You are on page 1of 28

ABSTRACT

Today in the current global scenario, the prime question in every girl's mind, considering the

ever rising increase of issues on women harassment in recent past is mostly about her safety

and security. The only thought haunting every girl is when they will be able to move freely

on the streets even in odd hours without worrying about their security. This paper suggests a

new perspective to use technology for women safety. India that sees itself as a promising

super power associated an economic hub continues to be un-free within the clutches of

various paternal evils like molestations, dowry, crime against girls, worst among all is Rape.

The atrocities against the ladies are often currently dropped at associate finish with the

assistance of a tool known as “Women Safety”. This paper explains the essential plan

underlying Women Safety that is to flash a warning giving a moment location of the

distressed victim to the police in order that the incident may well be prevented and therefore

the perpetrator appreciated. This is able to facilitate scale back crime against girls. This paper

conjointly summarizes different vital works during this field and thus forth mentioned

Women Safety device during a larger details.


CHAPTER 1
INTRODUCTION

This application designed to provide security to women main purpose of this application to

provide the awareness on the time of critical situation for women. Generally you can active

this service by clicking on alarm button. When you clicking on this button service get activate

and know whenever you click on alert it open a new window and send SMS to those contact

which you saved at the time of registration the SMS contain your message and your current

location. This application is provide deactivate service also when we fill secure this

application is mainly required correct information to fill otherwise this app will not work

correctly.

In today’s world, it is not safe for a person to travel alone at night especially for women; it

will be high time to travel alone because a woman is not highly strong as men to protect

herself from them. The good way to reduce chances in becoming a victim of violent crime

(robbery, sexual assault, rape, domestic violence) is to identify and call on resources to help

you out of unsafe situations. Whether you are in instant trouble or got separated from friends

during night and do not know to reach home, having these apps on your phone can diminish

our risk and bring assistance when we require it. In this paper, we present Sauver, an

application for smart phones working over android platform. Our motto in developing this

app is to provide a safe environment to women through smart phone as today most of the

people are carrying smart phones to wherever they go. Of course, the Delhi Nirbhaya case

has made the Government to make the laws tougher, but even though the sexual crime rate in

India have not decreased. So, it is better to take our own safety measures rather than

becoming a victim of those crimes.


Women are adept at mobilizing diverse groups for a common cause. They often work across

ethnic, religious, political, and cultural divides to promote peace. We are all aware of

importance of women’s safety, but we must realize that they should be properly protected.

Women’s are not as physically strong as men, in an emergency situation a helping hand

would be a relief for them. The best way to minimize your chances of becoming a victim of

violent crime (robbery, sexual assault, rape, domestic violence) is to identify and call on

resources to help you out of dangerous situations. Whether you’re in immediate trouble or get

separated from friends during a night out and don’t know how to get home, having these apps

on your phone can reduce your risk and bring assistance when you need it. Although several

were originally developed for students to reduce the risk of sexual assault on campus, they

are suitable for all women In the light of recent outrage in Delhi which shook the nation and

woke us to the safety issues for our daughters, people are gearing up in different ways to fight

back. A host of new apps have been developed to provide security systems to women on their

phones. Here we introduce an app which ensures the safety of women. This helps to identify

and call on resources to help the one out of dangerous situations. These reduce risk and bring

assistance when we need it and help us to identify the location of the one in danger. This app

designed to provide security to women main purpose of this app to provide the awareness on

the time of critical situation for women. When you clicking on this button service get activate

and know whenever you click on HELP BUTTON it open a new window and send SMS to

those contact which you saved at the time of registration the SMS contain your message and

your current location. This app is provide deactivate service also when we fill secure this app

is mainly required correct information to fill otherwise this app will not work correctly.
CHAPTER 2
LITERATURE SURVEY

2.1 SMART GIRLS SECURITY SYSTEM.

Authors: Basavaraj Chougula, Archana Naik.

Year: 2014.

