vibration is
detected. Figure 5 shows the SMS which is received
through the Twilio API. Finally, figure 6 shows the system
itself.
Fig 3: WIA Cloud Database
Fig 4: WIA Cloud Maps
Fig 5: SMS received on mobile phone
Fig 6: Hardware
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3814
7. APPLICATION AND ADVANTAGES
7.1 APPLICATIONS
 The system can be used at places like bus stops,
railway stations, offices, footpaths, shopping
malls, markets, etc.
 It can be carried anywhere, and the location of a
person is danger can be recovered and necessary
actions can be taken.
7.2 ADVANTAGES
 Reduced crimes
 Enhanced User Experience
 Increased Safety
 Real-Time Data and Trend Insight
 Increased self-confidence
 A decreased feeling of vulnerability
 Reduced risk of being victimized
 Improving overall personal safety
8. CONCLUSION AND FUTURE SCOPE
8.1 CONCLUSIONS
 Our primary goal of this project is to ensure every
Woman in our society to feel safe and secured.
According to the survey in India 53% of working
women are not feeling safe.
 Implementing real time application and a device,
we can solve the problems to an extent. With
further research and innovation, this project is
used as a small wearable device like watch
pendent etc. security is an upgraded version of
security device which works with both hardware
and software.
 The innovative idea is that it led with nearest
neighbor technology by which we can contact with
our nearest person at emergency time. It is very
relevant and easily accessible system model.
8.2 FUTURE SCOPE
 Communication through GPS & GSM technology is
the supplementary part to have help to the
person.
 In future to have legal process video information
can be sent to the cops, State & Central Govt. to
have immediate punishment to the criminal.
 The system will also be helpful to all people those
who are in remote area for their protection
against criminal problems etc. This system can
overcome the fear that scares every woman in the
in city about her security and safety.
9. REFERENCES
[1] Akanksha Chandoskar, Shraddha Chavan, Yojana
Mokal, Payal Jha,Pournima Kadam , “Smart Gadget For
Women’s Safety”, International Journal On Recent And
Innovation Trends in Computing and Communications
Volume:4, Issue:1 ,January 2016
[2] Gaurav Makde, Ashutosh Bele, Vaibhav Khapekar, Nidhi
Gajarlwar, Sakshi Gajbhiye, Kunal Purohit,”
Implementation of IOT Based Smart Garbage and Waste
Collection System”, International Research Journal of
Engineering and Technology (IRJET), Volume: 06 Issue: 03,
Mar 2019
[3] R.A.Jain,Aditya Patil, Prasenjeet Nikam, Shubham More
, Saurabh Totewar, ”Women’s safety using IOT”,
International Research Journal of Engineering and
Technology(IRJET), Volume: 04, Issue: 05, May 2017
[4] Mr. Basavaraju S R, “Automatic Smart Parking System
using Internet of Things (IOT)”, International Journal of
Scientific and Research Publications, Volume 5, Issue 12,
December 2015
[5] Jismi Thomas, Maneesha K J, Nambissan Shruthi
Vijayan, Divya R,” TOUCH ME NOT-A Women Safety
Device”, International Research Journal of Engineering and
Technology (IRJET), Volume: 05, Issue: 03, Mar 2018

More Related Content

What's hot

An Improved Personal Security System
An Improved Personal Security SystemAn Improved Personal Security System
An Improved Personal Security System
IJERA Editor
 
IRJET-The Internet of Things Applications for Challenges and Related Future T...
IRJET-The Internet of Things Applications for Challenges and Related Future T...IRJET-The Internet of Things Applications for Challenges and Related Future T...
IRJET-The Internet of Things Applications for Challenges and Related Future T...
IRJET Journal
 
IRJET- Use of Artificial Intelligence in Cyber Defence
IRJET- Use of Artificial Intelligence in Cyber DefenceIRJET- Use of Artificial Intelligence in Cyber Defence
IRJET- Use of Artificial Intelligence in Cyber Defence
IRJET Journal
 
