In this paper, we examine how to use networks with smartphones for providing communications in disaster recovery.
By lessening the communication gap among different kinds of wireless networks, we have designed and implemented a system
called TeamPhone, which provides Android phones the capabilities on communications in disaster helper. TeamPhone
consists of two components: a messaging system between rescue worker and the victim and a self-rescue system. The
messaging system between rescue worker and victim integrates cellular networking, ad-hoc networking, and opportunistic
networking seamlessly, and enables proper communication. The self-rescue system finds different communication network
ways for trapped survivors. Such a group of Android phones can cooperatively get a notification and send out emergency
messages in an energy-efficient manner with their location and position information so as to help rescue operations. We have
implemented TeamPhone as a prototype application on the Android platform and deployed it on all types of smartphones from
Samsung to Redmi and others. Results demonstrate that TeamPhone can properly enhance communication requirements and
increase the pace of disaster recovery. We are creating three applications with a centralized cloud for communication. First for
the admin who will monitor victim and rescue worker on Google map and other two for rescue worker and disaster victim.
IRJET- A Survey on Child Safety & Tracking Management SystemIRJET Journal
This document summarizes a research paper on a child safety and tracking management system using mobile phones. The system allows parents to monitor their child's location in real-time using GPS and set up geographical boundaries. It also allows children to send emergency SMS messages with their location if needed. The system is designed as an Android application to take advantage of the GPS, geo-fencing, and SMS capabilities on Android phones. It aims to help parents keep their children safe by knowing their locations and setting alerts if they leave approved areas.
1) The document describes a safety jacket system for women that uses various modules like GPS, GSM, a camera, shock circuit, buzzer, and memory card connected to a Raspberry Pi module.
2) When the second button is pressed, the GPS tracks the location and sends it along with an alert message to predefined phone numbers. The shock circuit and camera activate to injure attackers and capture images of them that are saved to the memory card.
3) The system aims to allow women to protect themselves and alert others in emergency situations without needing to use a smartphone. It provides real-time location tracking, self-defense capabilities, and evidence collection to aid in finding attackers.
A STUDY ON LEA AND SEED ALGORITHMS FOR DATA PROTECTION OF SMARTPHONE BASED DI...IJNSA Journal
The number of disaster occurrences around the world based on the climate changes due to the global
warming has been indicating an increase. To prevent and cope with such disaster, a number of researches
have been actively conducted to combine the user location service as well as the sensor network
technology into the expanded IoT to detect the disaster at early stages. However, due to the appearance of
the new technologies, the scope of the security threat to the pre-existing system has been expanding. In this
thesis, the D-SASS using the beacon to provide the notification service to the disaster-involved area and
the safe service to the users is proposed. The LEA Algorithm is applied to the proposed system to design
the beacon protocol collected from the smartphone to safely receive the notification information. In
addition, for data protection of a notification system, LEA and SEED algorithms were applied, and a
comparative analysis was conducted.
This document describes a flood detection system that uses IoT technology. An ultrasonic sensor is used to detect water levels and send the data to a Node MCU controller. The controller then sends real-time flood height information via SMS to local authorities and residents. The system aims to help motorists and residents avoid flooded areas. It divides flood levels into four categories. The sensor and controller are powered by solar panels to allow continuous monitoring. When implemented, this system could help reduce traffic and warn people faster during flood events.
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewIJSRD
In this system we have proposed to implement the technique to improve antitheft for android based mobile phones by using various services like MMS over the SMS. Today’s most popular android operating system is contains many scenarios that already been proposed that are related to anti-theft also many applications are available onto play store but these application are not so useful to find the thief e.g. GPS tracking for the devices like smart phones, tablets and phablets. We can use new technology likes Multimedia Messaging Service (MMS), which enhances the present scenario. This scenario is totally dependent on the hardware of your smart phone device that is camera (front or rear) also support for multimedia messages. First, we just need to install this software then, it work’s in the background, stores the current SIM number in a variable and keeps continuously checking for SIM change, whenever SIM gets changed from device, it will takes snapshots, record a video in the background with the use of camera of device and also records surrounding audio i.e., without taking user permission and then it will send an MMS to an alternate mobile number and an email id, which was provided during installation for authorized user’s registration. The most benefit of this application is very easy to configure and keeps running in the background without interrupting the user. To some extent it helps the authorized user to identify and find the thief.
“Helpdroid” we inspire by movie-Prema the
project we provide the accident detection in any place. We
provide the help to injuries peoples. When the car or bike
crash together then the GPS and GMS with the crash sensor
send the digital signal and send the message and call to near
police station, ambulance and there related persons.
This document describes a mobile app called the Women Security App developed by a group of students to help ensure women's safety. The app allows a user to save their contact details and then activate a "widget" that can instantly alert contacts and share the user's location if they feel unsafe. It also records audio from the user's surroundings and sends the recording along with a text message and GPS coordinates to the designated contact. The app aims to help women get assistance quickly in dangerous situations.