The status of women in India has gone through many great changes over the past few

millennia. From equal status with men in ancient times through the low points of the

medieval period to the promotion of equal rights by many reformers, the history of women in

India has been eventful. In modern India, women have adorned high offices in India

including that of the President, Prime Minister, Leader of the Opposition and Speaker of the

Lok Sabha. However, women in India continue to face social challenges and are often victims

of abuse and violent crimes and, according to a global poll conducted by Thomson Reuters,

India is the fourth most dangerous country in the world for women, and the worst country for

women among the G20 countries. This paper focuses on a security system that is designed

solely to serve the purpose of providing security to women so that they never feel helpless

while facing such social challenges. The system consists of various modules such as GSM

shield (SIM 900A), Arduino ATMega328 board, GPS (GYGPS6MV2), screaming alarm

(APR 9600), a set of pressure sensors for activation and power supply unit. The Delhi

Nirbhaya case that triggered the whole nation was the greatest motivation for this system. It

was high time we women needed a change.

2.2 Women Employee Security System using GPS And GSM Based Vehicle

Tracking.

Authors: Poonam Bhilare, Akshay Mohite, Dhanashri Kamble, and Rasika Kahane,

Year: 2015
Womens security is a critical issue in todays world and its very much needed for every

individual to be acting over such an issue.This paper describes a GPS and GSM based vehicle

tracking and women employee security system that provides the combination of GPS device

and specialized software to track the vehicles location as well as provide alerts and messages

with an emergency button trigger. The information of vehicle position provided by the device

can be viewed on Google maps. The IT companies are looking forward to the security

problem and require a system that will efficiently evaluate the problem of women employees

security working in night shifts. This paper focuses on the proposed model that can be used to

deal with the problem of security issues of women employees using GPS and GSM based

vehicle tracking.

2.3 A MOBILE BASED WOMEN SAFETY APPLICATION

Authors: Dr. Sridhar Mandapati, Sravya Pamidi,Sriharitha Ambati

Year: 2015

Many unfortunate incidents have been taking place in women’s case. Problems may come

from any direction such as women walking on the road after the work, going to super market

or many other reasons for which they go alone. People at home are not sure of their return

safely. Another factor is woman die without knowing the reason as they attend excursions

and industrial trips conducted by the organizations. It happens due to attacks on woman but

not suicides. In 2013 there happened an incident which is a gag rape in New Delhi in the case

of 23 year old woman in bus at 9:30 PM. Another incident that has taken place at Mumbai in

the case of woman who is leaving her native place after Christmas holidays has been

kidnapped and killed. These are some of the problems that have taken place in the day to day

life of women. In order to overcome such problems faced by women the I Safety (women
security apps) mobile based application is not only necessary to use but also plays a pivotal

role with android software.

2.4 A MOBILE APPLICATION FOR WOMEN'S SAFETY: WOSAPP

Author: Chand, Dhruv

Year: 2015

Self Defense System for women safety is like a Smart Watch for Women. It has the ability to

help women with technologies that are embedded into a compact device. The women wearing

this device as a watch or band, in case of any harassment or when she finds that someone is

going to harass, she presses a switch that is located on the watch or band or when the women

has fallen the information about the attack along with the body posture and location

information is sent as SMS alert to a few predefined emergency numbers And soon help is on

its way! The system will consist of embedded hardware and software co-designed for this

dedicated application. The system allows for knowing exact location of the individual, as

soon as the trigger key on the belt is pressed. By providing the instant location of the

distressed victim to the police so that the incident could be prevented and culprit

apprehended. In case if the caretaker wants to know the present location of the lady, he/she

can do so by sending a SMS to the SIM number of the lady which contains a secret password.

Then this system responds to such request by sending back a SMS containing location

information in terms of Latitude and Longitude. This would help reduce crime against

women. It also contains a shock mechanism to produce non-lethal electric shock in

emergency situations to deter the attacker.