IRJET- Identification of Location of Laptop Devices using Raspberry Pi Mo...
IRJET-  	  Identification of Location of Laptop Devices using Raspberry Pi Mo...IRJET-  	  Identification of Location of Laptop Devices using Raspberry Pi Mo...
IRJET- Identification of Location of Laptop Devices using Raspberry Pi Mo...
IRJET Journal
 
IRJET- An Alert System for Home Security based on Internet of Thing
IRJET- An Alert System for Home Security based on Internet of ThingIRJET- An Alert System for Home Security based on Internet of Thing
IRJET- An Alert System for Home Security based on Internet of Thing
IRJET Journal
 
IRJET - Women Safety Device with GPS Tracking and Alerts
IRJET -  	  Women Safety Device with GPS Tracking and AlertsIRJET -  	  Women Safety Device with GPS Tracking and Alerts
IRJET - Women Safety Device with GPS Tracking and Alerts
IRJET Journal
 
Security and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentSecurity and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT Environment
Dr. Amarjeet Singh
 
Internet of Things - Desire for Convenience Brings Multiple New Attack Vectors
Internet of Things - Desire for Convenience Brings Multiple New Attack VectorsInternet of Things - Desire for Convenience Brings Multiple New Attack Vectors
Internet of Things - Desire for Convenience Brings Multiple New Attack Vectors
Craig Walker, CISSP
 
IRJET - Smart Classroom Automation based on IoT
IRJET -  	  Smart Classroom Automation based on IoTIRJET -  	  Smart Classroom Automation based on IoT
IRJET - Smart Classroom Automation based on IoT
IRJET Journal
 
IRJET - Android based Secure and Smart Home Application using IoT
IRJET -  	  Android based Secure and Smart Home Application using IoTIRJET -  	  Android based Secure and Smart Home Application using IoT
IRJET - Android based Secure and Smart Home Application using IoT
IRJET Journal
 
188
188188
Cybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkCybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by Clearnetwork
Clearnetwork
 
Developing surveillance challenges in theinternet of things
Developing surveillance challenges in theinternet of thingsDeveloping surveillance challenges in theinternet of things
Developing surveillance challenges in theinternet of things
Dr. Raghavendra GS
 
Android Operated Application Based Smart Eye for Home Automation System Using...
Android Operated Application Based Smart Eye for Home Automation System Using...Android Operated Application Based Smart Eye for Home Automation System Using...
Android Operated Application Based Smart Eye for Home Automation System Using...
IJMTST Journal
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected Devices
John D. Johnson
 
IRJET - Home Appliance Controlling and Monitoring by Mobile Application based...
IRJET - Home Appliance Controlling and Monitoring by Mobile Application based...IRJET - Home Appliance Controlling and Monitoring by Mobile Application based...
IRJET - Home Appliance Controlling and Monitoring by Mobile Application based...
IRJET Journal
 
Survey on Security Issues of Internet of Things (IoT) Devices
Survey on Security Issues of Internet of Things (IoT) DevicesSurvey on Security Issues of Internet of Things (IoT) Devices
Survey on Security Issues of Internet of Things (IoT) Devices
IRJET Journal
 
IoT based Environmental Monitoring and Control System
IoT based Environmental Monitoring and Control SystemIoT based Environmental Monitoring and Control System
IoT based Environmental Monitoring and Control System
IJMREMJournal
 
Internet Of Things (IOT)
Internet  Of Things (IOT)Internet  Of Things (IOT)
Internet Of Things (IOT)
rabbianasir99
 
Home Automation using IOT and Mobile App
Home Automation using IOT and Mobile AppHome Automation using IOT and Mobile App
Home Automation using IOT and Mobile App
IRJET Journal
 

What's hot (20)

An Improved Personal Security System
An Improved Personal Security SystemAn Improved Personal Security System
An Improved Personal Security System
 
IRJET-The Internet of Things Applications for Challenges and Related Future T...
IRJET-The Internet of Things Applications for Challenges and Related Future T...IRJET-The Internet of Things Applications for Challenges and Related Future T...
IRJET-The Internet of Things Applications for Challenges and Related Future T...
 