IRJET- A Survey on Child Safety & Tracking Management SystemIRJET Journal
This document summarizes a research paper on a child safety and tracking management system using mobile phones. The system allows parents to monitor their child's location in real-time using GPS and set up geographical boundaries. It also allows children to send emergency SMS messages with their location if needed. The system is designed as an Android application to take advantage of the GPS, geo-fencing, and SMS capabilities on Android phones. It aims to help parents keep their children safe by knowing their locations and setting alerts if they leave approved areas.
1) The document describes a safety jacket system for women that uses various modules like GPS, GSM, a camera, shock circuit, buzzer, and memory card connected to a Raspberry Pi module.
2) When the second button is pressed, the GPS tracks the location and sends it along with an alert message to predefined phone numbers. The shock circuit and camera activate to injure attackers and capture images of them that are saved to the memory card.
3) The system aims to allow women to protect themselves and alert others in emergency situations without needing to use a smartphone. It provides real-time location tracking, self-defense capabilities, and evidence collection to aid in finding attackers.
A STUDY ON LEA AND SEED ALGORITHMS FOR DATA PROTECTION OF SMARTPHONE BASED DI...IJNSA Journal
The number of disaster occurrences around the world based on the climate changes due to the global
warming has been indicating an increase. To prevent and cope with such disaster, a number of researches
have been actively conducted to combine the user location service as well as the sensor network
technology into the expanded IoT to detect the disaster at early stages. However, due to the appearance of
the new technologies, the scope of the security threat to the pre-existing system has been expanding. In this
thesis, the D-SASS using the beacon to provide the notification service to the disaster-involved area and
the safe service to the users is proposed. The LEA Algorithm is applied to the proposed system to design
the beacon protocol collected from the smartphone to safely receive the notification information. In
addition, for data protection of a notification system, LEA and SEED algorithms were applied, and a
comparative analysis was conducted.
This document describes a flood detection system that uses IoT technology. An ultrasonic sensor is used to detect water levels and send the data to a Node MCU controller. The controller then sends real-time flood height information via SMS to local authorities and residents. The system aims to help motorists and residents avoid flooded areas. It divides flood levels into four categories. The sensor and controller are powered by solar panels to allow continuous monitoring. When implemented, this system could help reduce traffic and warn people faster during flood events.
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewIJSRD
In this system we have proposed to implement the technique to improve antitheft for android based mobile phones by using various services like MMS over the SMS. Today’s most popular android operating system is contains many scenarios that already been proposed that are related to anti-theft also many applications are available onto play store but these application are not so useful to find the thief e.g. GPS tracking for the devices like smart phones, tablets and phablets. We can use new technology likes Multimedia Messaging Service (MMS), which enhances the present scenario. This scenario is totally dependent on the hardware of your smart phone device that is camera (front or rear) also support for multimedia messages. First, we just need to install this software then, it work’s in the background, stores the current SIM number in a variable and keeps continuously checking for SIM change, whenever SIM gets changed from device, it will takes snapshots, record a video in the background with the use of camera of device and also records surrounding audio i.e., without taking user permission and then it will send an MMS to an alternate mobile number and an email id, which was provided during installation for authorized user’s registration. The most benefit of this application is very easy to configure and keeps running in the background without interrupting the user. To some extent it helps the authorized user to identify and find the thief.
“Helpdroid” we inspire by movie-Prema the
project we provide the accident detection in any place. We
provide the help to injuries peoples. When the car or bike
crash together then the GPS and GMS with the crash sensor
send the digital signal and send the message and call to near
police station, ambulance and there related persons.
This document describes a mobile app called the Women Security App developed by a group of students to help ensure women's safety. The app allows a user to save their contact details and then activate a "widget" that can instantly alert contacts and share the user's location if they feel unsafe. It also records audio from the user's surroundings and sends the recording along with a text message and GPS coordinates to the designated contact. The app aims to help women get assistance quickly in dangerous situations.
IRJET- Rescue Robot using ESP MicrocontrollerIRJET Journal
This document describes a rescue robot designed to transmit essential information during disasters. It is equipped with sensors like a temperature sensor, humidity sensor, motion sensor, metal detector, and ultrasonic sensor. The robot can be controlled wirelessly via an Android application. It uses an ESP microcontroller to process sensor data and transmit it via an IoT network. The robot allows monitoring of conditions in hazardous areas and helps with rescue operations by identifying survivors and environmental conditions. The document discusses the system components, communication network, working, and potential applications to improve disaster management.
Internet of Things Based Women Tracking and Security with Auto-Defender Systemrahulmonikasharma
In worldwide situation, the prime inquiry in each woman mind is about her safety and the badgering issues. Women everywhere throughout the world are confronting much deceptive physical provocation. The main idea frequenting each woman is the point at which they will have the capability to move frankly in the city even in odd hours without stressing over their security. Our task is a dare to determine this issue. This paper describes about a smart intelligent security system for women. This venture concentrates on a security for women so they will never feel vulnerable. The system comprises of different modules such as GPS receiver, shock circuit, buzzer, spray mechanism, Webcam, pulse rate sensor, Raspberry pi-3 module. Today there are many cases which are going on about women all over in the world. It was high time where women required a change. This task depends on women security where women feel ensured. This venture portrays about safety electronic system for women, worked out in the open transport vehicles such as, car, buses and auto-rickshaws as these days women are being at molested, kidnapped and badgering by the drivers. In each field there is an uncommon effect of women like games, dance, training, business, in legislative issues moreover. Women are driving in each field. The question arises that, Are the women in India are extremely secured? Always get the solution No. Henceforth executed Internet of Things based women tracking and security with auto-defender system which is interfaced with Raspberry pi 3 board that will track the location of the women also will auto defend in bad situation.
