You are on page 1of 15

A Project Report On

ANDROID APPLICATION: Women Security Application and wearable device

Submited by
PRANALI KHARE (SS16IF006)
SHWETA BHOSALE (SS16IF010)
SONALI SARAMBALE (SS16IF017)
KIRAN GAYKAR (SS16IF020)

SUBJECT : -

Software Testing & Quality Assurance

INFORMATION TECHNOLOGY DEPARTMENT


GOVERNMENT POLYTECHNIC,MUMBAI
MUMBAI 400051
2018-2019
Contents
1 Abstract

2 Introduction
3 Main Body Of Project

4 System Design
4.1 Flow Chart . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

5 Description Of Working

6 Testing
6.1 Unit Testing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
6.2 Integration Testing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
6.3 System Testing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
6.3.1 Security Testing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
6.4 Performance Testing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
6.5 Usability Testing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
6.6 Compatibility Testing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
6.7 Acceptance Testing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
6.8 Dummy Test Cases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

7 GUI

8 Conclusion
Chapter 1: Abstract

In our Country, even though it has super power and an economic development, but still there are many
crimes against women. The atrocities against the women can be brought to an end with the help of our
product “P$K”. This device is a security system, specially designed for women in distress. Method/Analysis:
Using ARM controller for the hardware device is the most efficient and it consumes less power.We
analysed that there are no security device for our total safety.
The user has to carry multiple devices. We found an ALL-IN-ONE security device which has all the features
in one click. Now-a-days women harassment is increasing and women and children safety is a big question
mark. To overcome this problem, this paper explores the IOT concepts such as measuring the body
temperatures, heart beat rates/pulse rates by sensors to monitor their conditions and alerts nearby
location police station or relatives. Since, there are some web or mobile applications for women safety and
emergencies, it does not work at all situations. The lady cannot stay on the gadget at all the time. Instead,
she could be monitored by wearing smart watches, etc.
It could be accessed by wireless technologies like GPS, GSM, GPRS, and Wi-Fi and monitored by nearby
devices. Applications/Improvements: In this paper we used ARM controller and android application in
which both the device and the smart phone are synchronized using Bluetooth, hence both can be triggered
independently. We can record audio for further investigation and can give an alert call and message to the
pre-set contacts with the instant location every 2 minutes and can be tracked live using our application.
Hidden camera detector is also a distinct feature using which we can ensure our privacy.
Chapter 2: Introduction
Introduction of our “P$K” is a security device specially designed for women in emergency and in distress. It is
simple and easy to use and carry with various functionalities. Current scenario from the media shows that
women are facing lot of troubles and they are not secure in untimed situation. Meanwhile, women are working
equal to men like an IT Techie, Doctor, Engineer, Business women, Police, nurse, teacher, Army, Air forces, etc.,
When they are leaving alone, they may face the problems like robbery, rape and murder or harassment, etc.
Crime against women:
a) Domestic violence:
Bass beat, Kick, Biting, Shove, Preventive, Circumstances, Push back,Throwingobjects.
b) CriminalViolence:
Intimidation, Sexual Abuse, Control and domineering, Rape,Seizure, Kidnapping and Slay, Acid Attack.
c)Social Violence:
Eve-teasing, Might Wife/Daughter law to go for feticide etc…
To overcome these type of women security issues and ensures their safety some mechanisms are need in the
society.This paper illustrates how the IOT (Internet-Of-Things) technology is used to provide women safety.The
numbers of smart phone users are turning into greater in amount all over the world. A smart phone has many
applications which is useful to people in which our “P$K” will become one of those. It is a personal safety product
designed to keep you and your friends safe 24/7. It is packed with features for both everyday safety and real
emergencies, making it an ultimate tool for all. This user-friendly application can be accessed by anyone who has
installed it in their smart phones as well as who has our device. Our intention is to provide you with fastest and
simplest way to contact your nearest help. The basic approach (single click) is to intimidate the instant location and
a distress message to the cops and the preset numbers, so that unfortunate incident can be averted and to provide
real time evidence for the action against the perpetrators of crime against women This device can help police
department to reduce the crimes, which are against women and the evidence can be used to trace the crime.
“P$K” is a guide, which aids people to take preventive measures as soon as possible during:
• Being stalked while walking.
• Attempted physical or sexual assault.
• Unsafe neighbours.
• Domestic violence.
Chapter 3: Main Body Of Project

The main aim of our project is to create an application and a small device which can be
useful for women safety. Women safety has been a big concern and it has been the most
important duty of every person. There is no chance of the welfare of the world unless the
condition of the women is improved. So we have made a application which name is PSK .
This application is made in android.
Our main admin panel where all the data will be stored in PHP sql database . Every module
data like the registeration,login,trusted people , unsafe ,safe….etc
Chapter 4: System Design