IRJET- Use of Artificial Intelligence in Cyber Defence
IRJET- Use of Artificial Intelligence in Cyber DefenceIRJET- Use of Artificial Intelligence in Cyber Defence
IRJET- Use of Artificial Intelligence in Cyber Defence
 
IRJET- Identification of Location of Laptop Devices using Raspberry Pi Mo...
IRJET-  	  Identification of Location of Laptop Devices using Raspberry Pi Mo...IRJET-  	  Identification of Location of Laptop Devices using Raspberry Pi Mo...
IRJET- Identification of Location of Laptop Devices using Raspberry Pi Mo...
 
IRJET- An Alert System for Home Security based on Internet of Thing
IRJET- An Alert System for Home Security based on Internet of ThingIRJET- An Alert System for Home Security based on Internet of Thing
IRJET- An Alert System for Home Security based on Internet of Thing
 
IRJET - Women Safety Device with GPS Tracking and Alerts
IRJET -  	  Women Safety Device with GPS Tracking and AlertsIRJET -  	  Women Safety Device with GPS Tracking and Alerts
IRJET - Women Safety Device with GPS Tracking and Alerts
 
Security and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentSecurity and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT Environment
 
Internet of Things - Desire for Convenience Brings Multiple New Attack Vectors
Internet of Things - Desire for Convenience Brings Multiple New Attack VectorsInternet of Things - Desire for Convenience Brings Multiple New Attack Vectors
Internet of Things - Desire for Convenience Brings Multiple New Attack Vectors
 
IRJET - Smart Classroom Automation based on IoT
IRJET -  	  Smart Classroom Automation based on IoTIRJET -  	  Smart Classroom Automation based on IoT
IRJET - Smart Classroom Automation based on IoT
 
IRJET - Android based Secure and Smart Home Application using IoT
IRJET -  	  Android based Secure and Smart Home Application using IoTIRJET -  	  Android based Secure and Smart Home Application using IoT
IRJET - Android based Secure and Smart Home Application using IoT
 
188
188188
188
 
Cybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkCybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by Clearnetwork
 
Developing surveillance challenges in theinternet of things
Developing surveillance challenges in theinternet of thingsDeveloping surveillance challenges in theinternet of things
Developing surveillance challenges in theinternet of things
 
Android Operated Application Based Smart Eye for Home Automation System Using...
Android Operated Application Based Smart Eye for Home Automation System Using...Android Operated Application Based Smart Eye for Home Automation System Using...
Android Operated Application Based Smart Eye for Home Automation System Using...
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected Devices
 
IRJET - Home Appliance Controlling and Monitoring by Mobile Application based...
IRJET - Home Appliance Controlling and Monitoring by Mobile Application based...IRJET - Home Appliance Controlling and Monitoring by Mobile Application based...
IRJET - Home Appliance Controlling and Monitoring by Mobile Application based...
 
Survey on Security Issues of Internet of Things (IoT) Devices
Survey on Security Issues of Internet of Things (IoT) DevicesSurvey on Security Issues of Internet of Things (IoT) Devices
Survey on Security Issues of Internet of Things (IoT) Devices
 
IoT based Environmental Monitoring and Control System
IoT based Environmental Monitoring and Control SystemIoT based Environmental Monitoring and Control System
IoT based Environmental Monitoring and Control System
 
Internet Of Things (IOT)
Internet  Of Things (IOT)Internet  Of Things (IOT)
Internet Of Things (IOT)
 
Home Automation using IOT and Mobile App
Home Automation using IOT and Mobile AppHome Automation using IOT and Mobile App
Home Automation using IOT and Mobile App
 

