Professional Documents
Culture Documents
com
By
Madeeha Saeed
(16-Arid-712)
Supervised by
RAWALPINDI
2020
Abuse Prevention App
By
Madeeha Saeed
(16-Arid-712)
Supervised by
(BSCS)
RAWALPINDI
2020
I
Dedicated to my beloved parents, Teachers, Seniors, and Dr.
Yaser Hafeez, for their endless support, affection, trust, and
encouragement and to all those, whose prayers always paved
the way to success for us.
II
PROJECT IN BRIEF
III
ACKNOWLEDGMENT
I can't thank enough ALLAH THE ALMIGHTY, who let us complete our project on time
while 2020 has been so unkind and abrupt for us in so many ways. It was way too tough
for all of us; students & teachers both to stay on the track while in lockdown due to the
COVID-19 pandemic. Meanwhile, I are grateful to our parents, seniors, and teachers for
all the support, encouragement, guidance, and motivation to complete our project on time,
regardless of all the discreteness of the times.
I would like to thank our supervisor Dr. Yaser Hafeez, who continuously guided us on
zoom classes and discussed with us all the ups & downs of the development, which I had
been facing since lockdown has been declared. It would have been impossible for us to
keep our FYP Coding journey continued while in lockdown without any stimulus or
guidance, but Sir Yaser kept us on the path by giving his guidance 24/7.
Last but not the least, I would like to thank all the faculty members of UIIT; especially
Dr. Kashif Sattar for his work and help during this hard time, He managed to save our
year from getting wasted and given his support to all the final year students who had been
stuck elsewhere and was not able to continue their academic activities due to so many
reasons. He came up with suitable planning for all the students differently and did not let
any student stay behind in the race of development. I just cannot thank enough for his
services as a Final Year Project Coordinator and I owe him my whole FYP. Without him,
it would not have been possible.
Madeeha Saeed
(16-ARID-712)
IV
DECLARATION
I hereby declare that this project, neither whole nor as a part has been copied out from
any source. It is further declared that I have developed this project and accompanied the
report entirely based on our efforts. If any part of this project is proved to be copied out
from any source or found to be a reproduction of some other. I will stand by the
consequences. No portion of the work presented has been submitted of any application
for any other degree or qualification of this or any other university or institute of learning.
Madeeha Saeed
(16-ARID-712)
V
CERTIFICATION
It is certified that the contents and form of the project entitled “Abuse Prevention App”
submitted by Madeeha Saeed (16-ARID-712) has been found satisfactory for the
requirements of
Supervisor: ________________________
Examiner 1: ________________________
Examiner 2: ________________________
Dated: ________________________
Administrator: ________________________
Dr. Yaser Hafeez
VI
ABSTRACT
Women’s security is a critical issue in today’s world and it’s very much needed for every
individual to be acting over such an issue. Our App, “Abuse Prevention App” provides
Realtime self-defense to the user by giving an option of “Alerts”, which uses in-built GPS
& GSM of an android device and sends a distress message with a user’s current location
to the 2 contacts selected by a user. Nowadays due to recently happened cases such as
rape by drivers or colleagues, burglary, etc., women's security has been compromised.
The system uses the Global Positioning System (GPS) technology to find out the location
of women & also uses GSM (Global System for Mobile) to access mobile’s inbuilt
messenger to send alerts to the prospects with the usage of user’s mobile sim. The
prospects will receive a distress message along with user’s (fine) current location; Which
will look like this: “I'm in danger. HELP! My location is: http: // maps. google. com
/?q=33.7112448,73.0751833”. Then, the user’s location provided by the device can be
viewed on Google maps using the Internet or specialized software from an app store i.e.
Google Maps/Foursquare. Our app will be the ultimate tool to deal with the problem like
women security for women working in night shifts and traveling alone, etc.