DESIGN OF A SECURE DISASTER NOTIFICATION SYSTEM USING THE SMARTPHONE BASED BE...csandit
The number of disaster occurrences around the world based on the climate changes due to the global warming has been indicating an increase. To prevent and cope with such disaster, a number of researches have been actively conducted to combine the user location service as well as the sensor network technology into the expanded IoT to detect the disaster at early stages. However, due to the appearance of the new technologies, the scope of the security threat to the pre-existing system has been expanding. In this thesis, the D-SASS using the beacon to provide the notification service to the disaster-involved region and the safe service to the users is proposed. The LEA Algorithm is applied to the proposed system to design the beacon protocol collected from the smartphone to safely receive the notification information as well as to provide the confidentiality during the data transfer between smartphone and notification server.
Fog Based Emergency System For Smart Enhanced Living EnvironmentKEERTHANA M
An ambient assisted-living emergency system exploits cloud and fog computing, an outdoor positioning mechanism, and emergency and communication protocols to locate activity-challenged individuals.
Social App - Concept - Women Safety - (India)
Like the idea - buy a book for me?
http://www.amazon.in/registry/wishlist/288G2K0JZQOD6
http://flipkart.com/wishlist/b3naam
The document discusses sensemaking from distributed mobile sensing data from a middleware perspective. It notes that the proliferation of smartphones and their various sensors enables crowdsensing for applications like emergency response, personal health monitoring, and spatial field sensing. However, developing collaborative mobile apps for sensemaking is challenging due to barriers like lack of standardized APIs and scalability issues. The document proposes a distributed middleware framework to address this by providing APIs and libraries for collaboration, virtual sensing, computational offloading, and cloud integration to ease app development and ensure scalability. It discusses some example middleware platforms and techniques used for sensemaking.
This document discusses gesture phones and gesture recognition technology. It begins by explaining how gestures are recognized through optical tracking, inertial tracking, and calibration. Examples are given of how gestures could control a smartphone, such as answering calls or controlling media playback. Challenges of gesture recognition are also mentioned. The document then discusses applications of gesture technology on Android and Windows phones through various apps that enable gesture control. Benefits of gesture technology include more intuitive interaction and control when touch is not possible.
Information technology plays a key role in enhancing safety and security across many domains. In banking, IT has led to the development of remote banking services like telebanking and e-banking, allowing customers to access their accounts anytime, anywhere, in a secure manner. IT solutions like self-inquiry facilities and electronic fund transfers have also improved convenience and safety of transactions. More broadly, technologies such as biometric authentication, encryption, and monitoring systems help strengthen security across the banking infrastructure and customer interactions.
IRJET- Enactment of Smart Child Monitoring SystemIRJET Journal
This document describes a smart child monitoring system that uses GPS, GSM, and pulse sensors to track a child's location and vital signs and alert parents if anything abnormal is detected. The system includes a child module worn by the child containing sensors that detects location via GPS and pulse, and sends this data via GSM to a parent's phone. It also predicts normal vs abnormal behavior patterns. If it detects a sudden change in location, pulse, or behavior, an immediate alert is sent to parents. The system aims to allow parents to monitor their child's status and location in real-time from a mobile app, reducing parental stress.
Personal Security Tracking based on Android and Web ApplicationTELKOMNIKA JOURNAL
Nowadays, the frequency of abduction is increasing significantly. Information technology provide
many social media which is causing the leaked of personal information where abductor can find out the
information. Using social media, people can share location, life event, and anything related about their life
event, these become the useful information for the abductor. To anticipate this, a lot of personal tracking
device is developed, but the response is too late. Because, the family or relative of the victims will notice
that abduction had happen after the victim is lost. According to the problem, this research will focus on
develop the personal tracking device which trigger by the victims who own the phone based on android
and web application. Whenever the abduction happens, the victim just need to click the button and the
system will send a message to the relatives and family in their contact also trigger the notification to the
local security. Software development life cycle that will be used is scrum which is divided into several
processes like backlog, sprints, scrum meetings, and demos. The result of this research is android
application for user and web application for managing application.
SECURITY AND KEY MANAGEMENT CHALLENGES OVER WSN (A SURVEY) IJCSES Journal
This document discusses security and key management challenges in wireless sensor networks (WSNs). It provides an overview of WSNs, their applications, advantages and disadvantages. It also discusses open research challenges in WSNs, including interoperability, scalability, energy efficiency, mobility management, deployment, localization and routing. The document outlines security objectives for WSNs including confidentiality, authentication, integrity, freshness and availability. It describes threat models for WSNs and different types of attacks. Finally, it discusses key management operations and goals that are important for security in WSNs.