Similar to IRJET- Women Security System using IoT

ELECTRONIC JACKET FOR WOMEN SAFETY
ELECTRONIC JACKET FOR WOMEN SAFETYELECTRONIC JACKET FOR WOMEN SAFETY
ELECTRONIC JACKET FOR WOMEN SAFETY
IRJET Journal
 
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
aulasnilda
 
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative AnalysisCyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
IRJET Journal
 
Artificial Intelligence and the Field of Robotics: A Systematic Approach to C...
Artificial Intelligence and the Field of Robotics: A Systematic Approach to C...Artificial Intelligence and the Field of Robotics: A Systematic Approach to C...
Artificial Intelligence and the Field of Robotics: A Systematic Approach to C...
IRJET Journal
 
Women Safety Application Android Project
Women Safety Application Android ProjectWomen Safety Application Android Project
Women Safety Application Android Project
IRJET Journal
 
A_LoRa-Driven_Home_Security_System_for_a_Residenti.pdf
A_LoRa-Driven_Home_Security_System_for_a_Residenti.pdfA_LoRa-Driven_Home_Security_System_for_a_Residenti.pdf
A_LoRa-Driven_Home_Security_System_for_a_Residenti.pdf
SiegriqueCeasarAJalw
 
SMART SECURITY DEVICE FOR WOMEN USING IOT
SMART SECURITY DEVICE FOR WOMEN USING IOTSMART SECURITY DEVICE FOR WOMEN USING IOT
SMART SECURITY DEVICE FOR WOMEN USING IOT
IRJET Journal
 
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTSECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
vishal dineshkumar soni
 
Raspberry Pi Based Surveillance Robot for Home Security
Raspberry Pi Based Surveillance Robot for Home SecurityRaspberry Pi Based Surveillance Robot for Home Security
Raspberry Pi Based Surveillance Robot for Home Security
IRJET Journal
 
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...
IJNSA Journal
 
IRJET - Women’s Safety System using IoT
IRJET -  	  Women’s Safety System using IoTIRJET -  	  Women’s Safety System using IoT
IRJET - Women’s Safety System using IoT
IRJET Journal
 
An IOT based solution for Road Accidents
An IOT based solution for Road AccidentsAn IOT based solution for Road Accidents
An IOT based solution for Road Accidents
ijtsrd
 
IoT and security
IoT and securityIoT and security
IoT and security
IET India
 
Internet of Things, Examples and Issues
Internet of Things, Examples and IssuesInternet of Things, Examples and Issues
Internet of Things, Examples and Issues
IRJET Journal
 
IRJET- Internet of Things based Emergency System
IRJET- Internet of Things based Emergency SystemIRJET- Internet of Things based Emergency System
IRJET- Internet of Things based Emergency System
IRJET Journal
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
ijsrd.com
 
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATIONANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
IRJET Journal
 
General Overview of IOT Empower Technology
General Overview of IOT Empower TechnologyGeneral Overview of IOT Empower Technology
General Overview of IOT Empower Technology
IRJET Journal
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
Anastasios Economides
 
FinalResearch_95752_oliver
FinalResearch_95752_oliverFinalResearch_95752_oliver
FinalResearch_95752_oliverMadison Oliver
 

Similar to IRJET- Women Security System using IoT (20)

ELECTRONIC JACKET FOR WOMEN SAFETY
ELECTRONIC JACKET FOR WOMEN SAFETYELECTRONIC JACKET FOR WOMEN SAFETY
ELECTRONIC JACKET FOR WOMEN SAFETY
 
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
 
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative AnalysisCyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
 
Artificial Intelligence and the Field of Robotics: A Systematic Approach to C...
Artificial Intelligence and the Field of Robotics: A Systematic Approach to C...Artificial Intelligence and the Field of Robotics: A Systematic Approach to C...
Artificial Intelligence and the Field of Robotics: A Systematic Approach to C...
 