VII
TABLE OF CONTENTS
ACKNOWLEDGMENT ................................................................................................ IV
DECLARATION ............................................................................................................. V
CERTIFICATION .......................................................................................................... VI
ABSTRACT................................................................................................................... VII
TABLE OF CONTENTS.................................................................................................. 2
INTRODUCTION .......................................................................................................... 12
Chapter 2 ........................................................................................................................ 19
Chapter 3 ........................................................................................................................ 27
3
3.1.7 Self-Defense Guide/Awareness ....................................................................... 32
Chapter 4 ........................................................................................................................ 46
After Mid-Term........................................................................................................... 47
4
4.1.4. Milestone 4 ..................................................................................................... 47
Chapter 5 ........................................................................................................................ 56
5
Chapter 6 ........................................................................................................................ 58
Chapter 7 ........................................................................................................................ 63
Chapter 8 ........................................................................................................................ 66
6
USER GUIDE ................................................................................................................. 66
REFERENCES ............................................................................................................... 80
7
LIST OF FIGURES
8
Figure 3.5.3: Login Activity Diagram ............................................................................ 42
9
Figure 8.10.5: 05 UI ........................................................................................................ 76
10
LIST OF TABLES
11
Chapter 1
INTRODUCTION
Women’s security is a critical issue in today’s world and it’s very much needed for every
individual to be acting over such an issue. Our App, “Abuse Prevention App” provides
Realtime self-defense to the user by giving an option of “Alerts”, which uses in-built GPS
& GSM of an android device and sends a distress message with a user’s current location
to the 2 contacts selected by a user. Nowadays due to recently happened cases such as
rape by drivers or colleagues, burglary, etc., women's security has been compromised.
The system uses the Global Positioning System (GPS) technology to find out the location
of women. Then, the user’s location provided by the device can be viewed on Google
maps using the Internet or specialized software from an app store. Our app will be the
ultimate tool to deal with the problem like women security for women working in night
shifts and traveling alone, etc.
Our primary goal is to ensure every woman in our society to feel safe and secured. The
core aim is to provide safety to women from sexual abuse and crime by using Information
technology. The project idea is to have a software/Information technology layer between
women and her circle. User does require to have a Smart Phone having GPS and 2G/3G
internet and a mobile sim (GSM).
12
1.4. PROJECT SCOPE
Currently, few systems provide the functionality of Abuse prevention but these systems
have many issues, which prevent them from being ideal apps for users. There is no proper
fully automated mobile application that is user-friendly up to the level that a layman user
can operate it without having any prior knowledge. The process of sending alert to
selected associates is either too slow or gives errors on different operating systems.
Secondly, they don’t aware users about how they should deal with security invasion, or
how they can reduce the probability of abuse. Such a security alert systems for females
are in lag due to buggy coding and imprecise algorithms.
13
1.6. PROPOSED SOLUTION
Instead of the internet, GPS tracking systems have been used for tracking one’s locations
and GSM technology has been used for sending security alerts. It is simple and easy to
use and equipped with various functionalities. The app is built to intimidate the instant
location and a distress message to 2 to 3 family members or close friends and the pre-set
numbers, so that unfortunate incident can be averted and to provide real-time evidence
for the action against the perpetrators of crime against women. Later on, as the technology
emerges, it is possible to upgrade the system and can be made adaptable to the desired
environment because it is based on object-oriented design, any further changes can be
easily adaptable. Based on future security issues, security can be improved using
emerging technologies e.g. a microcontroller, sensor, fiber optics, etc. Moreover, the
application will be made easier to use for all the women and have been made in a normal
budget. This application would be free for the user or won’t be inexpensive, anyway.
14
1.7.PROPOSED SYSTEM COMPONENTS
The user will use the “Alert” option to send a distress message & current location link to
the 3 selected associates and the sent message can be seen in the in-built message app of
the user’s phone. Rest, profile, current location, and self-defense guide can be seen on the
android app’s “HOME” page.
We have used agile methodology for the development of our project as our requirements
were constantly changing. The agile model helped us to change our requirement
specifications easily as per need. Our project was developed in incremental, rapid cycles
and we had a weekly meeting with our supervisor and in each meeting, changes were
discussed and new features were added or removed based on the supervisor’s opinion.
15
Figure 1.9.1: Agile Development Cycle
i) Java
16
1.11. DELIVERABLES AND DEVELOPMENT REQUIREMENTS
The idea came from women's safety as a whole. The basic approach is to intimidate the
instant location and a distress message to 2 to 3 family members or close friends and the
pre-set numbers, so that unfortunate incident can be averted and to provide real-time
evidence for the action against the perpetrators of crime against women. The user has to
register herself and allow GPS to use her location and click on the “Alert” button to send
a distress message along with location to her selected associates.
Every day, women are assaulted, molested, and violated on the streets of their cities.
