Professional Documents
Culture Documents
Today in the current global scenario, the prime question in every girl's mind, considering the
ever rising increase of issues on women harassment in recent past is mostly about her safety
and security. The only thought haunting every girl is when they will be able to move freely
on the streets even in odd hours without worrying about their security. This paper suggests a
new perspective to use technology for women safety. India that sees itself as a promising
super power associated an economic hub continues to be un-free within the clutches of
various paternal evils like molestations, dowry, crime against girls, worst among all is Rape.
The atrocities against the ladies are often currently dropped at associate finish with the
assistance of a tool known as “Women Safety”. This paper explains the essential plan
underlying Women Safety that is to flash a warning giving a moment location of the
distressed victim to the police in order that the incident may well be prevented and therefore
the perpetrator appreciated. This is able to facilitate scale back crime against girls. This paper
conjointly summarizes different vital works during this field and thus forth mentioned
This application designed to provide security to women main purpose of this application to
provide the awareness on the time of critical situation for women. Generally you can active
this service by clicking on alarm button. When you clicking on this button service get activate
and know whenever you click on alert it open a new window and send SMS to those contact
which you saved at the time of registration the SMS contain your message and your current
location. This application is provide deactivate service also when we fill secure this
application is mainly required correct information to fill otherwise this app will not work
correctly.
In today’s world, it is not safe for a person to travel alone at night especially for women; it
will be high time to travel alone because a woman is not highly strong as men to protect
herself from them. The good way to reduce chances in becoming a victim of violent crime
(robbery, sexual assault, rape, domestic violence) is to identify and call on resources to help
you out of unsafe situations. Whether you are in instant trouble or got separated from friends
during night and do not know to reach home, having these apps on your phone can diminish
our risk and bring assistance when we require it. In this paper, we present Sauver, an
application for smart phones working over android platform. Our motto in developing this
app is to provide a safe environment to women through smart phone as today most of the
people are carrying smart phones to wherever they go. Of course, the Delhi Nirbhaya case
has made the Government to make the laws tougher, but even though the sexual crime rate in
India have not decreased. So, it is better to take our own safety measures rather than
ethnic, religious, political, and cultural divides to promote peace. We are all aware of
importance of women’s safety, but we must realize that they should be properly protected.
Women’s are not as physically strong as men, in an emergency situation a helping hand
would be a relief for them. The best way to minimize your chances of becoming a victim of
violent crime (robbery, sexual assault, rape, domestic violence) is to identify and call on
resources to help you out of dangerous situations. Whether you’re in immediate trouble or get
separated from friends during a night out and don’t know how to get home, having these apps
on your phone can reduce your risk and bring assistance when you need it. Although several
were originally developed for students to reduce the risk of sexual assault on campus, they
are suitable for all women In the light of recent outrage in Delhi which shook the nation and
woke us to the safety issues for our daughters, people are gearing up in different ways to fight
back. A host of new apps have been developed to provide security systems to women on their
phones. Here we introduce an app which ensures the safety of women. This helps to identify
and call on resources to help the one out of dangerous situations. These reduce risk and bring
assistance when we need it and help us to identify the location of the one in danger. This app
designed to provide security to women main purpose of this app to provide the awareness on
the time of critical situation for women. When you clicking on this button service get activate
and know whenever you click on HELP BUTTON it open a new window and send SMS to
those contact which you saved at the time of registration the SMS contain your message and
your current location. This app is provide deactivate service also when we fill secure this app
is mainly required correct information to fill otherwise this app will not work correctly.
CHAPTER 2
LITERATURE SURVEY
Year: 2014.
The status of women in India has gone through many great changes over the past few
millennia. From equal status with men in ancient times through the low points of the
medieval period to the promotion of equal rights by many reformers, the history of women in
India has been eventful. In modern India, women have adorned high offices in India
including that of the President, Prime Minister, Leader of the Opposition and Speaker of the
Lok Sabha. However, women in India continue to face social challenges and are often victims
of abuse and violent crimes and, according to a global poll conducted by Thomson Reuters,
India is the fourth most dangerous country in the world for women, and the worst country for
women among the G20 countries. This paper focuses on a security system that is designed
solely to serve the purpose of providing security to women so that they never feel helpless
while facing such social challenges. The system consists of various modules such as GSM
shield (SIM 900A), Arduino ATMega328 board, GPS (GYGPS6MV2), screaming alarm
(APR 9600), a set of pressure sensors for activation and power supply unit. The Delhi
Nirbhaya case that triggered the whole nation was the greatest motivation for this system. It
2.2 Women Employee Security System using GPS And GSM Based Vehicle
Tracking.
