Professional Documents
Culture Documents
ABSTRACT
This project describes about a smart intelligent security system for women. Women all over
the world are facing much unethical physical harassment. This acquires a fast pace due to lack of a
suitable surveillance system. Our project is a venture to resolve this problem. We are using two
objects wrist band and spectacles that are used in day to day life. The system resembles a band on
the wrist incorporated with pressure switch as an input which when activates shows the result
Screaming alarm and tear gas mechanism are imposed for self-defensing purpose and send location
and messages to the emergency contacts and also figure out the attacker using live streaming video.
Tear gas mechanism and live streaming video using webcam is incorporated in the spectacles that
act as a weapon of the smart technology. We really believe that this endeavor will make a difference
in the women life.
Key words: Women Security, Live Streaming Video, GSM, GPS, ARMV7-A, Raspberry pi 2.
In 2009, some manufacturers introduced While ARM Holdings does not grant the
netbooks based on ARM architecture CPUs, in licensee the right to resell the ARM
direct competition with netbooks based on architecture itself, licensees may freely sell
Intel Atom. According to analyst firm IHS manufactured product such as chip devices,
iSuppli, by 2015, ARM ICs may be in 23% of evaluation boards and complete systems.
all laptops. Merchant foundries can be a special case; not
ARM Holdings offers a variety of licensing only are they allowed to sell finished silicon
terms, varying in cost and deliverables. ARM containing ARM cores, they generally hold
Holdings provides to all licensees an the right to re-manufacture ARM cores for
integratable hardware description of the ARM other customers.
core as well as complete software ARM Holdings prices its IP based on
development toolset (compiler,debugger, perceived value. Lower performing ARM
software development kit) and the right to sell cores typically have lower licence costs than
manufactured silicon containing the ARM higher performing cores. In implementation
CPU. terms, a synthesizable core costs more than a
SoC packages integrating ARM's core designs hard macro (blackbox) core. Complicating
include Nvidia Tegra's first three generations, price matters, a merchant foundry that holds
CSR plc's Quatro family, ST-Ericsson's Nova an ARM licence, such as Samsung or Fujitsu,
and NovaThor, Silicon Labs's Precision32 can offer fab customers reduced licensing
MCU, Texas Instruments's OMAP products, costs. In exchange for acquiring the ARM core
Samsung's Hummingbird and Exynos through the foundry's in-house design
products, Apple's A4, A5, and A5X, and services, the customer can reduce or eliminate
Freescale's i.MX. Fabless licensees, who wish payment of ARM's upfront licence fee.
to integrate an ARM core into their own chip Compared to dedicated semiconductor
design, are usually only interested in acquiring foundries (such as TSMC and UMC) without
a ready-to-manufacture verified IP core. For in-house design services, Fujitsu/Samsung
these customers, ARM Holdings delivers a charge two- to three-times more per
gate netlist description of the chosen ARM manufactured wafer. For low to mid volume
core, along with an abstracted simulation applications, a design service foundry offers
model and test programs to aid design lower overall pricing (through subsidisation of
integration and verification. More ambitious the licence fee). For high volume mass-
customers, including integrated device produced parts, the long term cost reduction
manufacturers (IDM) and foundry operators, achievable through lower wafer pricing
choose to acquire the processor IP in reduces the impact of ARM's NRE (Non-
synthesizable RTL (Verilog) form. With the Recurring Engineering) costs, making the
synthesizable RTL, the customer has the dedicated foundry a better choice.
ability to perform architectural level Companies that have designed chips with
optimisations and extensions. This allows the ARM cores include Amazon.com's Annapurna
designer to achieve exotic design goals not Labs subsidiary, Analog Devices, Apple,
otherwise possible with an unmodified netlist AppliedMicro, Atmel, Broadcom, Cypress
(high clock speed, very low power Semiconductor, Freescale Semiconductor
consumption, instruction set extensions, etc.).
(now NXP Semiconductors), Nvidia, NXP, virtualization requirements for the non-
Qualcomm, Renesas, Samsung Electronics, secure operation of the CPU.