Violence against women happens all over the world, particularly in developing countries
like Pakistan. This violence can take many forms: physical, sexual, or psychological.
Physical assault on women involves the use of force to injure or endanger them. So, the
aim of this project, therefore, is to effectively build a strong platform for women
empowerment in our society. We endeavored to achieve this by creating a mobile
application that:
17
• Has a straightforward user interface for speedy use
• Ensures the alert message is sent to the trusted people
• Allows the user to activate said alert discreetly
• Monitors locations where crises are taking place and reports the same to the
trusted people (who in turn notify the user’s emergency contacts)
Beforehand, many women safety apps have been built all over the world including
Eyewatch SOS for Women, Shake2Safety, Trakie, My SafetyPin, Circle Of 6, etc.
The whole chapter describes the basic functionality and literature review of the project.
This whole project is based on women's safety and security. Where women can use this
app to save themselves from any unwanted security invasion on time. The entire
discussion is about the issue of the present-day and past day about abuse prevention
against women.
18
Chapter 2
REQUIREMENT ANALYSIS
The specifications are used to specify the requirements for the initial implementation of
the system and update the system in the future. The software requirement specification
bridges the gap between client/user and the system developer. This is the document that
describes the user needs accurately.
This system compromises an Android Operating System, using Java has a core language,
with Android SDK has its latest version, Implementation of the Front end is done by XML
and we have used Firebase i.e. Cloud NoSQL Database for storing user data, the
documentation of this system is done using MS-Office 2019.
19
Most other platforms are described as a combination of hardware and operating
system. The Java platform has two components: The Java Virtual Machine (Java
VM) and The Java Application Programming Interface (Java API) Java VM is the
base for the Java platform and is ported onto various hardware-based platforms.
The Java API is a large collection of ready-made software components that
provide many useful capabilities, such as graphical user interface (GUI) widgets.
The Java API is grouped into libraries (packages) of related components. The
following figure of Java Structure depicts a Java program, such as an application
or applet, that's running on the Java platform. As the figure shows, the Java API
and Virtual Machine insulate the Java program from hardware dependencies. As
a platform-independent environment, Java can be a bit slower than native code.
However, smart compilers, well-tuned interpreters, and just-in-time byte code
compilers can bring Java's performance close to that of native code without
threatening portability.
Java Program
Java API
Hardware
Figure 2.1.1: Java Structure
20
Implementation of the Front end is done by XML. Extensible Markup Language
(XML) is used to describe data. The XML standard is a flexible way to create
information formats and electronically share structured data via the public
Internet, as well as via corporate networks.
Media support for common audio, video, and still image formats (MPEG4, H.264,
MP3, AAC, AMR, JPG, PNG, and GIF).
2.1.6 MS Office
The system shall allow the user to register using a unique user id and password.
The system shall provide the facility of adding personal information. On the
registration page, a user will be able to enter the user details; this would contain
details such as Name of the user, email address of the user, and password. These
details are saved by clicking on the save button. It has been designed by keeping
all the constraints in mind like the username should not contain special characters
and should only be written in English alphabets, and the email-id is set using a
standard email-id format, if a user enters some wrong format or misses @ or .com
then it flashes an error.
21
2.2.2 Alerts
The system shall send alerts to family and friends in case of an emergency.
The system shall provide some self-defense techniques to women for future
harassment problem management and also can apply them on spot.
The system should provide the facility of a location tracking system. Immediately
send the location of the victim to the family members or friends. The GPS
information (GPS information can be in the form of the Co-ordinates or the URL
which leads to the location of the person any stock map application in the likes of
third-party application like Google, Nokia, etc.) to the registered contacts at danger
times or when the person is needed to be rescued. This step is followed only when
the alert button is pressed in an application. The whole process of this step is done
only when the device is connected to the proper mobile network, GSM Technology
i.e. usage of installed sim and location service in the device is switched on (GPS).
22
2.2.6 Peer-To-Peer Architecture
The app will be using P2P Architecture. In a peer-to-peer architecture the nodes
self-configure into an integrated network using distributed control, and the
connection between any two nodes in the network consists of one or more peer-to-
peer communication links. Wi-Fi Direct allows two devices to establish a direct,
peer-to-peer Wi-Fi connection without requiring a wireless router. Wi-Fi becomes
a way of communicating wirelessly, like Bluetooth. Wi-Fi Direct is similar in
concept to “ad-hoc” Wi-Fi mode. The Wi-Fi peer-to-peer (P2P) APIs allow
applications to connect to nearby devices without needing to connect to a network
or hotspot.
