You are on page 1of 11

Topic Name: Women Safety App in Android

Abstract
In the modern’s world, it will be unsafe to travel alone for a person at night especially for
women. To provide safety for women a good way to reduce the chances of becoming a v
ictim of violent crime is to identify and call on resources to help you out unsafe situations
. Having a safety app on your phone can reduce the reason for the risk situation and add
assistance when we need to use it. Unlike the other applications available, which work o
nly at the time of Emergency or Danger, this app can be used as a safety or precaution
measure. So that, “Protection is better than cure”. The main purpose of this app is to pro
vide a safe platform through Android phone as today all person is taking Smart Phones t
o travel here and there. The user also gets to know the current user address using GPS
location tracker. The fetched information is sent to the emergency contact of the user. T
his paper presents women security an Android Application for the Safety of Women and
this app can be activated this app by a shaking the mobile, whenever need arises. This a
pp identifies the location of place through GPS and sends a message comprising this loc
ation URL to the registered contacts and also send messages to near by mobile which a
re having this app.

In today’s fast moving world, Women Security is an issue of growing concern. We have r
ead about many unfortunate incidents happening with women and the rate is increasing.
Women these days are working women and the globalization has made us aware of gen
der equality. Earlier the women were restricted only to the household chores. With the c
hanging scenario, women are competing with men in all fields.

We can see women going to great success levels in all fields, may it be corporate, scien
tific, education, business or any other field. Safety of women matters a lot whether at ho
me, outside the home or working place. Last few crimes against women especially the c
ase in Delhi was very dread and fearful. Because of such crimes, women safety has bec
ome a major topic. According to the statistics, it is found that every two out of three wom
en have suffered trauma in the last year. According to the survey of women, it is found t
hat women are losing their confidence because of such incidents. By the survey of Delhi
government’s Women and Child Development Department, around 80% of the women i
n national capital have fear regarding their safety. Women are harassed not only in the n
ight or evening but also in the day time at their home, working places, or other places lik
e street, club, etc. It is found through the survey that the reason of safety concern is the l
ack of gender-friendly environment and improper functional infrastructure such as consu
mption of alcohol and drugs in open area, lack of adequate lighting, safe public toilets, si
dewalks, lack of effective police service, lack of properly working helpline numbers, etc.
A huge percentage of women have no faith that police can curb such harassment cases.
There is an urgent need to understand and solve this problem of women safety so that t
hey can also grow equally like men in their own country.

II. EXISTING SYSTEM

There is a variety of applications for women protection when they are in dangerous situa
tion. The disadvantages of using these applications are they only send the alert messag
es to the saved contacts. Because of previous systems there is less possibilities of over
come the dangerous situations of women. Previous applications also have gps tracking s
ystem for to track the women location but it has not specific range. Existing system don’t
have the feature that is it don’t sends the alert message to nearby cell phones.

III. PROPOSED SYSTEM

The proposed system will be implemented with the help of android application. Which wi
ll alert the nearby people who having this application by sending alert messages to them
and alert sound in the guardian mobile on shaking of victim mobile. Also sends message
s and alert sound to the saved contacts in the application and police station. Which also
show the location of the victim with the help of GPS tracker system. Which also make so
und in guardian mobile when his/her mobile in silent mode.In this app we can also add a
s many contacts as we can.
In new application we are providing a user friendly interface where the user could send t
he message alert more efficiently and smartly. The user couldn’t have to remember all th
e important contact numbers of siblings, relatives or friends. The new system is also inte
ractive to the users and provides the facility to know their nearby police station , hospital
s and their own location.

IV. FEATURES OF APP

In this section, the key features of the App are listed below, which provides an overview
of the system as well as explains why it is different from others.

A. Sign in is mandatory

1. The first time users have to register to the app by entering the basic details of the user like

Name, Phone no, Emailid, etc in the Signup Page.

2. A one-time verification code will be send to the user’s email-account. Then, the user will

have to enter the verification code in order to complete the registration process. Then, a

message will be send to the user’s mobile number for completing the registration

successfully. The user now can access the main features of the app.

3. User will be able to manage their Emergency Contacts using the Add Emergency Contacts

option.
B. At Emergency Situations

1. There is an Alarm Button. On pressing the alarm button, a police siren (a shrill and loud

noise) will be activated which will get the attention of nearby.

2. There is an Emergency Call Button. On pressing that button an emergency number will

be autodialed.

