You are on page 1of 36

GUJARAT TECHNOLOGICAL UNIVERSITY

(GTU)

GIDC Degree Engineering College,


Navsari
Affiliated with GTU

A
Report
On

“SAFETY AND SECURITY”

Under subject of
DESIGN ENGINEERING – 2A
B. E. III, Semester – V
(Computer Engineering Department)

Submitted by:
Group : 453877

Sr. Name of student Enrollment No.


1 TANDEL AYUSH V. 211100107029
2 PATEL ARPIT D. 211100107030
3 RATHOD DHRUV Y. 211100107041
4 PATEL ARYAN S. 211100107047

(Prof. Pankti S. Naik)


Guide

Dr. Archana M Nayak


Head of the Department

Academic year
(2023-2024)
COMPUTER ENGINEERING DEPARTMENT

CERTIFICATE

Date: / /

This is to certify that the PROJECT entitled “Safety and Security” has
been carried out by Tandel Ayush V. (211100107029), Patel Arpit D.
(211100107030), Rathod Dhruv Y. (211100107041), Patel Aryan S.
(211100107047) students of BE-III, Semester-V under my guidance in partial
fulfillment of the degree of Bachelor of Engineering in Computer Engineering (5th
Semester) of Gujarat Technological University, Ahmedabad during the academic
year 2023-24.

Prof. Pankti S. Naik Dr. Archana M. Nayak


Guide Head of the Department
Computer Engineering Department Computer Engineering Department
GIDC Degree Engineering College GIDC Degree Engineering College

External Examiner
Design engineering 2a
Project APPROVAL
Certificate
The project entitled
“Safety And Security”

Tandel Ayush V. (211100107029)

Patel Arpit D. (211100107030)

Rathod Dhruv Y. (211100107041)

Patel Aryan S. (211100107047)

at
Gidc Degree Engineering College, Navsari (110),

Bachelor of Engineering
in
Computer Engineering
by
Gujarat Technological University.

Date : External Examiner

Place :
TABLE OF CONTENTS
Table of contents I
List of Figures II
Acknowledgement III
Abstract IV
CHAPTER 1: INTRODUCTION TO CONCEPT/ IDEA 1
1.1 Introduction 1
1.2 Objective 2
1.3 Purpose 2

CHAPTER 2: CANVASES / FRAMEWORKS 3


2.1 AEIOU Summary Canvas 6
2.2 Mind Mapping 7
2.3 Empathy Canvas 10

2.4 Ideation Canvas 13


2.5 Product Development Canvas 17
2.6 LN Matrix Canvas 18
2.7 Literature review / Prior Art Search 19

CHAPTER 3 : DESIGN CALCULATION 20


3.1 Flow Chart 20
3.2 Use Case Diagram 22
3.3 Sequence Diagram 23
3.4 Activity Diagram 25

CHAPTER 4 : PHASE 3: ROUGH PROTOTYPE MODEL 26


CONCLUSION 28
REFERENCES 29

II
LIST OF FIGURES

FIG.NO FIG. NAME PAGE NO


Fig : 2.1 Aeiou Canvas 6
Fig : 2.2 Mind Mapping 7
Fig : 2.3 Empathy Canvas 10
Fig : 2.4 Ideation Canvas 13
Fig : 2.5 Product Development Canvas 17
Fig : 2.6 Learning Need Matrix Canvas 15
Fig : 3.1 Flow Chart 20
Fig : 3.2 Use Case Diagram 23
Fig : 3.3 Sequence Diagram 26
Fig : 3.4 Activity Diagram 28
Fig : 4.1 Rough Prototype model 30

III
ACKNOWLEDGEMENT
We are very obliged to Dr. H.S. Patil, Principal of GIDC Degree Engineering College facilities
to achieve the desire milestone.

We also extend our thanks to Head of Department Dr. Archana M Nayak for her inspiration
and continuous support.

We wish to warmly thank our guide, Prof. Pankti S.Naik for all her diligence, guidance,
encouragement, inspiration and motivation throughout. Without his treasonable advice and
assistance, it would not have been possible for me us attain this landmark. She has always been
willingly present whenever we needed the slightest support from her. We would not liketo miss
a chance to say thank for the time that he spared for us, from her extremely busy schedule.

We take this opportunity to thank all my friends for their support and help in each and every
aspect. We would like to thank all of them whose name are not mentioned here but have played
a significant role in any way to accomplish the work.