Women Safety Application Android Project
Women Safety Application Android ProjectWomen Safety Application Android Project
Women Safety Application Android Project
 
A_LoRa-Driven_Home_Security_System_for_a_Residenti.pdf
A_LoRa-Driven_Home_Security_System_for_a_Residenti.pdfA_LoRa-Driven_Home_Security_System_for_a_Residenti.pdf
A_LoRa-Driven_Home_Security_System_for_a_Residenti.pdf
 
SMART SECURITY DEVICE FOR WOMEN USING IOT
SMART SECURITY DEVICE FOR WOMEN USING IOTSMART SECURITY DEVICE FOR WOMEN USING IOT
SMART SECURITY DEVICE FOR WOMEN USING IOT
 
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTSECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
 
Raspberry Pi Based Surveillance Robot for Home Security
Raspberry Pi Based Surveillance Robot for Home SecurityRaspberry Pi Based Surveillance Robot for Home Security
Raspberry Pi Based Surveillance Robot for Home Security
 
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...
 
IRJET - Women’s Safety System using IoT
IRJET -  	  Women’s Safety System using IoTIRJET -  	  Women’s Safety System using IoT
IRJET - Women’s Safety System using IoT
 
An IOT based solution for Road Accidents
An IOT based solution for Road AccidentsAn IOT based solution for Road Accidents
An IOT based solution for Road Accidents
 
IoT and security
IoT and securityIoT and security
IoT and security
 
Internet of Things, Examples and Issues
Internet of Things, Examples and IssuesInternet of Things, Examples and Issues
Internet of Things, Examples and Issues
 
IRJET- Internet of Things based Emergency System
IRJET- Internet of Things based Emergency SystemIRJET- Internet of Things based Emergency System
IRJET- Internet of Things based Emergency System
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATIONANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
 
General Overview of IOT Empower Technology
General Overview of IOT Empower TechnologyGeneral Overview of IOT Empower Technology
General Overview of IOT Empower Technology
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
FinalResearch_95752_oliver
FinalResearch_95752_oliverFinalResearch_95752_oliver
FinalResearch_95752_oliver
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
MuhammadTufail242431
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
PrashantGoswami42
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 

Recently uploaded (20)

Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 

IRJET- Women Security System using IoT

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3810 WOMEN SECURITY SYSTEM USING IOT Syed Zainuddin1, M. Satish Yadav2 1UG Student, Department of Electronics & Communication Engineering, Methodist College of Engineering and Technology, Hyderabad, Telangana, India 2Assistant Professor, Department of Electronics & Communication Engineering, Methodist College of Engineering and Technology, Hyderabad, Telangana, India --------------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - As we know the present era is with equal rights, where in both men and women are taking equal responsibility in their respective works. Because of some reasons’ women can’t step out of their house. The Women Security System consists of an on-site deployment of an IoT module that is used to monitor and signalize the state of each individual which enables the user to convey information about their location, and if they are in danger the information is conveyed to the respective officials and house members. These systems use effective sensors, by tracking information from various sources and also deployed active data processing units. Here our proposed idea is implemented using WIA cloud and TWILIO Communication API so that the corresponding officials or end users could get the information via Wi-Fi or Internet. It mainly focuses on reducing the crimes against women which might destroy their lives. Key Words: Women Security, Internet of things (IOT), WIA Cloud, TWILIO API, 1. INTRODUCTION IOT technology grows in various fields of smart applications but we have not yet found boundary constraints of this technology. Some smart applications which it has implementing currently such as on smart grids, smart lighting, smart energy, smart city, smart health etc. [4]. Because of some reasons’ women can’t step out of their house. The only thought haunting in every woman`s mind is when they will be able to move freely on the streets even in odd hours without worrying about their security. In critical situations the women will not feel insecure or helpless if they have some kind of safety device with them. Here are some reasons why we need a women security device:  About 10% of all the crimes committed in the country are those of women abuse.  A woman is raped every 20 minutes in India  One in three ever married women report having been slapped by their husband.  Around two-third of married women in India are victims of domestic violence. 1.1 EXISTING SYSTEM 1. SHE (Society Harnessing Equipment): It is a garment embedded with an electronic device. This garment has an electric circuit that can generate 3800kV which can help the victim to escape. The garment delivers an electric shock to attackers strong enough to cause severe burns, protecting the victim from any of the electricity. 2. ILA SECURITY: The co-founders of this system, have designed three personal alarms that can shock and disorient potential attackers and hence safeguard the victim from perilous situations. 1.2 PROPOSED SYSTEM We propose to have a device which is the integration of multiple devices, hardware comprises of a “Smart gadget” which continuously communicates with the cloud and API. The complete gadget also ensures to provide self-defense application which helps her to escape critical situations. This system can be used at places like bus stops, railway stations, offices, footpaths, shopping malls, markets, etc. The status of the individual is monitored continuously in real time and the information is updated. Using the data, we can identify patterns and reduce crimes against women. 2. LITERATURE SURVEY In today’s world women are less secure, they are facing a greater number of situations like kidnapping, rape case, & abuse. Because of these reasons’ women can’t step out of their house. The prime question in every Woman’s mind, taking into account the ever-rising increase of issues on women harassment in recent past, is only about her safety and security. The only thought haunting every Woman’s is when they will be able to move freely on the streets even in odd hours without worrying about their security. When such incident happens with women’s they will not feel insecure or helpless if they have some kind of device with
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3811 them. With the help of these devices girls & women can stay out without any fear at any time [1]. At the present scenario Women are competing with men in every prospect of society. Nowadays, women and children safety are a prime issue of our society. The count of the victim is increasing day by day. Women contribute fifty percent to the development of our nation. But the women have fear of getting harassed and killed. All these types of women harassment cases are increasing day by day. So, it is very important to ensure the safety of women [3]. Women security is a major issue of concern in today’s world. Women are subjected to unethical physical harassment. Women safety methods such as various mobile apps have been tried and implemented, but the need of the time is that they need is a device that can be carried everywhere easily. The idea to develop a smart device for women is that it’s completely comfortable and easy to use as compared with already existing women security solutions such as a separate garment, bulky belts and in famous mobile apps that are just very abstract and obsolete. If a woman is subjected to attack by an adversary, then a switch has to be pressed by her, manually [5]. 