Authors: Poonam Bhilare, Akshay Mohite, Dhanashri Kamble, and Rasika Kahane,
Year: 2015
Womens security is a critical issue in todays world and its very much needed for every
individual to be acting over such an issue.This paper describes a GPS and GSM based vehicle
tracking and women employee security system that provides the combination of GPS device
and specialized software to track the vehicles location as well as provide alerts and messages
with an emergency button trigger. The information of vehicle position provided by the device
can be viewed on Google maps. The IT companies are looking forward to the security
problem and require a system that will efficiently evaluate the problem of women employees
security working in night shifts. This paper focuses on the proposed model that can be used to
deal with the problem of security issues of women employees using GPS and GSM based
vehicle tracking.
Year: 2015
Many unfortunate incidents have been taking place in women’s case. Problems may come
from any direction such as women walking on the road after the work, going to super market
or many other reasons for which they go alone. People at home are not sure of their return
safely. Another factor is woman die without knowing the reason as they attend excursions
and industrial trips conducted by the organizations. It happens due to attacks on woman but
not suicides. In 2013 there happened an incident which is a gag rape in New Delhi in the case
of 23 year old woman in bus at 9:30 PM. Another incident that has taken place at Mumbai in
the case of woman who is leaving her native place after Christmas holidays has been
kidnapped and killed. These are some of the problems that have taken place in the day to day
life of women. In order to overcome such problems faced by women the I Safety (women
security apps) mobile based application is not only necessary to use but also plays a pivotal
Year: 2015
Self Defense System for women safety is like a Smart Watch for Women. It has the ability to
help women with technologies that are embedded into a compact device. The women wearing
this device as a watch or band, in case of any harassment or when she finds that someone is
going to harass, she presses a switch that is located on the watch or band or when the women
has fallen the information about the attack along with the body posture and location
information is sent as SMS alert to a few predefined emergency numbers And soon help is on
its way! The system will consist of embedded hardware and software co-designed for this
dedicated application. The system allows for knowing exact location of the individual, as
soon as the trigger key on the belt is pressed. By providing the instant location of the
distressed victim to the police so that the incident could be prevented and culprit
apprehended. In case if the caretaker wants to know the present location of the lady, he/she
can do so by sending a SMS to the SIM number of the lady which contains a secret password.
Then this system responds to such request by sending back a SMS containing location
information in terms of Latitude and Longitude. This would help reduce crime against
EXISTING SYSTEM
Location based service (LBS) is a mobile service that has the capability to provide real time
information based on the user's current location. Geographic Information system (GIS) is the
heart of location based services, System which has been developed will act as collection
centre, storing and supplying the geographical data for being manipulated by the application.
Data which stored at the system will be used within making the decision process. Through
this application, data will be collected to trace every unit location and every unit also can
update any additional information. GIS integrates hardware, software and data for capturing,
managing, analyzing and displaying all forms of geographically referenced information. GIS
allows us to view, understand, question, interpret and visualize data in many ways that reveal
relationships, pattern and trends in the form of globes, maps, charts and reports.
wired systems and most of them are alarming systems which is Conventional and
PROPOSED SYSTEM:
Along with alarm, user can optionally send SMS text as well
Once user is near the location, the alarm will ring and also if there is any reminder
User can see the locations on Map to find out how far he is from the expected
location.
Let the family and friends know that you are in danger and where you are? Declare an
emergency whenever you sense a danger, when you can disengage the emergency.
OBJECTIVE
The main purpose of our project is to provide safety to the women’s from the dangerous
zone. In this project we are providing facility to secure the women’s by providing GPS app
module with controller. As the women feels insecure at that time she can press the wireless
key then the GPS modules are activated .GPS will calculate the latitude and longitude co-
ordinates of that area .GSM module will send SMS which contains the latitude and longitude
co-ordinates to the numbers such as family, friends, which are already stored in the memory.