Tandel Ayush V. (211100107014)

Patel Arpit D. (211100107002)

Rathod Dhruv Y. (211100107003)

Patel Aryan S. (211100107005)

IV
ABSTRACT

Safety and security have become essential aspects of modern life, and mobile
applications have emerged as powerful tools for addressing these concerns. This abstract
introduces the concept of a Safety and Security Application, a versatile digital solution
designed to enhance personal safety and contribute to public security. These applications offer
a wide array of features, including real-time location tracking, emergency response services,
crime reporting, safety tips, and more. By leveraging the capabilities of smartphones and the
digital landscape, Safety and Security Applications aim to empower individuals to protect
themselves and their communities effectively. This abstract underlines the growing
significance of such applications in a world where personal safety and security are paramount
concerns, showcasing how technology can be harnessed to create a safer and more connected
society.

V
Group ID-453877

Chapter 1: Introduction to concept/ idea

1.1 Introduction
Tandel Ayushkumar Vinodbhai

Patel Arpit Dilipbhai

Rathod Dhruv Yogeshbhai

Patel Aryan Saileshbhai

We are students of GIDC Degree Engineering College of Computer Engineering of 3rd year.
We all are interested doing paperwork, making website & find solution of problem. We like to
innovate something new which will make people’s life easier. We are working very hard for
make our project best. We all are very hard working and work in unity.

Name of Guide :

Prof.Pankti S. Naik

Our guide is very helping person. She help in make our project best, as possible as she can. Any
time, she responds positively and clear our all doubts related to our project topic. She provide
all guidelines that we need in our project. She done her job very sincerely and done it as her
responsibility. Also she is very hard working.

Design Thinking
"Innovation & Design Thinking" will allow students to develop basic skills in creativeproblem
solving, innovation, and human-centered "design thinking." Innovation has become
increasingly important because of the rapid evolution in products and business models and
the ever more complicated world in which businesses and organizations operate. The course
focuses on the manager's or leader's role as an innovator and facilitator of innovation by others.

As future managers, these skills also include the ability to identify innovative individuals, form
innovative teams, and build innovative cultures within organizations. The course takes the view
that innovative problem solving and design thinking can be learned through repeatedpractice.
Students will engage in exercises, projects, and reflections to explore various methods and
approaches to innovative problem solving and design thinking. The course will introduce a
variety of tools and techniques (“props”) that, with repeated use, will help

GDEC/CE/2023-24 Page 1
Group ID-453877

students think more expansively, creatively, and effectively through all phases of an
innovation project.

1.2 Objective
To enhance the website's problem-solving capabilities by integrating machine learning
algorithms, providing accurate solution predictions, and reducing the time and effort required
for manual problem solving.

 Time Saving.
 Easy to use.
 Quick response

1.3 Purpose
The Purpose of safety and security application is to enhanced and promote safety and
security in various context. These application serve several key objectives like personal
safety, emergency response, crime prevention and reporting, community safety, travel safety
and peace of mind.

GDEC/CE/2023-24 Page 2
Group ID-453877

Chapter 2: Canvases / Frameworks


2.1 AEIOU Summary Canvas

Now, we describe our observation about food industry through Canvases. Our first Canvasis
AEIOU FRAME WORK.

AEIOU is an investigative tool to help interpret observations gathered by ethnographic


practices in the field. It is a frequently used framework for guiding and structuring
observational research. The framework creates taxonomy of observations under the themes of
Activities, Environments, Interactions, Objects and Users and is commonly used for coding
observational data.

Activities:
Activities are goal directed sets of actions—paths towards things people want to accomplish.
What are the modes people work in, and the specific activities and processes they go through?

In this part we go at our domain related place and we observe different activities happeningat
that place.

 We mention elements by which they do such activities.


 We also write such activities which is special or
happening occasionally.
 We stick photographs or sketch of our observation.

Activities:
 Meeting

 Function

 Gardening

 Celebrating

 Worker details

 Family details

 Watchmen details

 Problem List

Environment:
Environments include the entire arena where activities take place. What isthe character and
function of the space overall, of each individual's spaces,and of shared spaces?

GDEC/CE/2023-24 Page 3
Group ID-453877

In this part we describe-

 Where (Activity) is happening?

 What are circumstances?

 Time effects, Seasonal effects, Person effects, Operational effects &style, materials &
atmosphere…

Environment:
 Happiness

 Dirtiness

 Concerned

 Panic

 Calmness

 Noisy

 Sadness

 Cleanliness

Interaction:
Interactions are between a person and someone or something else; they are the
building blocks of activities. What is the nature of routine and special interactions
between people; between people and objects in their environment, and across
distances?

We describe in this part-

 Who are involved? Why? How?