3. There is a Panic Button. On pressing that button once, an alert message will be send to

the emergency contacts along with his/her current location. In case, the user does not

have an internet connection then only alert message will be send.

4. On pressing that button, there will be two modes available, like offline mode and online

mode.
a. The user can use the offline mode in case if the user does not have an internet conne
ction. On pressing this mode, it provides information about nearby police stations accord
ing to the fixed area-wise.

b. The user can use the online mode in case, if the user has an internet connection. On
pressing this mode, it provides information about nearby police stations according to the
user’s current location.

V. METHODOLOGIES

A. Design and Implementation Steps

The Application is built to run on devices having Android KitKat (API 29) and above and
during testing all parameters and functions were tested successfully. Some dummy data
were built and tested and it was found that the app is working properly. For the login pur
pose, the application only accepts valid password as login credential and it was found
working properly.

B. Algorithm

Step 1: Go to Launch Page.

Step 2: Login providing valid email address and password. If not registered user, then “N
EW USER? SIGNUP”.

Step 2.1: In case is not a registered user then register by entering name, valid email add
ress, password, emergency contact number. Then after registering click on “ALREADY R
EGISTER? LOGIN”

Step 1: From the login page by entering valid email and password go to the functionality
page.

Step2: After login we have to ADD THE CONTACTS and at the emergency situations w
e have to send the SMS to the saved contacts we have to enable the GPS also.
Step 3: Then “CLICK ON THE SEND SMS ” button present right below the message “Do
ne Great!” to fetch the location.

Step 4: After fetching the information go to the safety tips page which has a set of safety
tops written in it.

Step 5: In case you want to logout then click on the “LOG OUT” button present at the rig
ht bottom corner of the safety tips page.

ADVANTAGES

1. This system plays a sound if the guardian cell in silent mode.


2. This system will send message to the all nearby cells which having that application.
3. This system also send message to police station.
Topic name: Fingerprint-Based-Voting-System

The main objective of democracy is "vote" by which the people can elect the candidates
for forming an efficient government to satisfy their needs and requests such that their sta
ndard livingcan be improved.

In developing countries like "INDIA", the election commission follows manual voting mec
hanism which is done by the electronic voting machine. But instead of this, The poll rate
of India has only increased by 4 percent from 1952 to 2014. So a machine was required
to automate the process and can be avail machine is placed in the poll booth center and
is monitored by higher officials, due to some illegal activities the polling center are misus
ed and people's right to has been denied. This seldom occurs in rural areas as well as in
urban cities because the educated people are not interested in casting their votes to can
didates who represent their respective areas. To ensure 100% voting, automation came
into play. But this automated system has been approved only on some developed countr
ies since security have not been ensured to a large extent. The poll percentage of India
have never exceeded 67% till date.

The main problem is people either do not leave in the area where they are registered as
a voter or they do not go to the poll center because of any other reason. The queue at th
e poll center is also one of the major reason for less poll percentage. Some people cast t
heir vote, and approximate 2% of the vote each time become invalid, due to any reason.
To overcome all the drawbacks of traditional methods of voting, We have come up with a
n innovating solution to solve all the above-discussed problems.

Fingerprint Based Voting Project is an application where the user is recognized by his fin
ger pattern or IRIS (or any other biometrics in the future). Since the finger pattern of eac
h human being is different, the voter can be easily authenticated. The system allows the
voter to vote through his fingerprint. The fingerprint is used to uniquely identify the user.
The fingerprint minutiae features are different for each human being. Fingerprint is used
as an authentication of the voters. A voter can vote the candidate only once, the system
will not allow the candidate to vote for the second time. The system will allow admin to a
dd the candidate name and candidate photo who are nominated for the election. Admin
only has the right to add a candidate name and photo who are nominated. Admin will re
gister the voter's name by verifying voter. Admin will authenticate the user by verifying th
e user’s identity proof and then admin will register the voter. The number of candidates a
dded to the system by the admin will be automatically deleted after the completion of the
election. Admin has to add the date when the election going to end. Once the user has g
ot the user id and password from the admin the user can log in and vote for the candidat
e who is nominated.