IRJET-Protection for Women using IoT Smart Device with Location and ParametersIRJET Journal
This document describes a proposed system to provide protection for women using IoT devices. The system uses various sensors to monitor a woman's vital signs and movement, including pulse rate, temperature, sound, flexibility, and acceleration. If the sensed data exceeds predefined thresholds, the system will sound an alarm. It will also send an alert message and the victim's parameters to nearby IoT devices via WiFi. The location of the victim is tracked using GPS. This allows the alert to be sent to any devices connected to the IoT network, providing more comprehensive protection and assistance than existing systems.
IRJET- Women Security System using GSM and GPSIRJET Journal
This document presents a women's security system that uses GPS and GSM technologies. The system includes an Arduino microcontroller connected to a GPS module, GSM modem, push button, and LCD display. When the button is pressed, the GPS module sends location data to the Arduino. The Arduino then sends an SMS alert with the latitude and longitude coordinates to predefined phone numbers using the GSM modem. The purpose is to allow women to quickly alert authorities and contacts when feeling unsafe by simply pressing a button. The system is intended to make women feel more secure when traveling alone or working night shifts.
Now a day’s security has become the major concern for everyone. Due to these busy schedules, we didn’t get enough time to look around or can say keep watch on our surrounding because of which we didn’t notice the unusual activity which leads to a higher crime rate and become a major concern. The assailant has mastered themselves in hiding behind the cover of innocence and goodwill and executes their plan when they feel it’s the right time which has led to crime rate 47 . The crime is seriously needed to be controlled and so is the crime rate. Our project “Biometric Security Bags†is based on the problems we face most often in our life. It is a basic idea to create a bag which is secured by biometric lock and code lock which will be dual authentication with a GPS and GSM system will help us to keep our belongings safe. We will also introduce a mini camera which will capture our surrounding. The bag can be used for the multipurpose security of our valuables and at the same time for security of human. Deepti Rana | Ashwini Karnale | Divyashruti Mane | Mangal Kotkar "Biometric Security Bags" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd43611.pdf Paper URL: https://www.ijtsrd.comengineering/information-technology/43611/biometric-security-bags/deepti-rana
This document describes an IoT-based smart security system for women. The system uses a smart band connected via Bluetooth to a smartphone. The band monitors vital signs and movement. If signs of distress are detected, the smartphone app uses GPS and GSM to automatically send alerts and location to emergency contacts and authorities without any human intervention. The system aims to address issues like delayed response from existing personal security devices that require manual activation. It provides automated protection using IoT technology for increased safety and security of women.
IRJET- Disaster Management System using WebIRJET Journal
This document presents a web and mobile application for disaster management. The proposed system would include details about disasters, emergency contacts, affected areas, and more. It would use GPS to identify at-risk locations and predictions. The admin could manage the database and user accounts. Users could access information, post updates, and leave feedback. Data would be collected, analyzed, and used for predictions. The system was developed using HTML, CSS, JavaScript, PHP, SQL, and Java to provide timely disaster information to the public through a web and mobile platform.
This document summarizes a research paper that proposes an accident detection and emergency response system utilizing IoT (Internet of Things). The system uses sensors on a smartphone to detect if an accident has occurred. It then determines the user's location using GPS and sends this location to nearby hospitals and the user's emergency contacts. This allows emergency services to quickly locate and assist the injured user. The system was developed using Android Studio and utilizes Java and XML programming languages. It analyzes how IoT can help improve intelligent transportation systems by enabling real-time accident detection and emergency response.
ALPHA-ACCIDENT LOCATION PATIENT HEALTH ASSISTENCEIRJET Journal
This document describes a proposed accident detection and alert system that uses various sensors and communication modules. The system uses an Arduino microcontroller that interfaces with an impact sensor, GPS module, and GSM module. When an accident is detected by the impact sensor, the Arduino reads the vehicle's location from the GPS module and sends this information via text message to emergency contacts using the GSM module. The goal is to detect vehicle accidents and quickly alert emergency services to the accident location to save lives.
This document proposes an Android app to improve security for women, elderly people, and those with disabilities. The app has three main features: 1) A message reader that converts text messages to voice for visually impaired users. 2) An emergency request system that sends alerts with the user's location if they press a phone button repeatedly. 3) A medication reminder that notifies users when it is time to take pills through alarms and notifications. The app is designed to give vulnerable groups more independence by helping them communicate and request help when needed. It could improve safety for women and quality of life for elderly and disabled individuals.
This document describes a proposed system for detecting living humans in disaster areas using sensors, a microcontroller, GSM technology, and PLC systems. The system would use various sensors like PIR, temperature, vibration, IR, and ultrasonic detectors attached to an ATMEGA16 microcontroller to detect the presence of living humans. If humans are detected, the microcontroller would send an alert message via GSM to emergency responders. The system is intended to help rescuers locate survivors more quickly and efficiently in disaster sites. It aims to be low-cost, semi-autonomous, and easy to use through software interfacing.
This document describes an Android application designed to improve women's safety. The application uses GPS and GPRS to track a user's location and schedule. If the user presses an alarm, it will send alerts including their contact details and location to relatives, police, and volunteers. The system provides a low-cost solution for real-time emergency notification using simple smartphone interfaces. It aims to address issues women face in dangerous situations where they may not have time to call for help conventionally.