ST Microelectronics and Texas Instruments. Thread mode (ARMv6-M, ARMv7-M,
CPU modes: ARMv8-M): A mode which can be
specified as either privileged or
Except in the M-profile, the 32-bit ARM unprivileged, while whether Main Stack
architecture specifies several CPU modes, Pointer (MSP) or Process Stack Pointer
depending on the implemented architecture (PSP) is used can also be specified in
features. At any moment in time, the CPU can CONTROL register with privileged
be in only one mode, but it can switch modes access. This mode is designed for user
due to external events (interrupts) or tasks in RTOS environment but it's
programmatically. typically used in bare-metal for super-
loop.
User mode: The only non-privileged Handler mode (ARMv6-M, ARMv7-M,
mode. ARMv8-M): A mode dedicated for
FIQ mode: A privileged mode that is exception handling (except the RESET
entered whenever the processor accepts an which are handled in Thread mode).
FIQ interrupt. Handler mode always uses MSP and
IRQ mode: A privileged mode that is works in privileged level.
entered whenever the processor accepts an Instruction set:
IRQ interrupt.
Supervisor (svc) mode: A privileged The original (and subsequent) ARM
mode entered whenever the CPU is reset implementation was hardwired without
or when an SVC instruction is executed. microcode, like the much simpler 8-bit
Abort mode: A privileged mode that is 6502processor used in prior Acorn
entered whenever a prefetch abort or data microcomputers.
abort exception occurs. The 32-bit ARM architecture (and the 64-bit
Undefined mode: A privileged mode architecture for the most part) includes the
that is entered whenever an undefined following RISC features:
instruction exception occurs.
System mode (ARMv4 and above): The Load/store architecture.
only privileged mode that is not entered by No support for unaligned memory
an exception. It can only be entered by accesses in the original version of the
executing an instruction that explicitly architecture. ARMv6 and later, except
writes to the mode bits of the CPSR. some microcontroller versions, support
Monitor mode (ARMv6 and ARMv7 unaligned accesses for half-word and
Security Extensions, ARMv8 EL3): A single-word load/store instructions with
monitor mode is introduced to support some limitations, such as no guaranteed
TrustZone extension in ARM cores. atomicity.
Hyp mode (ARMv7 Virtualization Uniform 16× 32-bit register file
Extensions, ARMv8 EL2): A hypervisor (including the program counter, stack
mode that supports Popek and Goldberg pointer and the link register).
quarter to one-third of the 68000) and There are 3 GPIO banks on BCM2835.
from (like most CPUs of the day) not
including any cache. This simplicity Each of the 3 banks has its own VDD input
enabled low power consumption, yet pin. On Raspberry Pi, all GPIO banks are
better performance than the Intel 80286. A supplied from 3.3V. Connection of a GPIO
successor, ARM3, was produced with a 4 to a voltage higher than 3.3V will likely
KB cache, which further improved destroy the GPIO block within the SoC.
performance.
A selection of pins from Bank 0 is available
RASPBERRY PI: on the P1 header on Raspberry Pi.
The idea behind a tiny and affordable
computer for kids came in 2006, when GPIO PADS
Eben Upton, Rob Mullins, Jack Lang and
Alan Mycroft, based at the University of The GPIO connections on the BCM2835
Cambridge‘s Computer Laboratory, package are sometimes referred to in the
became concerned about the year-on-year peripherals datasheet as "pads" - a
decline in the numbers and skills levels of semiconductor design term meaning "chip
the A Level students applying to read connection to outside world".
Computer Science. There was a situation
where computers had become so The pads are configurable CMOS push-pull
expensive and kids couldn’t learn the output drivers/input buffers. Register-based
programming and experimentation. control settings are available for
This page expands on the technical features of All GPIOs revert to general-purpose inputs on
the GPIO pins available on BCM2835 in power-on reset. The default pull states are also
general. For usage examples, see the GPIO applied, which are detailed in the alternate
Usage section. When reading this page, function table in the ARM peripherals
reference should be made to the BCM2835 datasheet. Most GPIOs have a default pull
ARM PeripheralsDatasheet, section 6. applied.
Localisation:
This resource explains how to install a
Setting up your Pi to work in
Raspberry Pi operating system image on an
your local language/timezone.
SD card. You will need another computer with
an SD card reader to install the image.