23
2.3.1 Usability
2.3.2 Reliability
Our project is reliable for every type of user and it will require an android device.
The project will be calibrated with a standard device to make the tracking system
reliable.
2.3.3 Integrity
Only the system developer has the right to make any changes to the system.
2.3.4 Performance
The efficiency of any system is concerned with the minimum processing time as
well as the optimal use of the system resources is designing the proposed system.
The efficiency factor has been taken well into consideration.
2.3.5 Speed
The system should process the given input into output within an appropriate time.
The software should be user friendly. Then the customers can use it easily, so it
doesn’t require much training time.
2.3.7 Reliability
The rate of failures should be less then only the system is more reliable.
2.3.8 Portability
24
2.4 EXTERNAL INTERFACE REQUIREMENTS
The load time for user interface screens shall take no longer than five
seconds.
25
2.6.1 DB Management System: Cloud-based database
The problem of the women safety is increased rapidly in this environment, so we have
made an effective Android application to prevent such type of suspicious or natural
disaster, by alerting the concerned authorities using the android mobile phone, which
helps to stop such type of illegal activates and to trace the concern.
In this chapter, we came to know about the performance, efficiency, and accuracy of the
project that either project is fast, efficient, and useful in saving the suspect from the
security breach, harassment, invasion in personal space, and women safety. Features like
GPS/GSM will be used to improve the efficiency and performance of this system and the
whole output of the system will be good.
For future enhancements, this mobile application can be helpful in future when any
problem arises in traveling or any kind of situations, e.g. as the technology emerges, it is
possible to upgrade the system and can be adaptable to the desired environment because
it is based on object-oriented design, any further changes can be easily adaptable. Plus, it
is based on future security issues, security can be improved using emerging technologies.
26
Chapter 3
SOFTWARE DESIGN
3.1.1 Registration
Actor:
User
Pre-condition:
Postcondition:
Use case:
Description:
3.1.2 Login
Actor:
User
Pre-condition:
27
Postcondition:
Use case:
Description:
After the user account is created user can log in through the app.
28
3.1.3 Alerts
Actor:
User
Pre-condition:
Postcondition:
Use case:
Description:
Alerts will be constituted of “Distress Message & Location Link” of the user, would be
sent to selected associates.
Actor:
Pre-condition:
Postcondition:
29
The app will ask for permissions regarding “Allow your GPS” from the user and the user
has to allow to let the app do its work later on. It will only be asked for the first time when
the user will install an app and runs it.
Use case:
Description:
The app will send location links to selected associates upon user’s click on the “Alert”
button.
Actor:
Pre-condition:
Postcondition:
The App will ask for permission to access contacts from the phone book.
30
Use case:
3.1.6 Profile
Actor:
User
Pre-condition:
Postcondition:
Use case:
31
3.1.7 Self-Defense Guide/Awareness
Actor:
User
Pre-condition:
Postcondition:
Use case:
32
3.2. USE CASE DIAGRAM
A use case diagram captures the actors and the role or functions they perform in the
system. There are three actors which include; User, GPS Tracker, and User’s Phone Book.
33
3.3. CLASS DIAGRAM
34
3.4. SEQUENCE DIAGRAMS
3.4.1. Registration
35
3.4.2. Alerts
36
3.4.3. Maps
37
3.4.4. Self-Defense Guide/Awareness
38
3.4.5. Profile
39
3.5. ACTIVITY DIAGRAMS
40
3.5.2. Alerts Activity
41
3.5.3. Login Activity
42
3.6. COMPONENT DIAGRAM
Component diagrams are different in terms of nature and behavior. Component diagrams
are used to model the physical aspects of a system.
43
3.7. DEPLOYMENT DIAGRAM
44
3.8. COLABORATION DIAGRAM
In this chapter detailed description of project requirements related to its working. Here
we define the all working component that we use in this project and diagrams description
which specifies how the project is working. Each diagram defines each working unit of
the project.
45
Chapter 4
PROJECT MANAGEMENT
4.1. MILESTONES
Milestones are tools used in project management to mark specific points along a project
timeline. These points may signal anchors such as a project start and end date, or a need
for external review or input and budget checks. In many instances, milestones do not
impact project duration. In other words, it is a management tool that is used to delineate
a point in a project schedule.
