You are on page 1of 4

Advancement of Computer Technology and its Applications

Volume 3 Issue 1

An Android Application for Women Security Management


Hemapriya S.*1, Jay Sri C.2, Suruthi B.3, Auxilia Osvin Nancy V4
1,2,3
UG Scholar, 4Assistant Professor,
Department of IT
S.A. Engineering College, Chennai, India
*Corresponding Author
E-Mail Id: hemadevpriya@gmail.com

ABSTRACT
In today’s world, even though there are so many economic developments in our country, but
crimes against women are equally raising. Since we cannot travel with them all the time,
though it is necessary that they need protection. It is predictable that every single one of them
is having smart phones with them. So this application is to provide security through smart
phones. This paper presents women security an Android Application for the Safety of Women
and this app has so many features like a call is sent on a single shake and message is also
sent to the emergency contacts with the present location of the person in trouble.

Keywords: XML, JAVA, android, SDK (software development kit), AVD emulator, firebase
database, authentication, real time database, notification, layout, recycler view

INTRODUCTION statistics, it is found that every two out of


In this fast moving world, Women three women have suffered trauma in the
Security is a major issue of concern. We last year. According to the survey of
have come across so many unfortunate women, it is found that women are losing
incidents happening with women and the their confidence because of such incidents.
rate is rapidly increasing day by day. By the survey of Central government’s
Women these days are working women Women and Child Development
and the globalization has made us aware of Department, around 80% of the women in
gender equality. Earlier there were so national capital have fear regarding their
many restrictions for women and the major own and others’ lives. There is no time and
belief was that they were only meant for place for women getting harassed because
household chores. With the changing as we have seen every now and then, the
scenario, women are paving paths for news and reports are really of concern.
themselves and proving that they are not Even if it is day or night, young or old
less than anyone. We can see women every single women is getting harassed.
going to great success levels in all fields, Actually women kind of lost their faith in
may it be corporate, scientific, education, police officials, if not it are decreasing as
business or any other field. Safety of the crime scenes are increasing and when
women matters very much whether at the criminals get unpunished it makes no
home or outside the home or even in the sense to trust the government. There is a
working place. In recent times there were tremendous need to understand and resolve
so many crimes evolving against women this problem of women safety so that they
especially the case in Hyderabad was very can grow like men. It is a personal safety
dreadful and fearful. Because of such product designed to guard you and your
crimes, women safety has become a major friends for 24/7. It is user-friendly
topic and it has become a major trouble for application and can be accessed by anyone
girls in facing the world. According to the who has installed it in their smart phones.

HBRP Publication Page 1-4 2020. All Rights Reserved Page 1


Advancement of Computer Technology and its Applications
Volume 3 Issue 1

Our intention is to provide you with fastest data entered is assured with absolute
and simplest way to ask for help. The basic security. Then the registered user can enter
approach (single click) is to convey the five contact to get in contact with at the
instant location and a distress message to time of emergency, after that the final step
the registered emergency numbers, so that of registration is done with an OTP
unfortunate incident can be averted and to verification(to check if the number given
provide real time evidence for the action by the user is in use or not). Here the
against the committers of crime. This can details given by the user at the time of
also help the police to reduce the crime registration is stored in the cloud database.
rate against women and the evidence can Once the registration process gets
be used for tracing the culprits. This completed a screen is displayed which
application helps to take preventive consists of two buttons which are PANIC
measures as soon as possible during: and DEACTIVATE button. On clicking
 Being stalked while moving. the panic button a text message is sent to
 Attempt of physical or sexual assault. the registered contacts with the GPS
 Unsafe neighbors. location of the user, stating that the person
 Domestic violence. is in trouble and in need of help. When the
other button is clicked it comes out and
EXISTING SYSTEM gets to the registration page. Where the
There are various number of applications user might meet to reregister in order to
designed for the safety of women when use the application. If the user is in a very
they are in emergency situation. The dangerous situation where she might not
disadvantages of using these applications have enough time to open the application
are they only send the alert messages to the and click on the panic button. At that time
saved contacts but there is no option of a single shake of the mobile phone is
calling. Because of previous systems there enough, a call is sent to the police. This is
is less possibilities of overcome the the whole working procedure of the
threatening situations of women. Previous proposed system.
applications also have GPS tracking
system for to track the live location of Authentication
women but it has not specific range. In the Authentication feature in firebase lets only
existing system there is no image the authorized users to access the
capturing feature, it should create many application. Firebase provides login
problems for them and the no safety through Phone Number, and also it allows
mechanism to protect the girls from the the developer to customize their own
inappropriate activities. In addition, in the authentication.
existing system there is no alert
mechanism, it should be done by manually Real-time Database
only. Database in firebase is a cloud-based
database and does not need SQL queries to
PROPOSED SYSTEM store and retrieve data. Database is highly
In this system, an Android Application is reliable thus even if connection is lost the
used to find the location and send the data is maintained.
location to the group of people that are
stored in the emergency contact list. Storage
Initially it gets the name and the number of Firebase also provides storage facility. It
the user then it asks for personal details for can store and retrieve various content like
the purpose of registration, in which the images, videos and audio directly from
client SDK. Uploading and downloading is