CHAPTER 3
SYSTEM ANALYSIS

EXISTING SYSTEM

Location based service (LBS) is a mobile service that has the capability to provide real time

information based on the user's current location. Geographic Information system (GIS) is the

heart of location based services, System which has been developed will act as collection

centre, storing and supplying the geographical data for being manipulated by the application.

Data which stored at the system will be used within making the decision process. Through

this application, data will be collected to trace every unit location and every unit also can

update any additional information. GIS integrates hardware, software and data for capturing,

managing, analyzing and displaying all forms of geographically referenced information. GIS

allows us to view, understand, question, interpret and visualize data in many ways that reveal

relationships, pattern and trends in the form of globes, maps, charts and reports.

DISADVANTAGES OF EXISTING SYSTEM:

 Location Data information is not saved

 wired systems and most of them are alarming systems which is Conventional and

cannot communicate efficiently

PROPOSED SYSTEM:

 Retrieves the user’s current geological coordinates.

 Allow user to enter new alarm for a particular situation

 Along with alarm, user can optionally send SMS text as well
 Once user is near the location, the alarm will ring and also if there is any reminder

text it will be displayed to user.

 User can edit/delete/update/enable/disable the alarms.

 User can see the locations on Map to find out how far he is from the expected

location.

ADVANTAGES OF PROPOSED SYSTEM:

 An affordable technology keeps huge advantage

 Let the family and friends know that you are in danger and where you are? Declare an

emergency whenever you sense a danger, when you can disengage the emergency.

OBJECTIVE

The main purpose of our project is to provide safety to the women’s from the dangerous

zone. In this project we are providing facility to secure the women’s by providing GPS app

module with controller. As the women feels insecure at that time she can press the wireless

key then the GPS modules are activated .GPS will calculate the latitude and longitude co-

ordinates of that area .GSM module will send SMS which contains the latitude and longitude

co-ordinates to the numbers such as family, friends, which are already stored in the memory.

Also GSM module will make call to these numbers.


CHAPTER 4
SYSTEM SPECIFICATIONS

HARDWARE REQUIREMENTS

COMPONENT SPECIFICATION

CPU Intel Dual Core 2.4 GHz or Later

RAM 2GB DDR2

Hard Disk 160 GB

Display Wide VGA (Video Graphics Array)

Input Keyboard and Mouse

Optional Devices Android Phone (Jelly Bean 4.2 or higher)

SOFTWARE REQUIREMENTS

COMPONENT SPECIFICATION

Front End PHP, Android

Back End MySQL

IDE Dreamweaver, Android Studio

Language PHP

Platform Windows 7 or later

Database Server XAMPP


SOFTWARE DESCRIPTION

PHP

PHP code may be embedded into HTML or HTML5 markup, or it can be used in

combination with various web template systems, web content management systems and web

frameworks. PHP code is usually processed by a PHP interpreter implemented as a module in

the web server or as a Common Gateway Interface (CGI) executable. The web server

software combines the results of the interpreted and executed PHP code, which may be any

type of data, including images, with the generated web page. PHP code may also be executed

with a command-line interface (CLI) and can be used to implement standalone graphical

applications.

The standard PHP interpreter, powered by the Zend Engine, is free software released under

the PHP License. PHP has been widely ported and can be deployed on most web servers on

almost every operating system and platform, free of charge.

The PHP language evolved without a written formal specification or standard until 2014,

leaving the canonical PHP interpreter as a de facto standard. Since 2014 work has gone on to

create a formal PHP specification.

PHP 7

During 2014 and 2015, a new major PHP version was developed, which was numbered

PHP7. The numbering of this version involved some debate. While the PHP 6 Unicode

experiment had never been released, several articles and book titles referenced the PHP 6

name, which might have caused confusion if a new release were to reuse the name. After a

vote, the name PHP 7 was chosen.