3. SOFTWARE AND HARDWARE REQUIREMENTS 3.1 SOFTWARE AND CLOUD REQUIREMENETS 1. Python Python is an interpreted high-level programming language for general-purpose programming. Python is a multi- paradigm programming language. Object-oriented programming and structured programming are fully supported, and many of its features support functional programming and programming.  It is used in Web and Internet Development, Software Development and Business Applications.  It has many more applications as it has features like Multiple Programming Paradigms.  Compatible with Major Platforms and Systems and Robust Standard Library. 2. WIA Cloud Wia is a cloud platform that enables users to build a scalable and powerful backend to launch their Internet of Things (IoT) solutions. This allows makers, startups and enterprise users to create a fully-fledged, production ready solution in just minutes without having to worry about server management, data replication and storage. In addition to this, Wia offers users device management, events collection, analytics and highly customizable push notifications. Wia is a cloud platform that enables users to build a scalable and powerful backend to launch their Internet of Things (IoT) solutions. One can publish events and subscribe to commands via our REST, MQTT, and CoAP APIs 3. Twilio Communication API Twilio is a cloud communications platform as a service (CPaaS) company based in San Francisco, California. Twilio allows software developers to programmatically make and receive phone calls, send and receive text messages, and perform other communication functions using its web service APIs. Twilio uses Amazon Web Services to host telephony infrastructure and provide connectivity between HTTP and the public switched telephone network (PSTN) through its APIs. Twilio follows a set of architectural design principles to protect against unexpected outages. Twilio supports the development of open-source software and regularly makes contributions to the open-source community. Twilio lists a number of other open-source projects on their website including: Flask Restful:  Python Flask (web framework) to build REST APIs.  Shadow: Runs requests through a release candidate with real production traffic.  Banker’s Box: Wrapper for storage backend. 4. Geocoder Geocoding is the computational process of transforming a physical address description to a location on the Earth's surface (spatial representation in numerical coordinates). Reverse geocoding, on the other hand, converts geographic coordinates to a description of a location, usually the name of a place or an addressable location. Geocoding relies on a computer representation of address points, the street / road network, together with postal and administrative boundaries. Geocoder is a simple and consistent geocoding library written in Python. Dealing with multiple different geocoding provider such as Google, Bing, OSM & many more has never been easier. 3.2 HARDWARE REQUIREMENTS 1. Raspberry Pi The Raspberry Pi is a series of small single-board computers developed by the Raspberry Pi Foundation. The
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3812 first-generation Raspberry Pi 1 Model A was released in February 2013. Raspberry Pi 3 Model A+ was released in February 2018 with a 1.2 GHz 64-bit quad core processor, on-board Wi-Fi, Bluetooth and USB boot capabilities. Raspbian is a free operating system based on Debian GNU/Linux and optimized for the Raspberry Pi hardware. Here we are using Raspberry Pi 3A+.It has 40 GPIO pins which are available to us. 2. Vibration Sensor A vibration sensor is a type of accelerometer. A vibration sensor typically contains a piezoelectric crystal element bonded to a mass. When the accelerometer is subject to an accelerative force, the mass compresses the crystal, causing it to produce an electrical signal that is proportional to the level of force applied. The signal is then amplified and conditioned using inbuilt electronics that create an output signal, which is suitable for use by higher level data acquisition or control systems. The Vibration module based on the vibration sensor SW-420 and Comparator LM393 to detect if there is any vibration that beyond the threshold. The threshold can be adjusted by the on-board potentiometer. When this no vibration, this module output logic LOW the signal indicates LED light, and vice versa. 3. Jumper Wires A jump wire is an electrical wire, or group of them in a cable, with a connector or pin at each end, which is normally used to interconnect the components of a breadboard or other prototype or test circuit, internally or with other equipment or components, without soldering. Jumper wires are wires that have connector pins at each end, allowing them to be used to connect two points to each other without soldering. Jumper wires are typically used with breadboards and other prototyping tools in order to make it easy to change a circuit as needed [2]. 4. Touch sensor A touch sensor is a type of equipment that captures and records physical touch or embrace on a device and/or object. The Touch Sensor are sensitive to touch, pressure as well as force. The Touch Sensor works similar to that of a simple switch. When any physical medium comes in contact with the touch surface. The internal circuit will be closed inside the sensor and current starts flowing. On the other hand, when this physical contact is broken or released, the circuit will be opened. The TTP22301 Digital Touch Sensor Capacitive Touch Switch Module is used in this project. The Capacitive touch sensors are very popular since they are more robust, durable and user friendly. Moreover, it is also cost-effective when compared resistive touch sensors. The capacitive sensor is made just similar to the normal capacitor. There are two conductors separated with the insulator. 4. SYSTEM DESIGN 4.1. BLOCK DIAGRAM Fig 1: Block Diagram 4.2. FLOW CHART Fig 2: Flow Chart