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
IRJET- Rescue Robot using ESP MicrocontrollerIRJET Journal
This document describes a rescue robot designed to transmit essential information during disasters. It is equipped with sensors like a temperature sensor, humidity sensor, motion sensor, metal detector, and ultrasonic sensor. The robot can be controlled wirelessly via an Android application. It uses an ESP microcontroller to process sensor data and transmit it via an IoT network. The robot allows monitoring of conditions in hazardous areas and helps with rescue operations by identifying survivors and environmental conditions. The document discusses the system components, communication network, working, and potential applications to improve disaster management.
Internet of Things Based Women Tracking and Security with Auto-Defender Systemrahulmonikasharma
In worldwide situation, the prime inquiry in each woman mind is about her safety and the badgering issues. Women everywhere throughout the world are confronting much deceptive physical provocation. The main idea frequenting each woman is the point at which they will have the capability to move frankly in the city even in odd hours without stressing over their security. Our task is a dare to determine this issue. This paper describes about a smart intelligent security system for women. This venture concentrates on a security for women so they will never feel vulnerable. The system comprises of different modules such as GPS receiver, shock circuit, buzzer, spray mechanism, Webcam, pulse rate sensor, Raspberry pi-3 module. Today there are many cases which are going on about women all over in the world. It was high time where women required a change. This task depends on women security where women feel ensured. This venture portrays about safety electronic system for women, worked out in the open transport vehicles such as, car, buses and auto-rickshaws as these days women are being at molested, kidnapped and badgering by the drivers. In each field there is an uncommon effect of women like games, dance, training, business, in legislative issues moreover. Women are driving in each field. The question arises that, Are the women in India are extremely secured? Always get the solution No. Henceforth executed Internet of Things based women tracking and security with auto-defender system which is interfaced with Raspberry pi 3 board that will track the location of the women also will auto defend in bad situation.
DESIGN OF A SECURE DISASTER NOTIFICATION SYSTEM USING THE SMARTPHONE BASED BE...csandit
The number of disaster occurrences around the world based on the climate changes due to the global warming has been indicating an increase. To prevent and cope with such disaster, a number of researches have been actively conducted to combine the user location service as well as the sensor network technology into the expanded IoT to detect the disaster at early stages. However, due to the appearance of the new technologies, the scope of the security threat to the pre-existing system has been expanding. In this thesis, the D-SASS using the beacon to provide the notification service to the disaster-involved region and the safe service to the users is proposed. The LEA Algorithm is applied to the proposed system to design the beacon protocol collected from the smartphone to safely receive the notification information as well as to provide the confidentiality during the data transfer between smartphone and notification server.
Fog Based Emergency System For Smart Enhanced Living EnvironmentKEERTHANA M
An ambient assisted-living emergency system exploits cloud and fog computing, an outdoor positioning mechanism, and emergency and communication protocols to locate activity-challenged individuals.
Social App - Concept - Women Safety - (India)
Like the idea - buy a book for me?
http://www.amazon.in/registry/wishlist/288G2K0JZQOD6
http://flipkart.com/wishlist/b3naam
The document discusses sensemaking from distributed mobile sensing data from a middleware perspective. It notes that the proliferation of smartphones and their various sensors enables crowdsensing for applications like emergency response, personal health monitoring, and spatial field sensing. However, developing collaborative mobile apps for sensemaking is challenging due to barriers like lack of standardized APIs and scalability issues. The document proposes a distributed middleware framework to address this by providing APIs and libraries for collaboration, virtual sensing, computational offloading, and cloud integration to ease app development and ensure scalability. It discusses some example middleware platforms and techniques used for sensemaking.
This document discusses gesture phones and gesture recognition technology. It begins by explaining how gestures are recognized through optical tracking, inertial tracking, and calibration. Examples are given of how gestures could control a smartphone, such as answering calls or controlling media playback. Challenges of gesture recognition are also mentioned. The document then discusses applications of gesture technology on Android and Windows phones through various apps that enable gesture control. Benefits of gesture technology include more intuitive interaction and control when touch is not possible.
Information technology plays a key role in enhancing safety and security across many domains. In banking, IT has led to the development of remote banking services like telebanking and e-banking, allowing customers to access their accounts anytime, anywhere, in a secure manner. IT solutions like self-inquiry facilities and electronic fund transfers have also improved convenience and safety of transactions. More broadly, technologies such as biometric authentication, encryption, and monitoring systems help strengthen security across the banking infrastructure and customer interactions.
IRJET- Enactment of Smart Child Monitoring SystemIRJET Journal
This document describes a smart child monitoring system that uses GPS, GSM, and pulse sensors to track a child's location and vital signs and alert parents if anything abnormal is detected. The system includes a child module worn by the child containing sensors that detects location via GPS and pulse, and sends this data via GSM to a parent's phone. It also predicts normal vs abnormal behavior patterns. If it detects a sudden change in location, pulse, or behavior, an immediate alert is sent to parents. The system aims to allow parents to monitor their child's status and location in real-time from a mobile app, reducing parental stress.