HARDWARE REQUIREMENTS
COMPONENT SPECIFICATION
SOFTWARE REQUIREMENTS
COMPONENT SPECIFICATION
Language PHP
PHP
PHP code may be embedded into HTML or HTML5 markup, or it can be used in
combination with various web template systems, web content management systems and web
the web server or as a Common Gateway Interface (CGI) executable. The web server
software combines the results of the interpreted and executed PHP code, which may be any
type of data, including images, with the generated web page. PHP code may also be executed
with a command-line interface (CLI) and can be used to implement standalone graphical
applications.
The standard PHP interpreter, powered by the Zend Engine, is free software released under
the PHP License. PHP has been widely ported and can be deployed on most web servers on
The PHP language evolved without a written formal specification or standard until 2014,
leaving the canonical PHP interpreter as a de facto standard. Since 2014 work has gone on to
PHP 7
During 2014 and 2015, a new major PHP version was developed, which was numbered
PHP7. The numbering of this version involved some debate. While the PHP 6 Unicode
experiment had never been released, several articles and book titles referenced the PHP 6
name, which might have caused confusion if a new release were to reuse the name. After a
(phpng). It was authored by Dmitry Stogov, Xinchen Hui and Nikita Popov, and aimed to
optimize PHP performance by refactoring the Zend Engine to use more compact data
benchmark suite for the phpng project, showed an almost 100% increase in performance.
Changes from phpng are also expected to make it easier to improve performance in the
future, as more compact data structures and other changes are seen as better suited for a
successful migration to a just-in-time (JIT) compiler. Because of the significant changes, the
reworked Zend Engine is called Zend Engine 3, succeeding Zend Engine 2 used in PHP 5.
Because of major internal changes in phpng, it must receive a new major version number of
PHP, rather than a minor PHP 5 release, according to PHP's release process. Major versions
of PHP are allowed to break backward-compatibility of code and therefore PHP 7 presented
breaks, including wider use of exceptions, reworking variable syntax to be more consistent
PHP 7 also introduced new language features, including return type declarations for
functions, which complement the existing parameter type declarations, and support for the
scalar types (integer, float, string, and boolean) in parameter and return type declarations.
MySQL
MySQL is an open-source relational database management system (RDBMS). Its name is a
combination of "My", the name of co-founder Michael Widenius' daughter, and "SQL", the
abbreviation for Structured Query Language. The MySQL development project has made its
source code available under the terms of the GNU General Public License, as well as under a
variety of proprietary agreements. MySQL was owned and sponsored by a single for-profit
firm, the Swedish company MySQL AB, now owned by Oracle Corporation. For proprietary
use, several paid editions are available, and offer additional functionality.
MySQL is a central component of the LAMP open-source web application software stack
(and other "AMP" stacks). LAMP is an acronym for "Linux, Apache, MySQL,
Perl/PHP/Python". Applications that use the MySQL database include: TYPO3, MODx,
Joomla, WordPress, phpBB, MyBB, and Drupal. MySQL is also used in many high-profile,
large-scale websites, including Google (though not for searches), Facebook, Twitter, Flickr,
and YouTube.
ANDROID
The Android software development kit (SDK) includes a comprehensive set of development
include computers running Linux (any modern desktop Linux distribution), Mac OS X 10.5.8
or later, and Windows 7 or later. As of March 2015, the SDK is not available on Android
Until around the end of 2014, the officially supported integrated development environment
(IDE) was Eclipse using the Android Development Tools (ADT) Plugin, though IntelliJ
IDEA IDE (all editions) fully supports Android development out of the box, and NetBeans
IDE also supports Android development via a plugin. As of 2015, Android Studio, made by
Google and powered by IntelliJ, is the official IDE; however, developers are free to use
others, but Google made it clear that ADT was officially deprecated since the end of 2015 to
Additionally, developers may use any text editor to edit Java and XML files, then use
command line tools (Java Development Kit and Apache Ant are required) to create, build and
debug Android applications as well as control attached Android devices (e.g., triggering a
Enhancements to Android's SDK go hand in hand with the overall Android platform
development. The SDK also supports older versions of the Android platform in case
developers wish to target their applications at older devices. Development tools are
downloadable components, so after one has downloaded the latest version and platform, older
Android applications are packaged in .apk format and stored under /data/app folder on the
Android OS (the folder is accessible only to the root user for security reasons). APK package
contains .dex files (compiled byte code files called Dalvik executables), resource files, etc.