The foundation of PHP 7 is a PHP branch that was originally dubbed PHP next generation

(phpng). It was authored by Dmitry Stogov, Xinchen Hui and Nikita Popov, and aimed to

optimize PHP performance by refactoring the Zend Engine to use more compact data

structures with improved cache locality while retaining near-complete language

compatibility. As of 14 July 2014, WordPress-based benchmarks, which served as the main

benchmark suite for the phpng project, showed an almost 100% increase in performance.

Changes from phpng are also expected to make it easier to improve performance in the

future, as more compact data structures and other changes are seen as better suited for a

successful migration to a just-in-time (JIT) compiler. Because of the significant changes, the

reworked Zend Engine is called Zend Engine 3, succeeding Zend Engine 2 used in PHP 5.

Because of major internal changes in phpng, it must receive a new major version number of

PHP, rather than a minor PHP 5 release, according to PHP's release process. Major versions

of PHP are allowed to break backward-compatibility of code and therefore PHP 7 presented

an opportunity for other improvements beyond phpng that require backward-compatibility

breaks, including wider use of exceptions, reworking variable syntax to be more consistent

and complete, and the deprecation or removal of various legacy features.

PHP 7 also introduced new language features, including return type declarations for

functions, which complement the existing parameter type declarations, and support for the

scalar types (integer, float, string, and boolean) in parameter and return type declarations.

MySQL
MySQL is an open-source relational database management system (RDBMS). Its name is a

combination of "My", the name of co-founder Michael Widenius' daughter, and "SQL", the

abbreviation for Structured Query Language. The MySQL development project has made its

source code available under the terms of the GNU General Public License, as well as under a

variety of proprietary agreements. MySQL was owned and sponsored by a single for-profit

firm, the Swedish company MySQL AB, now owned by Oracle Corporation. For proprietary

use, several paid editions are available, and offer additional functionality.

MySQL is a central component of the LAMP open-source web application software stack

(and other "AMP" stacks). LAMP is an acronym for "Linux, Apache, MySQL,

Perl/PHP/Python". Applications that use the MySQL database include: TYPO3, MODx,

Joomla, WordPress, phpBB, MyBB, and Drupal. MySQL is also used in many high-profile,

large-scale websites, including Google (though not for searches), Facebook, Twitter, Flickr,

and YouTube.

ANDROID

The Android software development kit (SDK) includes a comprehensive set of development

tools. These include a debugger, libraries, a handset emulator based on QEMU,

documentation, sample code, and tutorials. Currently supported development platforms

include computers running Linux (any modern desktop Linux distribution), Mac OS X 10.5.8

or later, and Windows 7 or later. As of March 2015, the SDK is not available on Android

itself, but software development is possible by using specialized Android applications.

Until around the end of 2014, the officially supported integrated development environment

(IDE) was Eclipse using the Android Development Tools (ADT) Plugin, though IntelliJ
IDEA IDE (all editions) fully supports Android development out of the box, and NetBeans

IDE also supports Android development via a plugin. As of 2015, Android Studio, made by

Google and powered by IntelliJ, is the official IDE; however, developers are free to use

others, but Google made it clear that ADT was officially deprecated since the end of 2015 to

focus on Android Studio as the official Android IDE.

Additionally, developers may use any text editor to edit Java and XML files, then use

command line tools (Java Development Kit and Apache Ant are required) to create, build and

debug Android applications as well as control attached Android devices (e.g., triggering a

reboot, installing software package(s) remotely).

Enhancements to Android's SDK go hand in hand with the overall Android platform

development. The SDK also supports older versions of the Android platform in case

developers wish to target their applications at older devices. Development tools are

downloadable components, so after one has downloaded the latest version and platform, older

platforms and tools can also be downloaded for compatibility testing.

Android applications are packaged in .apk format and stored under /data/app folder on the

Android OS (the folder is accessible only to the root user for security reasons). APK package

contains .dex files (compiled byte code files called Dalvik executables), resource files, etc.