HBRP Publication Page 1-4 2020. All Rights Reserved Page 2


Advancement of Computer Technology and its Applications
Volume 3 Issue 1

done in the background. Data stores are "FEMME". This device is concerned with
safe and secure that only the authorized the security system, specially designed for
user can access it. women in distress. They use radio
frequency signal detector to detect hidden
Messaging cameras.
It is a cross-platform messaging solution
that lets us dependably convey messages at Design and Implementation of Women
zero expense. We can inform a customer Safety System Based On IoT
that new email or other information is
Technology
accessible to sync. We can send
U Jaishree Vidhya, T Pradheepa, K
notification messages to drive user re-
engagement and maintenance. Ragapriya –April 2019[3]
This covers descriptive details about the
Notifications design and implementation of "Smart
It enables destination user notifications for band". The device consists of a trigger,
mobile app developers and the services are microcontroller (ATmega2560), GSM
freely available. module (SIM900), GPS module (Neo-
6M), IoT module (ESP-12E), Neuro
Hosting Stimulator, Buzzer and Vibrating Sensor.
Hosting of this particular application is In this project, when a woman senses of
done by the admin. And every single feels that she is in danger she has to hold
activity is monitored and hosted by the ON the trigger of the device. Once the
admin. The update and retrieval of the device is activated, it tracks the current
information is processed through a secure location using GPS and sends emergency
medium. On deactivation the admin makes message using GSM to the registered
sure that the details of the registered mobile number and nearby police station.
number is removed completely.
A Study Based On Women Security
RELATED WORKS System
Advance Woman Security System based
A Vaibhav, Ashish Manusmare -August
on Android
Kavita Sharma, Anand More, May 2017[4]
2016[1] An unconventional method is proposed for
This android application is based on women security that may serve as a better
security “An Android Application for alternative to rest of the available security
Women's Security that provides the methods. Here the system is designed
combination of GPS devices as- well-as around Arduino micro-controller that uses
alerts message with an emergency button GPS, watch, shockwave generation circuit
to Trigger. Whenever somebody is in and an accelerometer for better security.
trouble, they only have to press volume
key button after that a alert message is sent Smart security system for women based
to Register Contact list and a Voice Call to on Internet of Things
the Number registered first and sends a G C Harikiran, Karthik, Suhas Shirol –
message “I AM IN TROUBLE PLEASE November 2016[5]
HELP ME”. Humans can't respond competently in
critical situations, the need for a device
Women Safety Device and Application- which automatically senses and rescues the
FEMME victim is the venture. They propose to have
Pavithragunasekaran- March 2016[2] a device which is the combination of other
The atrocities against the women can be devices, hardware comprises of a
brought to an end with the help of this removable “Smart band” which

HBRP Publication Page 1-4 2020. All Rights Reserved Page 3


Advancement of Computer Technology and its Applications
Volume 3 Issue 1

continuously be in contact with Smart REFERENCES


phone that is provided with the internet. 1. Sharma K., More A. Advance Woman
This generates a signal which is sent to the Security System based on Android.
smart phone. The application has access to May 2016
the tracking and Messaging services which http://www.ijirst.org/articles/IJIRSTV
is pre-programmed or assigned in such a 2I12183.pdf
way that whenever it receives emergency 2. Pavithragunasekaran. Women Safety
signal, it can send help request along with Device and Application-FEMME.
the location to the registered contacts. March 2016
https://www.researchgate.net/publicati
CONCLUSION on/299404936_Women_safety_device
The women security system application _and_application-FEMME
through smart phones is the helpful tool to 3. Vidhya U.J., Pradheepa T., Ragapriya
have self-defense for women. There are K. Design and Implementation of
many chances available to reduce crimes Women Safety System based on IoT
against molestation, kidnapping, Technology. April 2019
harassments, murder etc. Communication https://www.ijrte.org/wp-
through GPS technology is as of now is content/uploads/papers/v7i6s3/F10353
the smartest way to ensure the safety of 76S19.pdf
women. In future to have legal process the 4. Vaibhav A, Manusmare A. A Study
location information can be retrieved from Based On Women Security System.
the admin’s account in order to process the August 2017. http://ijsetr.org/wp-
legal procedure to get the culprits arrested. content/uploads/2017/08/IJSETR-
The proposed design will deal with the VOL-6-ISSUE-8-1241-1243.pdf
issues by keeping the women’s security as 5. Harikiran G.C., Karthik, Shirol S.
the major concern. This implementation of Smart security for women based on
the Android Application is to ensure the Internet of Things.
safety of women. November 2016.
https://www.researchgate.net/publicati
on/311252681_Smart_security_soluti
on_for_women_based_on_Internet_of
_Things

HBRP Publication Page 1-4 2020. All Rights Reserved Page 4

You might also like