Personal Security Tracking based on Android and Web ApplicationTELKOMNIKA JOURNAL
Nowadays, the frequency of abduction is increasing significantly. Information technology provide
many social media which is causing the leaked of personal information where abductor can find out the
information. Using social media, people can share location, life event, and anything related about their life
event, these become the useful information for the abductor. To anticipate this, a lot of personal tracking
device is developed, but the response is too late. Because, the family or relative of the victims will notice
that abduction had happen after the victim is lost. According to the problem, this research will focus on
develop the personal tracking device which trigger by the victims who own the phone based on android
and web application. Whenever the abduction happens, the victim just need to click the button and the
system will send a message to the relatives and family in their contact also trigger the notification to the
local security. Software development life cycle that will be used is scrum which is divided into several
processes like backlog, sprints, scrum meetings, and demos. The result of this research is android
application for user and web application for managing application.
SECURITY AND KEY MANAGEMENT CHALLENGES OVER WSN (A SURVEY) IJCSES Journal
This document discusses security and key management challenges in wireless sensor networks (WSNs). It provides an overview of WSNs, their applications, advantages and disadvantages. It also discusses open research challenges in WSNs, including interoperability, scalability, energy efficiency, mobility management, deployment, localization and routing. The document outlines security objectives for WSNs including confidentiality, authentication, integrity, freshness and availability. It describes threat models for WSNs and different types of attacks. Finally, it discusses key management operations and goals that are important for security in WSNs.
IRJET-Protection for Women using IoT Smart Device with Location and ParametersIRJET Journal
This document describes a proposed system to provide protection for women using IoT devices. The system uses various sensors to monitor a woman's vital signs and movement, including pulse rate, temperature, sound, flexibility, and acceleration. If the sensed data exceeds predefined thresholds, the system will sound an alarm. It will also send an alert message and the victim's parameters to nearby IoT devices via WiFi. The location of the victim is tracked using GPS. This allows the alert to be sent to any devices connected to the IoT network, providing more comprehensive protection and assistance than existing systems.
IRJET- Women Security System using GSM and GPSIRJET Journal
This document presents a women's security system that uses GPS and GSM technologies. The system includes an Arduino microcontroller connected to a GPS module, GSM modem, push button, and LCD display. When the button is pressed, the GPS module sends location data to the Arduino. The Arduino then sends an SMS alert with the latitude and longitude coordinates to predefined phone numbers using the GSM modem. The purpose is to allow women to quickly alert authorities and contacts when feeling unsafe by simply pressing a button. The system is intended to make women feel more secure when traveling alone or working night shifts.
Now a day’s security has become the major concern for everyone. Due to these busy schedules, we didn’t get enough time to look around or can say keep watch on our surrounding because of which we didn’t notice the unusual activity which leads to a higher crime rate and become a major concern. The assailant has mastered themselves in hiding behind the cover of innocence and goodwill and executes their plan when they feel it’s the right time which has led to crime rate 47 . The crime is seriously needed to be controlled and so is the crime rate. Our project “Biometric Security Bags†is based on the problems we face most often in our life. It is a basic idea to create a bag which is secured by biometric lock and code lock which will be dual authentication with a GPS and GSM system will help us to keep our belongings safe. We will also introduce a mini camera which will capture our surrounding. The bag can be used for the multipurpose security of our valuables and at the same time for security of human. Deepti Rana | Ashwini Karnale | Divyashruti Mane | Mangal Kotkar "Biometric Security Bags" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd43611.pdf Paper URL: https://www.ijtsrd.comengineering/information-technology/43611/biometric-security-bags/deepti-rana
This document describes an IoT-based smart security system for women. The system uses a smart band connected via Bluetooth to a smartphone. The band monitors vital signs and movement. If signs of distress are detected, the smartphone app uses GPS and GSM to automatically send alerts and location to emergency contacts and authorities without any human intervention. The system aims to address issues like delayed response from existing personal security devices that require manual activation. It provides automated protection using IoT technology for increased safety and security of women.
IRJET- Disaster Management System using WebIRJET Journal
This document presents a web and mobile application for disaster management. The proposed system would include details about disasters, emergency contacts, affected areas, and more. It would use GPS to identify at-risk locations and predictions. The admin could manage the database and user accounts. Users could access information, post updates, and leave feedback. Data would be collected, analyzed, and used for predictions. The system was developed using HTML, CSS, JavaScript, PHP, SQL, and Java to provide timely disaster information to the public through a web and mobile platform.
This document summarizes a research paper that proposes an accident detection and emergency response system utilizing IoT (Internet of Things). The system uses sensors on a smartphone to detect if an accident has occurred. It then determines the user's location using GPS and sends this location to nearby hospitals and the user's emergency contacts. This allows emergency services to quickly locate and assist the injured user. The system was developed using Android Studio and utilizes Java and XML programming languages. It analyzes how IoT can help improve intelligent transportation systems by enabling real-time accident detection and emergency response.
ALPHA-ACCIDENT LOCATION PATIENT HEALTH ASSISTENCEIRJET Journal
This document describes a proposed accident detection and alert system that uses various sensors and communication modules. The system uses an Arduino microcontroller that interfaces with an impact sensor, GPS module, and GSM module. When an accident is detected by the impact sensor, the Arduino reads the vehicle's location from the GPS module and sends this information via text message to emergency contacts using the GSM module. The goal is to detect vehicle accidents and quickly alert emergency services to the accident location to save lives.