4.1 Flow Chart –


Chapter 5: Description Of Working
We are dicuss a concept of a Smart Wearable Device for Women Saftey.Bacically we are creating a product
which would be actually be a braclet or ring which could be connected to software.It would consist of button
which when pressed during panic mode will notify a family member or other trusted people which function is
given in app and it will also send a location to a trusted people.it will also send a msg near by police station.of
that victim.
The further, thing is about this if we dosent have a product then also we can use a software by Drawing a
Letter in a your mobile Screen through which it will work as function that specific above . There will be a 2 help
button were first help button will be
Chapter 6: Testing
6.1 Unit Testing –
A Unit is a smallest testable portion of system or application which can be compiled, liked, loaded, and executed. This kind of
testing helps to test each module separately. The aim is to test each part
of the software by separating it. It checks that component are fulfilling functionalities or not. This kind of testing is performed
by developers.

How we have done-

In our project there are many modules(units), first we created units of basic functionalities, feedbacks,trusted people and rate
us
After creating the modules, we tested each modules separately which is nothing but unit testing. The main objective was to
see whether all the desired functionalities are met or not. This type of testing is very easy and useful when are application has
lot of units. Testing every unit is beneficial because we concentrate on each and every unit which also improves the reliability,
efficiency, security etc.

The purpose is to validate that each unit of the software performs as designed.

After testing each individual units in the program the next step is to do integration. Unit testing is always done before
integration testing.

6.2 Integration Testing-


Integration means combining. For Example, In this testing phase, different software modules are combined and tested as a
group to make sure that integrated system is ready for system testing.

Integrating testing checks the data flow from one module to other modules. This kind of testing is performed by testers.

Although each software module is unit tested, defects still exist for various reasons like

 A Module, in general, is designed by an individual software developer whose understanding and programming logic
may differ from other programmers. Integration Testing becomes necessary to verify the software modules work in
unity.
 Interfaces of the software modules with the database could be erroneous
 External Hardware interfaces, if any, could be erroneous
 Inadequate exception handling could cause issues.

How we have done?-


After testing the individual units our now job is to combine all the units and test them together. We combined all the units of
basic functionality, feedbacks,trusted people and rate us. After combining the units , we tested them to see if they are
producing any defects or errors. Integration testing gives an idea about how our system will look like, it uncovers more
errors than the unit testing.We have done integration testing with the sandwich approach which is the combination of both
the top down and bottom up approach.

6.3 System Testing-


System Testing is the testing of a complete and fully integrated software product. Usually, software is only one element of a
larger computer-based system. Ultimately, software is interfaced with other software/hardware systems. System Testing is
actually a series of different tests whose sole purpose is to exercise the full computer-based system.

How we have done?-


 We tested the fully integrated applications including external peripherals in order to check how components interact
with one another and with the system as a whole. This is also called End to End testing scenario.
 Verify thorough testing of every input in the application to check for desired outputs.
 Testing of the user's experience with the application.

While doing system testing we did-

6.3.1 Security testing-


Security testing attempts to verify that the protection mechanisms built in the system will protect it from improper
penetration.

We tested our application against all the possible security measures. Like while we login into the system, and after that when
we logout and click the back button it should provide the user with the login page again rather than providing again the
logged-in application.

6.4 Performance testing-


We did performance testing to ensure that the output of the application is given within the time. Our main aim was to
measure the Response time, Throughput and utilization. During performance testing we had make sure that all the functions
of the system is giving their respective time easily and within less time.

6.5 Usability testing-


We have done usability testing by give our application to small set of target end users so that they expose usability defects.
During usability testing we ensured that our application can be used easily by the users, it provides flexibility in handling
controls and the our system meets its desired objectives.

6.6 Compatibility Testing-


Since our application is an android based application it is compatible on both the mobile devices of android .During
compatibility testing we ensured that our application works on different hardware, operating systems, network environments
or mobile devices. We also ensured that our application is backward and forward compatible with the previous and new
versions that will be coming into the market.