ANDROID DEBUG BRIDGE

The Android Debug Bridge (ADB) is a toolkit included in the Android SDK package. It

consists of both client and server-side programs that communicate with one another. The
ADB is typically accessed through the command-line interface, although numerous graphical

user interfaces exist to control ADB.

JAVA STANDARDS

Obstacles to development include the fact that Android does not use established Java

standards, that is, Java SE and ME. This prevents compatibility between Java applications

written for those platforms and those written for the Android platform. Android only reuses

the Java language syntax and semantics, but it does not provide the full class libraries and

APIs bundled with Java SE or ME. However, there are multiple tools in the market from

companies such as Myriad Group and UpOnTek that provide Java ME to Android conversion

services.

ANDROID STUDIO

Android Studio is the official integrated development environment (IDE) for the Android

platform. It was announced on May 16, 2013 at the Google I/O conference. Android Studio

was in early access preview stage starting from version 0.1 in May 2013, then entered beta

stage starting from version 0.8 which was released in June 2014. The first stable build was

released in December 2014, starting from version 1.0.

Based on JetBrains' IntelliJ IDEA software, Android Studio is designed specifically for

Android development.[8] It is available for download on Windows, macOS and Linux, and

replaced Eclipse Android Development Tools (ADT) as Google's primary IDE for native

Android application development.


FEATURES

New features are expected to be rolled out with each release of Android Studio. The

following features are provided in the current stable version:

 Gradle-based build support


 Android-specific refactoring and quick fixes
 Lint tools to catch performance, usability, version compatibility and other problems
 ProGuard integration and app-signing capabilities
 Template-based wizards to create common Android designs and components
 A rich layout editor that allows users to drag-and-drop UI components, option to
preview layouts on multiple screen configurations[13]
 Support for building Android Wear apps
 Built-in support for Google Cloud Platform, enabling integration with Firebase Cloud
Messaging (Earlier 'Google Cloud Messaging') and Google App Engine[14]
 Android Virtual Device (Emulator) to run and debug apps

XAMPP

XAMPP is a free and open source cross-platform web server solution stack package

developed by Apache Friends, consisting mainly of the Apache HTTP Server, MariaDB

database, and interpreters for scripts written in the PHP and Perl programming languages.

XAMPP stands for Cross-Platform (X), Apache (A), MariaDB (M), PHP (P) and Perl (P). It

is a simple, lightweight Apache distribution that makes it extremely easy for developers to

create a local web server for testing and deployment purposes. Everything needed to set up a

web server – server application (Apache), database (MariaDB), and scripting language (PHP)

– is included in an extractable file. XAMPP is also cross-platform, which means it works

equally well on Linux, Mac and Windows. Since most actual web server deployments use the

same components as XAMPP, it makes transitioning from a local test server to a live server

extremely easy as well.


The term XAMPP is an apparent acronym. However, there is no official acronym expansion

specified on the Apache Friends website. Their homepage header reads “XAMPP Apache +

MariaDB + PHP + Perl”, indicating that this abbreviation is a recursive acronym.

MySQL was replaced with MariaDB on 2015-10-19 and beginning with XAMPP versions

5.5.30 and 5.6.14, effectively altering the meaning of the acronym.

FEATURES

XAMPP is regularly updated to the latest releases of Apache, MariaDB, PHP and Perl. It also

comes with a number of other modules including OpenSSL, phpMyAdmin, MediaWiki,

Joomla, WordPress and more. Self-contained, multiple instances of XAMPP can exist on a

single computer, and any given instance can be copied from one computer to another.

XAMPP is offered in both a full and a standard version (Smaller version).

USAGE

Officially, XAMPP's designers intended it for use only as a development tool, to allow

website designers and programmers to test their work on their own computers without any

access to the Internet. To make this as easy as possible, many important security features are

disabled by default. XAMPP has the ability to serve web pages on the World Wide Web. A

special tool is provided to password-protect the most important parts of the package.

