You are on page 1of 13

Project

Proposal on
Women Safety Alert System

Tribhuvan University
Faculty of Humanities and Social Sciences
Bachelors in Computer Application

Submitted to
Department of Computer Application
Patan Multiple Campus
Patan Dhoka, Lalitpur

Submitted by
GHANASHYAM DHUNGANA
Year/part:- 2075 / Sixth Semester
University Registration Number
6-2-22-324-2018
Exam Roll Number:- 220118

Date: 2078/10/03
Contents
Introduction........................................................................................................................3

Problem Statement.............................................................................................................3

Objectives............................................................................................................................3

Methodology.......................................................................................................................4

a) Requirement Identification.................................................................................4

i) Study of Existing System....................................................................................4

ii) Literature Review................................................................................................5

iii) Requirements Analysis.......................................................................................6

b) Feasibility Study..................................................................................................7

i) Technical Feasibility...........................................................................................7

ii) Operational Feasibility.......................................................................................7

iii) Economic Feasibility...........................................................................................7

c) High level Design of system....................................................................................8

i) Methodology of proposed system.......................................................................8

ii) System Flowchart................................................................................................8

iii) Description of Algorithms................................................................................11

Gantt chart........................................................................................................................11

Expected Outcome............................................................................................................12

References.........................................................................................................................13
Introduction

Real time safety alert system is a system that is used to help the women from like
harassment, mistreat, violence and etc. There are lots of women who work at night shifts
in corporate and they feel unsafe while returning home as they travel late at night. There
are many crimes that takes places against women like are being harassed, violence,
domestic abuse, and rape. The greater part of the human nowadays carries their
smartphone with them, so these applications can be helpful for them.

This application is very user friendly and can be used with less technical knowledge.
Whenever any user feels unsafe or feels that they may be in a dangerous situation just
clicking a button can notify nearby police or he/she can get help from other users who are
close to that location. They can share their information using their QR code. To get
location Users can customize their information e.g.: that they want to share their
information and add contact of users.

Problem Statement

Women face difficult different problems like robbery, rape, harassment etc and they
suffer from unusual activities which can occur any time. Women are not safe or secure
these days and nights, In order to feel safe or secure while attacked or in difficult
condition this app is develop to send notification or message and send the location to
desire person.

Objectives

The main objectives of Real-Time Safety Alert


 To provide users with the fastest and simplest way to contact nearest help.
 To resolve the rising crime against women.

Scope
As the mechanical changes or new condition from user to improve the usefulness of item
may requires new form to present. In spite of the fact that the System is finished and
working skillfully, new modules which improve the system usefulness can be added with
no significant changes to the whole system. Among the different parts few are
recognized, which couldn't be remembered for the last augmentation because of time
requirements. In future, the development innovation makes the system progressively
powerful and dependable. As the new modules give the usefulness which upgrades the
security and accommodating in future when any issue begins in voyaging or any sort of
circumstances. As the innovation transforms, it is conceivable to update the system and
can be versatile to desired condition.
 Any further changes can be effectively flexible, in the brightness of the fact that it
depends on an object-arranged plan
 Based on future security issues, security can be improved utilizing rising
advancements.

Methodology

a) Requirement Identification

i) Study of Existing System

The existing system consists of making calls manually to the emergency contacts from
the mobile phones when the women face an uncomfortable situation. By the time she
makes the calls the opponents may become alert and may not allow her to do so. Or in the
worst case she might have to face much more worst situation. By the time the contacted
people come she might have the worst part of the situation done to her. Making the calls
manually to the emergency contacts is a drawback of the existing system. Also it takes
more time to intimate when in there is an emergency situation.
The proposed system is developed to overcome the disadvantages of the existing system
specified earlier. We can create Interactive Women Safety Security user application using
Android Mobile Application. The app developed has panic button that allows the user to
press when she is in an unfavorable situation. Pressing this button intimates to her
emergency contacts and to the nearest police station about her situation immediately. The
police can reach the spot at the earliest before any thing worse could happen.
ii) Literature Review

(Thota, 2016) In today’s world, people using smart phones individuals have expanded
quickly. Thus, an advanced mobile phone can be utilized productively for individual
secure or different other declaration purposes. The offensive event that insulted the whole
country has produce us to go for the wellbeing issues as a result a large group of new
applications have been created to give secure system to human by means of their smart
phone . This can be this app can be activated this app by a single click, whenever need
arises. A single snap on this application recognizes the area of spot through GPS and
communicates something specific involving this area URL to the enlisted contacts and
furthermore approach the principal enrolled contact to help the one in perilous
circumstances. The interesting element of this application is to send the message to the
enrolled contacts eternally for like mechanism until the "stop" button in the application is
clicked. Continuous location tracking data by means of SMS assists with finding the
location area of the victim quickly and can be rescued safely.