 What (users) are holding/ operating/ using…
 How the contacts are in action?
 Action vs. Reaction…

Interaction:
 People-Shopkeeper

 Manager-People

 Watchmen-Public

 People-Neighbour

GDEC/CE/2023-24 Page 4
Group ID-453877

 Children-Friends

Object:
Objects are building blocks of the environment, key elements sometimes put to complex or
unintended uses (thus changing their function, meaningand context). What are the objects and
devices people have in their environments and how do they relate to their activities?

In this part

 What components are involved?

 How objects are relating to the activities?

Object:
 Electronic items

 Iromic equipments

 Cricket kit

 Wooden items

 Industrial machinery

 Stage

 Vehicles

 Plumbing items

Users:
Users are the people whose behaviors, preferences, and needs are being observed.

 Who is there?
 What are their roles and relationships?
 What are their values and prejudices?
 List of identified people involved

User:
 Young People

 Developers

 Housewives

GDEC/CE/2023-24 Page 5
Group ID-453877

 Physical disable

 Workers

 Government employes

 Senior citizen

Fig : 2.1 (Aeiou Canvas)

GDEC/CE/2023-24 Page 6
Group ID-453877

2.2 Mind Mapping Canvas

A mind map is a diagram used to visually organize information. A mind map is often
created around a single concept, drawn as an image in the center of a blank landscape page,
to which associated representations of ideas such as images, words and parts of words are
added. Major ideas are connected directly to the central concept, and other ideas branch out
from those.

Fig : 2.2 (Mind Mapping)

GDEC/CE/2023-24 Page 7
Group ID-453877

2.3 Empathy Canvas

Empathy Map is the canvas where designer has to observe and understand the emotional needs
of the user, and on the basis of empathy of user he will think of the solution. A User Empathy
Map can help tee up a discussion about the needs a user has. The discussion will be center on
what was observed, and what can be inferred about these user groups’ beliefs and emotions.
An empathy mapping is a tool which helps us summarize our observations andtake out
unexpected ideas with no restriction & any bound.

Users
Users are the people who belong to the domain that we have selected and they are the ones
who face problems in that domain. The users that we have included are:
 Worker
 Developers
 Industrial unit
 General Public
 People
Stakeholders
Stakeholders are the people who are directly or indirectly affected by the domain, problem
and the solution of the problem. They are the ones who get profit or loss from the domain.
 Developer
 Cyber Cell
 Police

Activities
Activities are the various tasks which are done by the users. These affect the domain.

 Bullying
 Attacking
 Running
 Molesting
 Blackmailing

GDEC/CE/2023-24 Page 8
Group ID-453877


Story Boarding
 Happy story-1

Sarah's Safe Journey: Sarah, a young woman, was using a women's safety application while traveling
alone late at night. She felt uneasy when a stranger started following her. Using the app's SOS
feature, she quickly alerted her emergency contacts, who called the police. Thanks to the quick
response, the police arrived in time, and the stalker was apprehended, ensuring Sarah's safety.

 Happy story-2

Empowering Communities: A women's safety application was launched in a small town,


focusing on educating and empowering local women. Over time, the app's resources helped
women gain knowledge about self-defense and assertiveness. This led to a significant
decrease in harassment incidents in the area, making the community a safer place for
women.

 Sad story-1
Tragic Loss of Aisha: Aisha, a young woman, was walking home alone one evening in an
area with poor street lighting. She didn't have a women's safety app installed on her phone,
and there were no emergency call boxes nearby. Tragically, she became a victim of a violent
crime, and her story highlights the urgent need for improved safety measures and increased
awareness about the importance of women's safety.
 Sad story-2

Lack of Support for Sarah: Sarah, a woman in a troubled marriage, decided to seek help
and escape her abusive husband. She downloaded a women's safety app that included
resources for domestic violence victims. However, when she reached out for assistance, she
found that the app's support services were limited and not responsive. Sarah's plea for help
went unanswered, leaving her in a vulnerable and dangerous situation. This story
underscores the critical need for effective and accessible support systems for women facing
domestic abuse.

GDEC/CE/2023-24 Page 9
Group ID-453877

Fig : 2.3 (Empathy Canvas)

GDEC/CE/2023-24 Page 10
Group ID-453877

2.4 Ideation Canvas

Ideation is the creative process of generating, developing, and communicating new ideas,
where an idea is understood as a basic element of thought that can be visual, concrete, or
abstract. Ideation comprises all stages of a thought cycle, from innovation, to development, to
actualization. As such, it is an essential part of the design process, both in education and
practice. He explained how things can be connected to get a better idea.