Before Mid-Term
4.1.1. Milestone 1
● Proposal discussion with faculty: Proposal discussed with faculty about its scope
and how the development will go.
4.1.2. Milestone 2
● Functional requirements: This is the phase where we’ve identified all the
functional requirements of our project.
4.1.3. Milestone 3
● Use case diagram: Use case diagram of the project was developed.
● Fully dressed use cases: Fully dressed use cases were documented.
● Submitted for review: Use case diagram was submitted to the supervisor for
review.
46
● Approval of use case diagram and fully dressed use cases.
After Mid-Term
4.1.4. Milestone 4
4.1.5. Milestone 5
4.1.6. Milestone 6
4.1.7. Milestone 7
4.1.8. Milestone 8
● Coding Done.
47
4.1.9. Milestone 9
● Testing of interfaces.
4.1.10. Milestone 10
4.1.11. Milestone 11
All the project deliverables are listed below with the date.
Deliverable Date
48
Code Review June 25, 2020
In this part of the project, the operations are tested whether they are fulfilling the fixed
objectives or not. The system can perform multiple operations with the good response
time.
Madeeha Saeed __
49
Equipment
Laptop Group
Android Phone __
Windows 10 Pro
MS Office 2016
Hardware UIIT
Absent __
Division of responsibilities
Individual Responsibility
50
4.5. RISK MANAGEMENT
Risk Management is all about managing the risks that can probably occur in the project.
The existence of risks in any project is normal but how they are controlled is more
important. They must be handled efficiently to increase the worth of the project. All the
possible situations should be kept in mind because the knowledge level of every user
could be dissimilar. If the risk is not handled correctly it might happen very intolerable to
the user, so this is a very significant phase of the project. Risk Management is about:
● Designing and implementing the process by which that risk can be minimized.
51
2. Android App Not Low High System Crash/
Working Android App not
working failure
chances.
52
Priority #No. Name Responsible Risk Response
Person/Source Mitigation
Action
High 1. Internet Connection Internet Itself User’s It will be
Fails Mobile Data ensured that
Initiation before using
the app or if
the user has an
intention to
use the app,
then internet
availability is a
must-have.
High 2. Android App Not Software Software The bugs will
Working Testing be fixed out in
the testing
period to
ensure no
software crash
in future.
3. Gesture/Emergency Algorithm - -
Trigger
High 4. Distress Message Software Software The bugs will
Testing be fixed out in
the testing
period; ensures
no software
crashes in the
future.
53
High 5. GPS/GSM Internet Mobile Data Re-
establishing
Internet
connection.
6. Messages without Algorithm - -
input
7. Battery User/Device - -
In this chapter, first, we assigned a milestone to our project per our project analysis. We
also provided a very short description of each milestone of our project from requirement
gathering to the project testing phase. After assigning milestones to our project, we
prepared a project closeout report, in the short deliverables of our project. We provided
each deliverable of our project with the time to be delivered. Then, we covered the
operation and the management plan phase. In this phase, we described how our project
can be managed to perform well and how to detect errors and maintain them for future
purposes. Also, we described the proper functioning of the project. After this, we describe
54
the important resources which are used in our project and which can affect these
resources. We covered almost all the important resources that we are going to integrate.
In the second phase of this chapter, we described risk management, how it is important
to each project, and how we can handle all the risk which can occur in our project. So, to
do this, first, we analyzed the risks which may occur in our project. We described each
risk factor that may occur after doing risk analysis. After this, we described the risk
response factor in our project which tells about the risk information.
55
Chapter 5
PROJECT IMPLEMENTATION
We are using Java as a programming language in android studio to do all the necessary
tasks and operations that are required to achieve the proposed solution of our project. We
have used Android version 3.6.3 and API level 29 to develop our application.
5.2. FRAMEWORK
Criterion Description
56
Space for Android SDK At least 1 GB for Android
SDK, emulator system
images, and caches
Android studio
This chapter captures the design architecture of the project, the language, and other
different tools used to develop this project. It describes the functionality of the framework
which we are using in this project. Also, it describes the hardware and software
requirements of the project along with their working.