6.7 Acceptance Testing-


It is a phase of software development in which we tested our software by making it available to the intended audience. We
took the experiences of the early users and made the final changes before showing to our guide. It allows the users to ensure
that their needs are satisfied. We did both the types of testing that is the alpha and beta. In the alpha testing we tested the
application at our site and in the beta testing we provided the beta version to our classmates and juniors to use and give the
feedback
6.8 Test Cases –

Sr.No Test case test case Pre- steps Expected Actual output Result
id specification Condition output
1 #TC1 Test if user is User must be 1)Enter valid Display Toast Display Toast pass
able to login register Username and message" User message"
successfully already password has Succesfully User has
2)Click on Login" Succesfully
login/submit Button Login"

2 #TC2 Test if user User must 1)Enter Invalid Display Toast Display Toast pass
not able to not be Username and message" Failed message"
login register password Occured" Failed
successfully already 2)Click on Occured"
login/submit Button

3 #TC3 Test if user is User must 1)fill all the fields Display Toast Display Toast pass
able to not be properly. message" message"
register register Register Register
successfully already succesful" succesful"

4 #TC4 Test if user User must 1)enter Invalid inputs Display Toast Display Toast pass
not able to not be message" Failed message"
register register Occured" Failed
successfully already Occured"

5 Test if help user must be 1)click on help button Display toast Display toast pass
button work login message"Notific message"Noti
properly or ationand text ficationand
not message send text message
succesfully" send
succesfully"

6 #TC6 Test if user must be 1)click on help button Display toast Display toast pass
second help login message"Notific message"Noti
button work ationand text ficationand
properly or message send text message
not succesfully" send
succesfully"

7 #TC7 Test if user mustbe 1)click onnavigatrion Display toast Display toast pass
trusted login and bar->Trusted people message"Contac message"Con
people are have a 2)click on Add ts add tacts add
added or not permissionto contacts sucessfully" sucessfully"
access 3)select a contact
contacts 4)click Add

8 #TC8 Test if maps user must be 1)click on Alert map should be map will be pass
is open or login and Notification show show
not when data
click on alert connectionsh
Notification ould be on

9 #TC9 Test if user must be 1)click on Alert Google maps Google maps pass
Google maps login and Notification should be open will be open
is open or data 2)Click on Google view
not when connectionsh
click on alert ould be on
Notification

10 #TC10 Test if a user must be 1)click on alter display a Display a pass


location is login and notification (correct) Location
trace or not data 2)Click on Google view location
connectionsh 3)click on red marker
ould be on
GPS should
be on

11 #TC11 Test if user must be 1)click on help button trusted people Trusted pass
trusted login and should get a people get
people get data text msg aText msg
text msg or connectionsh
not ( -- in ould be on
Trouble) GPS should
be on

12 #TC12 Test if Safe user must be 1)click on navigatrion Display toast Display toast pass
button work login and bar-> I m safe message"Notific message"Noti
properly or data 2)click on safe button ationand text ficationand
not connectionsh message send text message
ould be on succesfully" send
GPS should succesfully"
be on

13 #TC13 Test if user must be 1)click on navigation Trusted people Trusted pass
trusted login and bar-> I amSafe get aText msg people get
people get data 2)click on safe button aText msg
text msg or connectionsh
not ( I m ould be on
safe) GPS should
be on

14 #TC14 Test if police user must be 1)click on Second help police should be police get a pass
get a trouble login and button get a trouble trouble msg
msg or not data msg and user and user
connectionsh location location
ould be on
GPS should
be on
15 #TC15 Test if police user must be 1)click on navigation police should be police get a pass
get a safe login and bar-> I amSafe get a safe msg safemsg and
msg or not data 2)click on safe button and user user location
connectionsh location
ould be on
GPS should
be on

16 #TC16 Test if user must be 1)click on navigation display toast display toast pass
feedback login bar-> feedback msg "feedback msg
option work 2) write Feedback succesfully "feedback
properly or 3)click on send button send" succesfully
not send"

17 #TC17 Check if data Database 1)Enter info in Data added in Data added in pass
stored in DB and Register page. your databnase. your
when user application databnase.
suucesfully connected to
register. same same
network.

18 #TC18 Test if mobile and 1)mobile bluetooth display toast display toast pass
buletooth is hardware paired with hardware msg "bluetooth msg
connected to buletooth bluetooth is connected" "bluetooth is
hardware or should be connected"
not ON

19 #TC19 Test if mobile and 1)click on hardware a notification a notification pass


hardware is hardware push button and msg should and msg send
work buletooth be send
properly or should be
not with connected
software

20 #TC20 Test if rate user must be 1)click on navigation display toast display toast pass
us option login bar-> rate us msg "rate 2.5"(a msg "rate
work 2) click on stars points) 2.5"(a points)
properly or
not
Chapter 7: GUI
Chapter 8: Conclusion
Our primary goal of this project is to ensure every woman in our society to feel safe and secured. According
to the survey in India 53% of working women are not feeling safe - Women is working in night shift
(Bangalore-56%, Chennai-28%, Hyderabad-35%, Mumbai-26%). In Overall 86% of working women in India,
women facing hurdles are high in Delhi, Mumbai, Hyderabad, Kolkata and Pune comparatively to other
places. P$K can play a major role by providing women a safe environment in all situations for example (
physical threatened, harassed, robbery, stalked). Implementing real time application and a device, we can
solve the problems to an extent.