An ideation canvas is a rough whiteboard/sheet where ideas can be stretched into any limits
or dimensions. Ideation session is not aimed at finding solutions to the defined problem. But
its aim is to define the best possible problem and stretch out its possible scope. The field is
set and the overall agenda is to build the clones of the ideas and pivot them throughout the
canvas so as to discover new possibilities.

People

We write down distinct people we can think of or we are interested to solve problems for.
Wesegment them into various groups on the basis of their profession.

Whom we mentioned in empathy canvas as user

 Children

 Student

 Shop-keeper

 Security Guard

 Workers

Activities
We write down whatever every segment of people do (Activities we had identified at
empathystage (expanding list of user activities)). We make the list, as long as possible.

 Cooking

 Shopping

 Assembling

 Entertaining

 Problem list

GDEC/CE/2023-24 Page 11
Group ID-453877

Situation/content/location:
Every above mentioned activity can be done in a different situation, location or context

In short, when/why/where- Many activities that user does can vary depending upon changes in
situation, location or local condition/context

 Urgent situation

 Residence

 Institutes

 Common situation

 Commercial area

 Industrial area

Props/possible solutions:
We note down the objects, technologies or solutions which may be possible outcomes to our
idea/challenge. The prop need not be related as it’s always randomness that helps in finding
new ideas.

In this we write down nonliving things or items (components).

 GPS

 Sensor

 Location

 Mapping System

GDEC/CE/2023-24 Page 12
Group ID-453877



Fig : 2.4 (Ideation Canvas)

GDEC/CE/2023-24 Page 13
Group ID-453877

2.5 Product Development Canvas


This exercise is meant for giving strategic orientation to the project of each team so that it
achieves its true goal as defined by the previous canvas exercises. This exercise is more about
developing strategy for the proposed product/solution design, after the team has successfully
attempted the ideation process and has incorporated inputs from all stakeholders.

A product development canvas is the ground where in the best possible ideas after the
ideationsession are pitched and nurtured to develop.

Purpose
The section should answer the following questions: What is the broad purpose of our
product? Whatproblem sector we want to target broadly or specifically?

 Safety

 Security

 Networking

People
We make the segment more focused. We note down the kind of people we have in mind
whiledeveloping the product and also the people for whom we are resolving the problem.

 Administrator
 General public
 Workers
 Student
 Senior Citizen
Product experience
Focus in depth on how the customer feels for our product/service concept. We mention every
kind ofexperience we would want our user to feel, enjoy or avail. Also we make a list of all
user problems we want to address and how user feels about their problems.

 Best
 Good

GDEC/CE/2023-24 Page 14
Group ID-453877

Product functions
Product functions deliver the product experience. We convert the product experience into
functions for our product/service. What functions our product should perform to meet the
customer experience we have just identified in product experience? Mostly the user
experience/needs will be our product functions.

 Authorization

 Tracking

 Send Location

 earest police station

 Feedback

Product features
Features power the product functions. We find product features that will deliver the product
functionswe have identified.

 User friendly

 Live location trace

 Secure

 24/7 service

 Data privacy

 Updates

 Push notification

 Storage

Components
Components built up the features. They are the can be major components or the auxiliary
(additional) components that make the major components work. The components required
are:
 Computer/Laptop
 Mobile
 Server
 Internet

GDEC/CE/2023-24 Page 15
Group ID-453877

Customer revalidation
Customer revalidation means testing with the customer or user that whether the product is
useful.
 Helpful
 Satisfied
 Update data
 Easy to use
Reject, redesign, retain
Rejection of those features or functions that customers didn’t find useful. Redesigning those
that were partially useful and retaining those that met the bar.
 Quick response

 Security

 User interface

 Add new features

 Improvements

GDEC/CE/2023-24 Page 16
Group ID-453877



Fig : 2.5 (Product Development Canvas)

GDEC/CE/2023-24 Page 17
Group ID-453877

2.6 Learning Need Matrix

Learning Needs Matrix will help students to identify the learning requirements that are much needed in
industry or intheir career at an early stage along with prioritization of specific learning.

Identification will be focused with listing out Syllabus based and out of syllabus learning & skill
development.

Fig : 2.6 (Learning Need Matrix Canvas)

GDEC/CE/2023-24 Page 18
Group ID-453877

2.7 Literature review / Prior Art Search

This literature review aims to explore the various aspects of women safety websites, including their
effectiveness, accessibility, and integration with existing safety programs. It also discusses the
challenges faced by these websites and suggests potential avenues for future research and
development.