Default pin configuration:
CONTENTS:
RASPBIAN OPERATING SYSTEM: Raspbian Select the drive letter of the SD card in
is the recommended operating system for the device box. Be careful to select the
normal use on a Raspberry Pi. Raspbian is a correct drive; if you get the wrong one you
free operating system based on Debian, can destroy the data on your computer's
optimised for the Raspberry Pi hardware. hard disk! If you are using an SD card
Raspbian comes with over 35,000 packages: slot in your computer and can't see the
precompiled software bundled in a nice format drive in the Win32DiskImager window,
for easy installation on your Raspberry Pi. try using an external SD adapter.
Raspbian is a community project under active Click Write and wait for the write to
development, with an emphasis on improving complete.
the stability and performance of as many Exit the imager and eject the SD card.
Debian packages as possible.
tree: /usr/bin/tree
sudo apt-get install tree
Typing this command should inform the user UNINSTALLING A PACKAGE WITH
how much disk space the package will take up APT
and asks for confirmation of the package
installation. Entering Y (or just hitting Enter, REMOVE
as yes is the default action) will allow the
installation to occur. This can be bypassed by You can uninstall a package with apt-get
adding the -y flag to the command: remove:
sudo apt-get install tree -y
sudo apt-get remove tree
Installing this package makes tree available The user is prompted to confirm the removal.
for the user. Again, the -y flag will auto-confirm.
Tree is a command line tool which provides a You can also choose to completely remove the
visualisation of the directory structure of the package and its associated configuration files
current directory, and all it contains. with apt-get purge:
the attacker physically and on other side, the ISSN:2319-4847 Volume 3, Issue 4, April
camera is fixed to visualize the live streaming 2014
video. [3] “electronic device for women safety”-
Times of India, Sep 15 2013
In Parallel, the location along with the
[4] Self defence system for women with
messages is sent to emergency contacts. The
location tracking and SMS alerting through
received persons open the IP which is fixed to
GSM network-B.Vijaylashmi, Renuka.S,
the emergency contacts to view the live Pooja Chennur, Sharangowda. Patil
video, so that this will be helpful to get the International Journal of Research in
right justice for the victim. Engineering and Technology(IJRET) eISSN:
2319-1163 | pISSN: 2321-7308 Volume: 04
it is the observed that the image of the Special Issue: 05
emergency contacts that shows a message
[5] Reardon, op. cit., “Feminist Concepts of
“I’m in Danger save me” along with the
Peace and Security,” p. 139
location which is tracked through GPS
receiver. This will alert the emergency [6] https://www.raspberrypi.org
contacts through which help can be received [7] G.Masario,M.Torchiano and M.Violante,
easily to the victim. it is observed that the An in-vehicle infotainment software
image of live streaming video is captured architecture Based on Google Android, IEEE
along with IP address. The IP address is International Symposium on Industrial
already fixed to the contact list. Embedded Systems 2009, 8-10 July 2009, pp.
VII. CONCLUSIONS 257-260
The paper presents designing about the critical [8] NMEA Data.
issues faced by women at present days and http://www.gpsinformation.org/dale/nmea.htm
will help to solve them technologically with l.
compact equipment and ideas. Using wrist [9] AT commands:
band and spectacles, the mechanisms like tear http://www.develpershome.com/sms/atComan
gas release, screaming alarms, live streaming dsIntro.asp
video and also alerting the emergency contacts
[10]
by sending the messages with the location.
en.wikipedia.org/wiki/Global_Positioning_Sys
This system can overcome the fear that scares
tem
every woman in the country about her safety
and security [11] Dr. Aditi Jain and Ms. Shivani Gambhir.
REFERENCES Socio-Economic Women Empowerment:
[1] Embedded systems by jack G. ganssle Sharp Focus, International Journal of
Advanced Research in management, 6(1),
[2] Smart girls security system-Prof. Basavaraj
2016, pp. 38–49.
Chougula, Archana Naik, Monika Monu,
Priya Patil and Priyanka Das,International [12] D.Shanthi Revathi and Dr. Jayasree
Journal of Application or Innovation in Krishnan. Problems and Opportunities of
Engineering & Management (IJAIEM) Women Entrepreneurs Faced in the
Globalized Economy, International Journal of
management, 3(1), 2012, pp. 77–81.