XAMPP also provides support for creating and manipulating databases in MariaDB and

SQLite among others.


Once XAMPP is installed, it is possible to treat a localhost like a remote host by connecting

using an FTP client. Using a program like FileZilla has many advantages when installing a

content management system (CMS) like Joomla or WordPress. It is also possible to connect

to localhost via FTP with an HTML editor.

PHP is a server-side scripting language designed primarily for web development but also

used as a general-purpose programming language. Originally created by Rasmus Lerdorf in

1994,[4] the PHP reference implementation is now produced by The PHP Development

Team.[5] PHP originally stood for Personal Home Page,[4] but it now stands for the recursive

acronym PHP: Hypertext Preprocessor.


CHAPTER 5
PROJECT DESCRIPTION

This paper suggests a new perspective to use technology to protect women. The system

installed in normal smart phone which when activated, tracks the location of the victim using

GPS (Global Positioning System) and sends emergency messages using GSM (Global

System for Mobile communication), to contacts. The system also incorporates a screaming

alarm that uses real-time clock, to call out for help and also generates an electric shock to

injure the attacker for self defence. The main advantage of this system is that the user can use

a Smartphone. The use of application components ensures accuracy and makes it reliable.

The system provides with all the features which will leave no stone unturned to help the

victim in any kind of emergency situations.

MODULES

 User Module

 Guardian Module

 Location Module

 Alert Module

5.1 USER MODULE

In this module, user can register their accounts in their smart phones and login to the main

page of the app. The app uses one time registration so that enables fast retrieval of local

information. In the registration process, the student can upload the basic information along

with guardian details and contact number and secure authentication password for login
purpose. The login and profile details are available in centralized server. The application

regularly updates the user location and the location will be available to the guardian app.

5.2 GUARDIAN MODULE

In this module, the guardian can use separate smart phone to register for their child safety.

The login details will be simple; it does require the guardian phone number only. The Child

Location will be available to the guardian app in the main screen.

5.3 LOCATION MODULE

In this module, user location will recorded in the centralized server in regular interval of one

minute. The location usually contains the Latitude and Longitude position and the position

will be available in the Google Map API of the User App and Guardian App. For the

recording of location parameter, user must turn on Mobile Data and Location settings in their

phones.

5.4 ALERT MODULE

In this module, it generates a very high volume scream in times of distress when the lungs of

a person fail in screaming in trouble. The generated scream is in a woman’s voice is severely

helpful in discouraging the potential strong trouble makers. The only work done by this

application is whenever the person pushes or touches the application, the phone screams

loudly and SMS will send to the guardian phone.


CHAPTER 6
SYSTEM DESIGN

ARCHITECTURE DIAGRAM
USE CASE DIAGRAM
SEQUENCE DIAGRAM
ACTIVITY DIAGRAM
CHAPTER 7
SYSTEM TESTING

The purpose of testing is to discover errors. Testing is the process of trying to

discover every conceivable fault or weakness in a work product. It provides a way to check

the functionality of components, sub assemblies, assemblies and/or a finished product It is the

process of exercising software with the intent of ensuring that the Software system meets its

requirements and user expectations and does not fail in an unacceptable manner. There are

various types of test. Each test type addresses a specific testing requirement.

7.1 DEVELOPING METHODOLOGIES

The test process is initiated by developing a comprehensive plan to test the general

functionality and special features on a variety of platform combinations. Strict quality control

procedures are used. The process verifies that the application meets the requirements

specified in the system requirements document and is bug free. The following are the

considerations used to develop the framework from developing the testing methodologies.

7.2 TYPES OF TESTING

7.2.1 UNIT TESTING

Unit testing involves the design of test cases that validate that the internal program

logic is functioning properly, and that program input produces valid outputs. All decision

branches and internal code flow should be validated. It is the testing of individual software

units of the application .it is done after the completion of an individual unit before

integration. This is a structural testing, that relies on knowledge of its construction and is

invasive. Unit tests perform basic tests at component level and test a specific business

process, application, and/or system configuration. Unit tests ensure that each unique path of a
business process performs accurately to the documented specifications and contains clearly

defined inputs and expected results.