This document proposes an Android app to improve security for women, elderly people, and those with disabilities. The app has three main features: 1) A message reader that converts text messages to voice for visually impaired users. 2) An emergency request system that sends alerts with the user's location if they press a phone button repeatedly. 3) A medication reminder that notifies users when it is time to take pills through alarms and notifications. The app is designed to give vulnerable groups more independence by helping them communicate and request help when needed. It could improve safety for women and quality of life for elderly and disabled individuals.
This document describes a proposed system for detecting living humans in disaster areas using sensors, a microcontroller, GSM technology, and PLC systems. The system would use various sensors like PIR, temperature, vibration, IR, and ultrasonic detectors attached to an ATMEGA16 microcontroller to detect the presence of living humans. If humans are detected, the microcontroller would send an alert message via GSM to emergency responders. The system is intended to help rescuers locate survivors more quickly and efficiently in disaster sites. It aims to be low-cost, semi-autonomous, and easy to use through software interfacing.
This document describes an Android application designed to improve women's safety. The application uses GPS and GPRS to track a user's location and schedule. If the user presses an alarm, it will send alerts including their contact details and location to relatives, police, and volunteers. The system provides a low-cost solution for real-time emergency notification using simple smartphone interfaces. It aims to address issues women face in dangerous situations where they may not have time to call for help conventionally.
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
1) The document proposes a women's safety mobile application that uses GPS, GSM, and an accelerometer to detect emergencies and send alerts and location information to emergency contacts and local police.
2) When the application detects an emergency through sensor readings or a button press, it sends alerts with the user's location to pre-defined emergency contacts and the local police station to help protect and locate the victim.
3) The proposed application aims to increase women's safety by providing an easy-to-use mobile safety tool and reducing response times in emergency situations through direct communication with local authorities.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
In Today life The Security is the most common challenging issue in the world and with such advancements happening, the security of most is the home security. Many of technology come in market For Security. In the Modern world advances in electronics and communications technologies have led to the miniaturization and improvement of the performance of computers and networking. These changes have given rise to the development of several home automation technologies and system. Surveillance can be defined as monitoring of the behaviour, other changing information,activities,observing or analysing particular area for the purpose of directing, influencing,managing or protecting. A home security system should provide safety and security features for a home by alarming the residents from natural,accidental and/or human dangers such as:flooding,fire,theft,animals invading etc. To design a software application for intrusion detection system to identify malicious activities using cloud technology.
In the last decade, the use of wireless electronic communication technology, such as mobile phones, is
fundamental to the private and professional lives of most citizens. In fact, it has become an inseparable part
of their daily lives. Nowadays, most cell phones are provided with different implanted sensors, which
measure motion, orientation, and environmental conditions such as ambient light or temperature.
Therefore, several functionalities in mobile applications need to use these sensors, as in the case of
logistics applications, social network applications or travel information applications. Hence, the primary
contribution of this work is to establish a generic meta-model, in order to show the different embedded
sensors in the smartphones, and then generate mobile applications that use various features offered by
these sensors for the case of Android OS. So as to achieve this, our approach is based on a model driven
architecture (MDA) suggested by Object Management Group (OMG), which is a variant of Model-Driven
Engineering (MDE). The MDA approach can contribute in the insurance of the sustainability of expertise,
as well as the improvement of the gain in productivity while dealing with the challenges of mobile platform
fragmentation.
In the last decade, the use of wireless electronic communication technology, such as mobile phones, is
fundamental to the private and professional lives of most citizens. In fact, it has become an inseparable part
of their daily lives. Nowadays, most cell phones are provided with different implanted sensors, which
measure motion, orientation, and environmental conditions such as ambient light or temperature.
Therefore, several functionalities in mobile applications need to use these sensors, as in the case of
logistics applications, social network applications or travel information applications. Hence, the primary
contribution of this work is to establish a generic meta-model, in order to show the different embedded
sensors in the smartphones, and then generate mobile applications that use various features offered by
these sensors for the case of Android OS. So as to achieve this, our approach is based on a model driven
architecture (MDA) suggested by Object Management Group (OMG), which is a variant of Model-Driven
Engineering (MDE). The MDA approach can contribute in the insurance of the sustainability of expertise,
as well as the improvement of the gain in productivity while dealing with the challenges of mobile platform
fragmentation
This document summarizes a research paper that proposes an accident detection system using an accelerometer, vibration sensor, GPS module, and GSM module. When an accident is detected by abnormal acceleration readings from the accelerometer and vibration sensor, the GPS module provides location coordinates and the GSM module sends an alert message with the location to emergency services. This system aims to quickly detect road accidents and alert authorities to the location to improve emergency response times and save lives, especially in remote areas where accidents may otherwise go unreported.
A new system to detect coronavirus social distance violation IJECEIAES
This document proposes a new system to detect social distance violations using a smartphone. The system uses two Android applications - one uses the phone's camera to detect faces and estimate distances during calls, and one uses voice biometrics to differentiate the user's voice from others. Both applications perform real-time processing without collecting or sharing private user data. The system aims to help prevent the spread of COVID-19 by notifying users if social distancing guidelines are violated.