(Thierer, 2015) Expose features a portion of the open doors shown by the rise of the
claimed Internet of Things and the wearable innovation specifically, and urges strategy
producers to permit these advances to create. The Internet of Things and wearable tech
challenges existing social, monetary, and legitimate standards. These innovations raise
assortment of protection and wellbeing concerns. Questions emerge over specialized
measures, system operability, and access to the sufficient range to encourage remote
systems administration. Those issues are not managed here. At that point choice to top-
down guideline is to manage these worries imaginatively as they create utilizing balance
of useful activities, innovative strengthening devices, open and guard dog pressure,
industry best practices and self-regulation, transparency, and focused on requirement of
existing legitimate models (particularly torts) varying.

(Kumar M. K., 2016) This project presents a ready system for problem recognition
utilizing regular industrially accessible electronic gadgets to both identify the problem
and ready specialists. Information from the accelerometer is assessed with a few edges
based calculations and position information to decide a Problem. The edge is versatile
dependent on client gave parameters, for example, build, weight, and level of action. The
calculation adjusts to one of kind developments that a telephone encounters rather than
comparable systems which expect clients to mount accelerometers to their chest or trunk.
On the off chance that a Problem is suspected a notice is raised requiring the client's
reaction. In the event that the client doesn't react, the system cautions pre-determined
social contacts with an educational message by means of SMS. In the event that a contact
reacts the system submits a marked warning, consequently interfaces, and empowers the
speakerphone. In the event that a social contact affirms a Problem, a suitable crisis
administration is cautioned. Our system gives a feasible, financially understanding answer
for Problem location utilizing a basic graphical interface while not overpowering the
client with awkward sensors. Problem is exceptionally incredible programming
particularly produced for the wellbeing of young ladies, at whatever point someone is in a
tough situation they don't need to sit and discover contacts or discover approaches to send
short message administration, or message the close to ones. They probably won't have
such a lot of time. All that they need to do is shake the advanced cell over the limit
esteem, vivaciously. Quickly a message alert is sent to the individual's mother, father and
whoever they wish to, if their watchmen additionally have an advanced cell. Despite the
fact that in the event that it is in quiet mode. At the point when a message called ALERT
is gotten it naturally changes its profile to general, and gives a voice warning Your
Son/Daughter is in trouble PLZ HELPS… . PLZ HELP…. PLZ HELP…Over and again
AS A RING TONE until they tune in and stop it.

iii) Requirements Analysis

For this system, requirements are basically identified through functional and non-
functional requirements.

Functional Requirements.
 The system should allow user to register.
 The system should allow user to send emergency notifications.
 The system should notify user about information of the Police, Family, Friends.
Non- Functional Requirements.
Availability
The system will be available for 24 hours service as users can apply from anywhere
And at any time.
Performance
The performance of the system will be fast and accurate as it will provide fast
response to the user’s actions. The system will handle expected and unexpected errors
and also large amount of data.
Reliability
The system will be reliable as it will perform function and run without a failure and it
has to be reliable due to importance of data and damages that can be caused by
incorrect or incomplete data. [4]

b) Feasibility Study

i) Technical Feasibility

The factors for proposed project’s technical feasibility are that the basic programming
language which will be suitable for project is available and the libraries required for
project will be capable of achieving the result that we are aiming for. All the existing
resources can be used for the development and maintenance system.

ii) Operational Feasibility

This system will include all the requirements used for Women safety alert System
and this system will be completely operational and can be successfully implemented
and easy to use this system as it will be user-friendly.

iii) Economic Feasibility

The system which we are going to develop is economically feasible and cost
effective. As all the tools and resources required are either open sources or free.
After the completion of the system didn’t need to deploy any new hardware and
software as the required software and hardware. The existing resource of the system
can be used.
c) High level Design of system

i) Methodology of proposed system

This system is based on the waterfall model and is designed with the series of processes
starting with requirement gathering, design, implementation, testing and maintenance.