7.2.2 FUNCTIONAL TEST

Functional tests provide systematic demonstrations that functions tested are available as

specified by the business and technical requirements, system documentation, and user

manuals.

Functional testing is centered on the following items:

Valid Input : identified classes of valid input must be accepted.

Invalid Input : identified classes of invalid input must be rejected.

Functions : identified functions must be exercised.

Output : identified classes of application outputs must be exercised.

Systems/Procedures : interfacing systems or procedures must be invoked.

7.2.3 SYSTEM TEST

System testing ensures that the entire integrated software system meets requirements.

It tests a configuration to ensure known and predictable results. An example of system testing

is the configuration oriented system integration test. System testing is based on process

descriptions and flows, emphasizing pre-driven process links and integration points.

7.2.4 PERFORMANCE TEST

The Performance test ensures that the output is produced within the time limits, and

the time taken by the system for compiling, giving response to the users and request being

send to the system for to retrieve the results. 


7.2.5 INTEGRATION TESTING

Software integration testing is the incremental integration testing of two or more

integrated software components on a single platform to produce failures caused by interface

defects. The task of the integration test is to check that components or software applications,

e.g. components in a software system or – one step up – software applications at the company

level – interact without error.

7.2.6 ACCEPTANCE TESTING

User Acceptance Testing is a critical phase of any project and requires significant

participation by the end user. It also ensures that the system meets the functional

requirements.

Acceptance testing for Data Synchronization

 The Acknowledgements will be received by the Sender Node after the Packets are

received by the Destination Node

 The Route add operation is done only when there is a Route request in need

 The Status of Nodes information is done automatically in the Cache Updation process

7.2.7 BUILD THE TEST PLAN

Any project can be divided into units that can be further performed for detailed

processing. Then a testing strategy for each of this unit is carried out. Unit testing helps to

identity the possible bugs in the individual component, so the component that has bugs can be

identified and can be rectified from errors.


CHAPTER 8
CONCLUSION AND FUTURE SCOPE

8.1 CONCLUSION

The simulation results showed that the projected algorithmic rule performs higher with the

full transmission energy metric than the utmost range of hops metric. In today's world, many

ladies workers face the matter of security that is going down round the world particularly

across Asian country. The projected style can manage crucial problems faced by girls within

the close to past and can facilitate to unravel them with technologically sound equipment’s

and ideas. This method will overcome the worry that scares each lady within the country

regarding her safety and security.

8.2 FUTURE SCOPE

Electronic technologies: The styles usually incorporate sensible functions and options.

Wearable devices like activity trackers area unit a decent example of the web of Things, since

they're a part of the network of during this project we will additional implement electrical

device (The electrical device, additionally referred to as The Gun or Beam Gun in Japanese

associate electronic light-weight gun. this may be used for the defence purpose.) And aerosol

containers are often used. wearable technology, wearable’s, trendy technology, wearable

devices, tech togs, or fashion natural philosophy area unit wear and accessories incorporating

pc and advanced physical objects or "things" embedded with natural philosophy, software,

sensors and property to change objects to exchange information with a manufacturer,

operator and/or alternative connected devices, while not requiring human intervention.
CHAPTER 9
BIBLIOGRAPHY

 Android Application Development for Dummies, by Donn Felker

 Android Programming for Beginners, by John Horton

 Programming Android, by G. Blake Meike, Laird Dornin, Masumi Nakamura, and

Zigurd R. Mednieks

 Head First Android Development: A Brain-Friendly Guide, by Anthony J.F. Griffiths

and David Griffiths

 Sams Teach Yourself Android Application Development in 24 Hours, by Lauren

Darcey

You might also like