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...IRJET Journal
This document describes a proposed system for detecting and preventing app misbehavior on Android devices. It begins with an overview of existing approaches to identifying "zombie" apps that run in the background without user interaction. The proposed system would design multiple applications, including an antivirus-like app to monitor for misbehaviors like sending SMS messages, draining the battery, storing call logs in the cloud, and crashing the gallery. When misbehaviors are detected, the problematic apps would be quarantined with user acknowledgment. The system is intended to efficiently monitor app permissions and resource usage to identify zombie apps and prevent unwanted activities.
Performance Analysis of Communication Protocols for Post Disaster CommunicationAM Publications,India
Natural and catastrophic disasters can cause damage to the communication system, the damage may be complete or it may be partial. In such areas communication and exchange of information plays a very important role and become difficult to happen in such situations. So, the rescue systems should be installed in those areas for the rescue operations and to take important decisions about how to make a connection from there to the outside world. Wireless communication network architecture should be setup in disaster areas for the communication to happen and to gather information. In this document, wireless ad-hoc access node network architecture has been proposed. These access nodes acts as hotspot for certain area in which they are set up such that the Wi-Fi capable devices get connected to them for communication to happen. If the mobile battery is drained in such situations wireless charging using microwave is shown in this paper. Performance analysis of the communication transport layer protocols is shown and new-SCTP algorithm is developed which shows the better results in terms of cumulative packet loss.
1) The document describes an Android app called 6'Apart that uses object detection and machine learning to analyze videos taken in crowded areas and determine if people are maintaining proper social distancing of 6 feet or more.
2) The app uses a pre-trained YOLOv3 model to detect objects and people in videos recorded by users. It then calculates the centroids of detected people and checks the distance between centroids to analyze social distancing compliance.
3) The goal is to help police and individuals determine whether an area is following social distancing guidelines as lockdowns are lifted during the COVID-19 pandemic.
1) The document describes an Android app called 6'Apart that uses object detection and machine learning to analyze videos taken in crowded areas and determine if people are maintaining proper social distancing of 6 feet or more.
2) The app uses a pre-trained YOLOv3 model to detect objects and people in videos recorded by users. It then calculates the centroids of detected people and checks the distance between centroids to analyze social distancing compliance.
3) The goal is to help police and individuals determine whether an area is following social distancing guidelines as lockdowns are lifted during the COVID-19 pandemic.
This document describes a proposed mobile application that would allow users to report hazardous objects to the appropriate authorities. The application would use the device's GPS to tag photos, videos, or audio recordings with location data. This media would then be uploaded to a central server and displayed on a map for relevant government departments to view. The goal is to create a single platform for citizens to report issues and hazards, so authorities can better understand problems and locations that require attention. Key features would include media capture, GPS integration, and displaying reported incidents on a map via the Google Maps API.
Similar to Networking smartphones for disaster recovery using teamphone (20)
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSIJNSA Journal
The smart irrigation system represents an innovative approach to optimize water usage in agricultural and landscaping practices. The integration of cutting-edge technologies, including sensors, actuators, and data analysis, empowers this system to provide accurate monitoring and control of irrigation processes by leveraging real-time environmental conditions. The main objective of a smart irrigation system is to optimize water efficiency, minimize expenses, and foster the adoption of sustainable water management methods. This paper conducts a systematic risk assessment by exploring the key components/assets and their functionalities in the smart irrigation system. The crucial role of sensors in gathering data on soil moisture, weather patterns, and plant well-being is emphasized in this system. These sensors enable intelligent decision-making in irrigation scheduling and water distribution, leading to enhanced water efficiency and sustainable water management practices. Actuators enable automated control of irrigation devices, ensuring precise and targeted water delivery to plants. Additionally, the paper addresses the potential threat and vulnerabilities associated with smart irrigation systems. It discusses limitations of the system, such as power constraints and computational capabilities, and calculates the potential security risks. The paper suggests possible risk treatment methods for effective secure system operation. In conclusion, the paper emphasizes the significant benefits of implementing smart irrigation systems, including improved water conservation, increased crop yield, and reduced environmental impact. Additionally, based on the security analysis conducted, the paper recommends the implementation of countermeasures and security approaches to address vulnerabilities and ensure the integrity and reliability of the system. By incorporating these measures, smart irrigation technology can revolutionize water management practices in agriculture, promoting sustainability, resource efficiency, and safeguarding against potential security threats.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
A review on techniques and modelling methodologies used for checking electrom...nooriasukmaningtyas
The proper function of the integrated circuit (IC) in an inhibiting electromagnetic environment has always been a serious concern throughout the decades of revolution in the world of electronics, from disjunct devices to today’s integrated circuit technology, where billions of transistors are combined on a single chip. The automotive industry and smart vehicles in particular, are confronting design issues such as being prone to electromagnetic interference (EMI). Electronic control devices calculate incorrect outputs because of EMI and sensors give misleading values which can prove fatal in case of automotives. In this paper, the authors have non exhaustively tried to review research work concerned with the investigation of EMI in ICs and prediction of this EMI using various modelling methodologies and measurement setups.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.