The Android Debug Bridge (ADB) is a toolkit included in the Android SDK package. It
consists of both client and server-side programs that communicate with one another. The
ADB is typically accessed through the command-line interface, although numerous graphical
JAVA STANDARDS
Obstacles to development include the fact that Android does not use established Java
standards, that is, Java SE and ME. This prevents compatibility between Java applications
written for those platforms and those written for the Android platform. Android only reuses
the Java language syntax and semantics, but it does not provide the full class libraries and
APIs bundled with Java SE or ME. However, there are multiple tools in the market from
companies such as Myriad Group and UpOnTek that provide Java ME to Android conversion
services.
ANDROID STUDIO
Android Studio is the official integrated development environment (IDE) for the Android
platform. It was announced on May 16, 2013 at the Google I/O conference. Android Studio
was in early access preview stage starting from version 0.1 in May 2013, then entered beta
stage starting from version 0.8 which was released in June 2014. The first stable build was
Based on JetBrains' IntelliJ IDEA software, Android Studio is designed specifically for
Android development.[8] It is available for download on Windows, macOS and Linux, and
replaced Eclipse Android Development Tools (ADT) as Google's primary IDE for native
New features are expected to be rolled out with each release of Android Studio. The
XAMPP
XAMPP is a free and open source cross-platform web server solution stack package
developed by Apache Friends, consisting mainly of the Apache HTTP Server, MariaDB
database, and interpreters for scripts written in the PHP and Perl programming languages.
XAMPP stands for Cross-Platform (X), Apache (A), MariaDB (M), PHP (P) and Perl (P). It
is a simple, lightweight Apache distribution that makes it extremely easy for developers to
create a local web server for testing and deployment purposes. Everything needed to set up a
web server – server application (Apache), database (MariaDB), and scripting language (PHP)
equally well on Linux, Mac and Windows. Since most actual web server deployments use the
same components as XAMPP, it makes transitioning from a local test server to a live server
specified on the Apache Friends website. Their homepage header reads “XAMPP Apache +
MySQL was replaced with MariaDB on 2015-10-19 and beginning with XAMPP versions
FEATURES
XAMPP is regularly updated to the latest releases of Apache, MariaDB, PHP and Perl. It also
Joomla, WordPress and more. Self-contained, multiple instances of XAMPP can exist on a
single computer, and any given instance can be copied from one computer to another.
USAGE
Officially, XAMPP's designers intended it for use only as a development tool, to allow
website designers and programmers to test their work on their own computers without any
access to the Internet. To make this as easy as possible, many important security features are
disabled by default. XAMPP has the ability to serve web pages on the World Wide Web. A
special tool is provided to password-protect the most important parts of the package.
XAMPP also provides support for creating and manipulating databases in MariaDB and
using an FTP client. Using a program like FileZilla has many advantages when installing a
content management system (CMS) like Joomla or WordPress. It is also possible to connect
PHP is a server-side scripting language designed primarily for web development but also
1994,[4] the PHP reference implementation is now produced by The PHP Development
Team.[5] PHP originally stood for Personal Home Page,[4] but it now stands for the recursive
This paper suggests a new perspective to use technology to protect women. The system
installed in normal smart phone which when activated, tracks the location of the victim using
GPS (Global Positioning System) and sends emergency messages using GSM (Global
System for Mobile communication), to contacts. The system also incorporates a screaming
alarm that uses real-time clock, to call out for help and also generates an electric shock to
injure the attacker for self defence. The main advantage of this system is that the user can use
a Smartphone. The use of application components ensures accuracy and makes it reliable.
The system provides with all the features which will leave no stone unturned to help the
MODULES
User Module
Guardian Module
Location Module
Alert Module
In this module, user can register their accounts in their smart phones and login to the main
page of the app. The app uses one time registration so that enables fast retrieval of local
information. In the registration process, the student can upload the basic information along
with guardian details and contact number and secure authentication password for login
purpose. The login and profile details are available in centralized server. The application
regularly updates the user location and the location will be available to the guardian app.