The system will allow the user to vote for only one candidate. The system will allow the u
ser to vote for one time for a particular election. Admin can add any number of candidate
s when the new election will be announced. Admin can view the election result by using t
he election id. Even user can view the election result. We with the help of this system ai
ms to achieve a target of 80+ percent by the end of the year 2029. We have designed th
is system in such a way that is affordable with minimum hardware requirement and the s
oftware will be provided by ECI free of cost.
Topic Name: Inverse Cooking: Recipe Generation from Food Images

People enjoy food photography because they appreciate food. Behind each
meal there is a story described in a complex recipe and, unfortunately, by
simply looking at a food image we do not have access to its preparation
process. Therefore, in this paper we introduce an inverse cooking system
that recreates cooking recipes given food images. Our system predicts
ingredients as sets by means of a novel architecture, modeling their
dependencies without imposing any order, and then generates cooking
instructions by attending to both image and its inferred ingredients
simultaneously. We extensively evaluate the whole system on the large-
scale Recipe1M dataset and show that we improve performance w.r.t.
previous baselines for ingredient prediction, we are able to obtain high
quality recipes by leveraging both image and ingredients; our system is
able to produce more compelling recipes than retrieval-based approaches
according to human judgment. We make code and models publicly
available.
Food is fundamental to human existence. Not only does it provide us with
energy—it also defines our identity and culture As the old saying goes, we
are what we eat, and food related activities such as cooking, eating and
talking about it take a significant portion of our daily life. Food culture has
been spreading more than ever in the current digital era, with many people
sharing pictures of food they are eating across social media [. Querying
Instagram for #food leads to at least 300M posts; similarly, searching for
#foodie results in at least 100M posts, highlighting the unquestionable
value that food has in our society. Moreover, eating patterns and cooking
culture have been evolving over time. In the past, food was mostly
prepared at home, but nowadays we frequently consume food prepared by
thirdparties (e.g. takeaways, catering and restaurants).
we introduced an image-to-recipe generation system, which takes a food
image and produces a recipe consisting of a title, ingredients and sequence
of cooking instructions. We first predicted sets of ingredients from food
images, showing that modeling dependencies matters. Then, we explored
instruction generation conditioned on images and inferred ingredients,
highlighting the importance of reasoning about both modalities at the same
time. Finally, user study results confirm the difficulty of the task, and
demonstrate the superiority of our system against state of-the-art image-to-
recipe retrieval approaches.
Topic Name: College Online Voting system

The aim of College Online Voting is to supply a gaggle of protocols that allow
voters to vote cast ballots while a group of authorities collects votes and output
the ultimate Tally. Voting makes many of us to believe that voting application is
the perfect application for current technology, but actually applying its hard.
College Online Voting System may be a web based system that easier the running
of elections in online. This system has been developed to simplify the method of
organizing elections and make it fitting in well voters needs to vote remotely from
home computers or mobile phones with the help of internet connectivity while
taking into consideration security, anonymity and providing auditioning.
The project “College Online voting System” is software system through which a
voter can give votes through this system registering their details. It deals with
design, test and build an online voting system that facilitates user and candidate.
All the information in sites which have been entered by users that is stored in
database, for each page on the website has its own database table. Administrator
verifies whether the registered user’s details are acceptable or deleted to
participate in online voting. Administrator provides username and password for
individual users, users using their username and password to vote on that date of
election. This online voting system is secured, reliable and its design is simple.
MODULES USED
• Candidate
• User (Voter)
• Registration
• Login
• Results
CANDIDATE
In this Module the Admin will manage the profile of candidate. First, the
admin will collect the details of candidates then the admin will register
candidates by filling up the details of candidates. These details will display
at the voter site for knowing the details and voting the candidate.
USER (VOTER)
User can visit the site, if the user wants to vote registration then voter
enters to registration interface and filling up the form from this can make a
request to the admin. The request will be goes to Admin. The User has to
wait up to verification completed by administrator. After Verification has
done, by user interface voter login using their username and password and
make vote for required candidate on particular election Date.
REGISTRATION
The user should provide their Entire information such as Full name,
surname, Email-id, password, Branch, Class, Batch, Contact no, Date of
Birth, Roll-no and Gender. User should upload their image and Idcard
image at the time of registration. Admin will verify and maintain the above
details in the database.
LOGIN
In this Module the voter can log in into their account by username and
password, after login the voter can give vote to candidate if there is an
election scheduled on that date.
RESULTS
By the admin can know entire details about voter and different candidate
details and the results announced by administrator. Calculation of the
election results are automatically. The candidate having the highest count
will be winner of election.

You might also like