57
Chapter 6
SOFTWARE TESTING
After completion of each phase, verification was done. To verify the requirements the
completed phase was fully tested. Against the requirement, all the units were found to be
completely satisfactory. As the system should be verified at each stage of the software
process using documents produced during the previous stage. Therefore, we started
verification with the requirements reviews and continued through design and code review
for product testing. This is an activity to verify whether we have built the system right or
not in the development life cycle.
The following elements are required to support the overall testing effort at all levels.
6.2.1. Software
● Window 10 Pro
● Android studio
● Microsoft word 2019
● Edraw Max V9.4
6.2.2. Hardware
Specific testing is a plan for every test level to test all system components. The procedure
is designed in detail so that the system meets all user requirements.
58
● Permitting Mobile’s Sim to send messages via GSM.
The goal of unit testing is to separate each part of the program and show that the
individual parts are correct. Unit testing provides a strict, written contract the piece
of code must satisfy. As a result, it affords several benefits. Unit testing allows the
programmer to refactor code at a later date, and make sure the module still works
correctly. This encourages the programmer to make changes to the code. Unit testing
will be done for the following units:
Testing the GPS on so that application can send a location to selected associates and
also updates the current location of the user.
Testing that mobile’s sim is permitted by the user to access the message app and
distress messages.
System testing involves the set of tests that the entire system performs according to
specification.
59
● Integrate whether Alerts have been sent to selected associates
● Integrate whether the that mobile’s sim is permitted by the user to access the
messaging app and send distress messages.
● Integrate application show sent messages in the app and delivery status is shown.
A system is evaluated under normal conditions in all previous testing techniques, and
so conditions where can fail tested. Stress testing evaluates the system under abnormal
conditions.
Madeeha Saeed
Tested By:
Unit Testing
Test Type:
Test1
Test Case Number:
Sending Alert
Test Case Name:
Items To Be Tested
Specifications
Expected Output/Result
Input
60
Clicking “Alerts” Button 1. Alert sent to emergency contacts in
1.
case of harassment or abuse.
Madeeha Saeed
Tested By:
Unit Testing
Test Type:
Test2
Test Case Number:
Sending Location
Test Case Name:
Items To Be Tested
Specifications
Expected Output/Result
Input
Setting Mobile GPS On by 1. GPS Set On & Current Location
1.
Tapping On “Allow” Pop UP Can Be Shown on Maps.
61
6.5.2. Test Case 3: GSM Activation
Madeeha Saeed
Tested By:
Unit Testing
Test Type:
Test3
Test Case Number:
GSM Activation
Test Case Name:
Specifications
Expected Output/Result
Input
Clicking the “Alerts” button. 1. Alert sent to emergency contacts in
1.
case of harassment or abuse and
sent messages can be seen in the
mobile’s messages app.
This chapter is about testing the different phases of the project. We have tested our app
by using different testing processes like Unit testing, Integrated testing, System testing,
etc.
62
Chapter 7
7.1. DISCUSSION
The idea came from women's safety as a whole. The basic approach is to intimidate the
instant location and a distress message to 2 to 3 family members or close friends and the
pre-set numbers, so that unfortunate incident can be averted and to provide real-time
evidence for the action against the perpetrators of crime against women. The user has to
register herself and allow GPS to use her location and click on the “Alert” button to send
a distress message along with location to her selected associates.
Every day, women are assaulted, molested, and violated on the streets of their cities.
Violence against women happens all over the world, particularly in developing countries
like Pakistan. This violence can take many forms: physical, sexual, or psychological.
Physical assault on women involves the use of force to injure or endanger them. So, the
aim of this project, therefore, is to effectively build a strong platform for women
empowerment in our society.
Beforehand, many women safety apps have been built all over the world including
Eyewatch SOS for Women, Shake2Safety, Trakie, My SafetyPin, Circle Of 6, etc.
7.2. CONCLUSION
Before starting development, we have planned the abstract about how our app should look
alike. We opted to follow the agile model for the app's development. Right after, our
proposal had been accepted, we started working on XMLs and made them in three phases;
in first phases, we asked our supervisor to rate them and after that, we changed them
according to our aesthetics, keeping in mind it is about women's safety, so we kept making
interface according to feminine themes, so the ideas should be glimpsed on the first look.
Later on, during the coding phase, we changed XMLs bit more to sync them up with the
android OS.