For this system, requirement is gathered first and then verified then design process is
carried out according to the requirement. After the design process, coding and
development part is start then after integrating the system there is testing of the system. If
testing is positive then system is implemented otherwise some maintenance is done and
system come in operation. [5]

ii) System Flowchart

The figure below is the flowchart of Women safety alert system .

Figure 1: flowchart of Women safety alert system


● Use Case Diagram
The use case diagram consists of a user who is allowed to create a user and generate
its QR code. Users are allowed to add friends or contact with other users through the
generated QR code. Users can make a panic call through tapping the button on screen.
They are also allowed to view alert messages made by other users whom they have
added on the system. The alert message consists of location, latitude and longitude of
the user who is in danger.

Figure 2: Use Case Diagram of Women Safety Alert System


● Activity Diagram

Activity diagram consists of the workflow of the system. The activity of the
system begins from creating a user and verifying a new user or not. The new
user can generate QR code and after that the user can add contacts through QR
code, tap the panic button and notify friends, view alert messages and see the
location of the user in panic.

Figure 3: Activity Diagram of Women Safety Alert System


iii) Description of Algorithms
K-NN Algorithm works on minimum distance from the query instance to the training
samples to determine K-nearest neighbors.
Usage of KNN Algorithm
 For data analysis
 In Data mining and machine learning
 Benefits of KNN Algorithm
 Ease to interpret output
 Calculation time
 Predictive Power
 KNN algorithm can also use for regression
 Problems. Only difference from the discussed
 methods will be using averages of nearest neighbors
 Instead of voting from nearest neighbors.
 It runs through the whole data set computing between and each training
observation. We’ll call the K points in the training data that are closest to the set .

Working of K-NN Algorithm in this Project


 Step 1: Define the K value i.e. we are finding only your nearest neighbor.
 Step2: Now assume any random set of location values for all users.
 Step3: Read each location value that stored in database.

 Step4: Take person location coordinate .i.e. current position of attacked person.
 Step5: Compare person current position with the k value i.e. values stored at
database.
 Step6: Using Euclidean distance formula calculate the most nearest person
position for help
 Step7: Find the appropriate location to help the person in emergency situation.

Gantt chart
The system which we are going to develop will be completed within scheduled time
and will not exceed the scheduled time.
Expected Outcome

This project focuses on providing secure to users which include location-based services.
Human security is a critical and social issue in today’s world. The crime (abuse, robbery,
sexual assault, rape, domestic violence) against the women can be now brought to an end
with the help of real system implementation of the proposed model. This app is user-
friendly for humans. Whenever humans are in danger position he/she uses this app and
alert their contacts and send their location. By simple touch, it sends the location to their
contact and an alert message “need your help” to saved contact.
References
2016. : <https://www.researchgate.net/publication/ 325037320_Security_
Assessment_Methodology_for_Mobile_Applications> [Accessed 14 March
2020].
Canvas Solutions, I., 2014. Safe Work Method Statement App | Gocanvas.
[online] Gocanvas.com. Available at: <https://www.gocanvas.com/mobile-
forms-apps/3259-Safe-Work-Method-Statement> [Accessed 14 March
2020].
Issuu. 2016. Sauver An Android Application For Women Safety. [online]
Available at: <https://issuu.com/ijteee/docs/sauver-an-android-application-
for-w> [Accessed 14 March 2020].
Nevon Projects. 2020. Android Women Safety App Project With Source Code,
Project Report, PPT. [online] Available at:
<https://nevonprojects.com/android-women-safety-app/> [Accessed 14
March 2020].
Paradkar, A., 2015. All In One Intelligent Safety System For Women Security”.
pp.Volume 130 – No.11,.
X, T., 2020. The Best Women Safety Apps [2020]. [online] MobileAppAaily.
Available at: <https://www.mobileappdaily.com/2018/03/15/best-women-
safety-apps> [Accessed 14 March 2020].
Yarrabothu, R., 2015. An Android App For The Safety Of Women.

Kumar, M. K. (2016). Women and childern Safety alert. 3.

Kumar, R. (2015). Woman Safety Alert System. Mumbai,India.

Naik, A. (2016). SMART GIRLS SECURITY SYSTEM.

P.Kalyanchakaravarthy. (2016). Human Safety System. Pune,India.

Pawar, V. (2014). SCIWARS Android Application for Women Safety. Nasik


India.

Poonam Bhilare, A. M. (1- jan- 2015). Women Employee Security System


using GPS And GSM Based Vehicle Tracking.

You might also like