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3813 5. IMPLEMENTATION OF THE SYSTEM 1. If using a new SD card then download NOOBS from the official raspberry pi site. Extract and copy the files in a SD card of size ranging from 8GB to 32 GB to install Raspbian on the SD card. 2. Place the SD card in the provided slot. Plug in the power supply, now select Raspbian to install it. It will take a while. After the installation is complete setup up your Raspberry pi. 3. Download geocoder, Twilio and Wia installation files from Github. Install the mentioned software’s in your raspberry pi by using the terminal. 4. Create an account in Twilio and register the mobile numbers on which you are sending the messages. 5. Create another account in Wia cloud, create a space and add your device. 6. Connect the vibration and touch sensors to the raspberry pi. 7. When a person touches the sensor or if the vibration sensor detects a big vibration the geocoder gets the location using the IP address and then sends the data to Wia cloud to store the information and view it graphically. Then the location is sent to mobile phones of the desired personals through Twilio communication API. 6. RESULT AND DISCUSSION This designed women system which is simple, economic and provides effective solution to reduce the crimes against women and increase the feeling of safety among them. It is well managed to access and map the status of location from any remote location. Figure 3 shows the database of Wia cloud. Figure 4 shows the map which is plotted by the Wia cloud from the coordinates derived from the geocoder which are sent to it when a person touches the touch sensor or when a big vibration is detected. Figure 5 shows the SMS which is received through the Twilio API. Finally, figure 6 shows the system itself. Fig 3: WIA Cloud Database Fig 4: WIA Cloud Maps Fig 5: SMS received on mobile phone Fig 6: Hardware
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3814 7. APPLICATION AND ADVANTAGES 7.1 APPLICATIONS  The system can be used at places like bus stops, railway stations, offices, footpaths, shopping malls, markets, etc.  It can be carried anywhere, and the location of a person is danger can be recovered and necessary actions can be taken. 7.2 ADVANTAGES  Reduced crimes  Enhanced User Experience  Increased Safety  Real-Time Data and Trend Insight  Increased self-confidence  A decreased feeling of vulnerability  Reduced risk of being victimized  Improving overall personal safety 8. CONCLUSION AND FUTURE SCOPE 8.1 CONCLUSIONS  Our primary goal of this project is to ensure every Woman in our society to feel safe and secured. According to the survey in India 53% of working women are not feeling safe.  Implementing real time application and a device, we can solve the problems to an extent. With further research and innovation, this project is used as a small wearable device like watch pendent etc. security is an upgraded version of security device which works with both hardware and software.  The innovative idea is that it led with nearest neighbor technology by which we can contact with our nearest person at emergency time. It is very relevant and easily accessible system model. 8.2 FUTURE SCOPE  Communication through GPS & GSM technology is the supplementary part to have help to the person.  In future to have legal process video information can be sent to the cops, State & Central Govt. to have immediate punishment to the criminal.  The system will also be helpful to all people those who are in remote area for their protection against criminal problems etc. This system can overcome the fear that scares every woman in the in city about her security and safety. 9. REFERENCES [1] Akanksha Chandoskar, Shraddha Chavan, Yojana Mokal, Payal Jha,Pournima Kadam , “Smart Gadget For Women’s Safety”, International Journal On Recent And Innovation Trends in Computing and Communications Volume:4, Issue:1 ,January 2016 [2] Gaurav Makde, Ashutosh Bele, Vaibhav Khapekar, Nidhi Gajarlwar, Sakshi Gajbhiye, Kunal Purohit,” Implementation of IOT Based Smart Garbage and Waste Collection System”, International Research Journal of Engineering and Technology (IRJET), Volume: 06 Issue: 03, Mar 2019 [3] R.A.Jain,Aditya Patil, Prasenjeet Nikam, Shubham More , Saurabh Totewar, ”Women’s safety using IOT”, International Research Journal of Engineering and Technology(IRJET), Volume: 04, Issue: 05, May 2017 [4] Mr. Basavaraju S R, “Automatic Smart Parking System using Internet of Things (IOT)”, International Journal of Scientific and Research Publications, Volume 5, Issue 12, December 2015 [5] Jismi Thomas, Maneesha K J, Nambissan Shruthi Vijayan, Divya R,” TOUCH ME NOT-A Women Safety Device”, International Research Journal of Engineering and Technology (IRJET), Volume: 05, Issue: 03, Mar 2018