We used broadcast receiver coding for sending messages along with GSM technology,
GPS to track location using Foursquare Google Maps API, and Firebase i.e. Cloud-based
63
NoSQL database to maintain user data. Our app will give Realtime functioning including,
an awareness which shows self-defense guide to the user to learn self-defense on the spot,
Alert option to send distress messages along with location link to the selected
associates/emergency contacts, shows updated current location of the user while user
using the app and also give a user-profile show to the user as well.
Firstly, the user has to register herself and then should log in. After login, the user will be
asked to give permissions regarding access to Mobile's GPS and GSM, where the user
has to tap “Allow”. After that, the user can click "Alert" Button to send alerts i.e. distress
message saying "I'm in danger. HELP! My Location is: (Location Link)" to the
emergency contacts. The sent message can be seen in the mobile's messages app. Users
must have internet and sim with a significant balance to let this work. Moreover, users
can learn self-defense through awareness option, can see current location through app,
view & edit profile, and can signs out as applicable.
7.3. LIMITATIONS
The project we have developed is made keeping in mind that it would not only be unique
of its kind but also it would be helpful in real-life. The stimulus came from lots of bad
news coming daily about rapes and kidnappings of kids and women. The app is made by
using object-oriented design, so it can be improved later on. Our app might have some
tasteless designing or buggy coding at some point, as it was our first time learning the
development of an android app and it is also the first version as well. I have tried our best
to make it up to the mark, though, some problems may exist.
• Java Programming
64
7.4. FUTURE WORK
Our project can later be used as a big project for women's safety at a national level. The
period was about 12-14 months to complete this project for one person alone, as, I learned
these tools and technologies during this tenure. Many features can be added to this project
which I’ve been unable to do because of lack of time. Future work can be done on
improving the app by adding more vulnerable options like sending distress alerts to the
nearest police station or adding multiple sirens to alert people in the surrounding. Also,
more services can be added according to the need of time.
65
Chapter 8
USER GUIDE
66
8.2. SIGNUP SCREEN
67
8.4. APP LAUNCH PAGE 02
8.5. ALERTS
68
8.6. PROFILE SCREEN
69
8.8. MAPS SCREEN
70
8.9. INTRO SLIDERS SCREENS
71
Figure 8.9.3: Slider 03 UI
72
Figure 8.9.5: Slider 05 UI
73
8.10. AWARENESS SCREENS
Figure 8.10.1: 01 UI
Figure 8.10.2: 02 UI
74
Figure 8.10.3: 03 UI
Figure 8.10.4: 04 UI
75
Figure 8.10.5: 05 UI
Figure 8.10.6: 06 UI
76
Figure 8.10.7: 07 UI
77
Figure 8.11.2: GPS UI
78
LIST OF ABBREVATIONS
Database-as-a-service (DBaaS)
79
REFERENCES
[1] https://tribune.com.pk/story/1348833/93-pakistani-women-experience-sexual-
violence/
[2] http://www.ijcstjournal.org/volume-5/issue-2/IJCST-V5I2P51.pdf
[3] https://pdfs.semanticscholar.org/2e31/148a2fe83d60faeb0c2bafa5d540d79c5a7
8.pdf
[4] http://ijarcet.org/wp-content/uploads/IJARCET-VOL-5-ISSUE-3-725-729.pdf
[5] ROGER S. Pressman, “Software Engineering: A Practitioner's Approach”,
SEVENTH EDITION McGraw-Hill International edition, Page No.1-888, 2010
[6] WOMEN’S SECURITY, Android App developed by AppSoftIndia,
December17, 2013
[7] Suraksha, A device to help women in distress: An initiative by a student of ITM
University Gurgaon, efytimes.com, 2013.
[8] https://www.researchgate.net/publication/287201587_Abhaya_An_Android_Ap
p_For_The_Safety_Of_Women
[9] Ajit, Arjun, A Software Engineering Project on Women Safety-Information
System Development, 10.13140/RG.2.1.4850.3449, 2016
[10] ttps://www.researchgate.net/publication/297549148_A_Software_Engine
ering_Project_On_Women_Safety-Information_System_Development
[11] https://projectworlds.in/android-projects-with-source-code/women-
safety-app-android-project-source-code/
[12] https://www.kashipara.com/project/android/1670/women-safety-app
[13] https://appsagainstabuse.devpost.com/submissions/4900-circle-of-6
The End
80