In this module, the guardian can use separate smart phone to register for their child safety.
The login details will be simple; it does require the guardian phone number only. The Child
In this module, user location will recorded in the centralized server in regular interval of one
minute. The location usually contains the Latitude and Longitude position and the position
will be available in the Google Map API of the User App and Guardian App. For the
recording of location parameter, user must turn on Mobile Data and Location settings in their
phones.
In this module, it generates a very high volume scream in times of distress when the lungs of
a person fail in screaming in trouble. The generated scream is in a woman’s voice is severely
helpful in discouraging the potential strong trouble makers. The only work done by this
application is whenever the person pushes or touches the application, the phone screams
ARCHITECTURE DIAGRAM
USE CASE DIAGRAM
SEQUENCE DIAGRAM
ACTIVITY DIAGRAM
CHAPTER 7
SYSTEM TESTING
discover every conceivable fault or weakness in a work product. It provides a way to check
the functionality of components, sub assemblies, assemblies and/or a finished product It is the
process of exercising software with the intent of ensuring that the Software system meets its
requirements and user expectations and does not fail in an unacceptable manner. There are
various types of test. Each test type addresses a specific testing requirement.
The test process is initiated by developing a comprehensive plan to test the general
functionality and special features on a variety of platform combinations. Strict quality control
procedures are used. The process verifies that the application meets the requirements
specified in the system requirements document and is bug free. The following are the
considerations used to develop the framework from developing the testing methodologies.
Unit testing involves the design of test cases that validate that the internal program
logic is functioning properly, and that program input produces valid outputs. All decision
branches and internal code flow should be validated. It is the testing of individual software
units of the application .it is done after the completion of an individual unit before
integration. This is a structural testing, that relies on knowledge of its construction and is
invasive. Unit tests perform basic tests at component level and test a specific business
process, application, and/or system configuration. Unit tests ensure that each unique path of a
business process performs accurately to the documented specifications and contains clearly
Functional tests provide systematic demonstrations that functions tested are available as
specified by the business and technical requirements, system documentation, and user
manuals.
System testing ensures that the entire integrated software system meets requirements.
It tests a configuration to ensure known and predictable results. An example of system testing
is the configuration oriented system integration test. System testing is based on process
descriptions and flows, emphasizing pre-driven process links and integration points.
The Performance test ensures that the output is produced within the time limits, and
the time taken by the system for compiling, giving response to the users and request being
defects. The task of the integration test is to check that components or software applications,
e.g. components in a software system or – one step up – software applications at the company
User Acceptance Testing is a critical phase of any project and requires significant
participation by the end user. It also ensures that the system meets the functional
requirements.
The Acknowledgements will be received by the Sender Node after the Packets are
The Route add operation is done only when there is a Route request in need
The Status of Nodes information is done automatically in the Cache Updation process
Any project can be divided into units that can be further performed for detailed
processing. Then a testing strategy for each of this unit is carried out. Unit testing helps to
identity the possible bugs in the individual component, so the component that has bugs can be
8.1 CONCLUSION
The simulation results showed that the projected algorithmic rule performs higher with the
full transmission energy metric than the utmost range of hops metric. In today's world, many
ladies workers face the matter of security that is going down round the world particularly
across Asian country. The projected style can manage crucial problems faced by girls within
the close to past and can facilitate to unravel them with technologically sound equipment’s
and ideas. This method will overcome the worry that scares each lady within the country
Electronic technologies: The styles usually incorporate sensible functions and options.
Wearable devices like activity trackers area unit a decent example of the web of Things, since
they're a part of the network of during this project we will additional implement electrical
device (The electrical device, additionally referred to as The Gun or Beam Gun in Japanese
associate electronic light-weight gun. this may be used for the defence purpose.) And aerosol
containers are often used. wearable technology, wearable’s, trendy technology, wearable
devices, tech togs, or fashion natural philosophy area unit wear and accessories incorporating
pc and advanced physical objects or "things" embedded with natural philosophy, software,
operator and/or alternative connected devices, while not requiring human intervention.
CHAPTER 9
BIBLIOGRAPHY
Zigurd R. Mednieks
Darcey