1. Effectiveness of Women Safety Websites:


Studies have shown that women safety websites can be highly effective in providing practical
advice and tools to enhance women's safety. These websites often feature comprehensive
resources, such as personal safety tips, self-defence strategies, and contact information for local
safety programs. Additionally, they may include sections on dealing with abusive partners and
maintaining healthy relationships.

2. Accessibility and Integration with Existing Safety Programs:


One of the most significant strengths of women safety websites is their ability to reach a wide
audience. With their user-friendly interface and comprehensive information, these websites can
provide valuable resources to women in need, regardless of their geographic location or
socioeconomic status.
Furthermore, these websites often integrate with existing safety programs and resources, making
it easier for women to access the support they need. For example, websites may include
information on local shelters, support groups, and legal assistance programs.

GDEC/CE/2023-24 Page 19
Group ID-453877

Chapter 3: Design Calculation

3.1 Flow Chart


A flowchart is a type of diagram that represents an algorithm, workflow or process, showing
the steps as boxes of various kinds, and their order by connecting them with arrows. This
diagrammatic representation illustrates a solution model to a given problem. Flowcharts are
used in analyzing, designing, documenting or managing a process or program in various fields.
Flowcharts are used in designing and documenting simple processes or programs. Like other
type of diagrams, they help visualize what is going on and thereby help understand a problem,
and perhaps also find flaws.

Fig : 3.1 (Flow Chart)

GDEC/CE/2023-24 Page 20
Group ID-453877

3.2 Use Case Diagram


Actors: An Actor is a direct external user of system. Something with a behavior or role.
e.g., a person, another system, organization.

Use Cases: The various interactions of actors with a system are quantized in to use cases. A
collection of related success and failure scenarios, describing actors using the system to support
a goal.

Use Case Diagram: A system involves a set of use cases and a set of actors. Use case
diagrams are considered for high level requirement analysis of a system. So when the
requirements of a system are analyzed the functionalities are captured in use cases

GDEC/CE/2023-24 Page 21
Group ID-453877

Fig : 3.2 (Use Case Diagram)

GDEC/CE/2023-24 Page 22
Group ID-453877

3.3 Sequence Diagram


Scenarios: - A Scenario is a sequence of events that occurs during one particular execution of
a system, such as for a use case. The scope of a scenario can vary it may include all events in
the system, or it may include only those events impinging on or generated by certainobject.
Sequence Diagram: - A Sequence diagram shows the participants in an interaction and the
sequence of messages among them. A Sequence diagram shows the interaction of a system
with its actors to perform all or part of use case
Each actor as well as the system is represented by a vertical line called lifeline and each
message by a horizontal arrow from the sender to the receiver.

Fig : 3.3 (Sequence Diagram)

GDEC/CE/2023-24 Page 23
Group ID-453877

3.4 Activity Diagram


Activity diagram: Activity diagram is another important diagram in UML to describe
dynamic aspects of the system. Activity diagram is basically a flow chart to represent the flow
form one activity to another activity. The activity can be described as an operation of the
system.

Initiation & Termination: A Solid circle with outgoing arrows shows the starting point of
an activity diagram. A bull’s-eye shows the termination Point.

Initiation & Termination

Activity: An activity is some task which needs to be done. Each activity can be followed
by another activity (sequencing).

Activity

Branches: If several arrows enter an activity. the alternate execution paths merge.
Alternatively, several arrows may enter a diamond and one may exit to indicate a merge.

Diamond

Concurrent Activities: If one activity may be followed by another activity, then split into
several concurrent activities (A fork control), and finally be combined into a single activity
(A merge/join control). A fork or merge is shown by a synchronization bar –a heavy line
with one or more input arrows and one or more output arrows.

Synchronization Bar

GDEC/CE/2023-24 Page 24
Group ID-453877

Fig : 3.4 (Activity Diagram)

GDEC/CE/2023-24 Page 25
Group ID-453877

Chapter: 4 Rough prototype model /Conceptual Plan Layout

(Settings of the device) (Layout of the app immediately after installation.)

(Details entered in the application.) (Message received by another contact deviceimmediately


after pressing the Help button in the application.)

GDEC/CE/2023-24 Page 26
Group ID-453877

(Message received by one of the contacts


afterfive minutes span of time.)

(Screen shown after clicking URL in themessage


received by the contact device.)

Fig : 4.1 (Rough Prototype model)

GDEC/CE/2023-24 Page 27
Group ID-453877

CONCLUSION
During this semester we had completed all the observation and Product selection or we can say
problem identification phase. Also we had completed canvases like Empathy canvas, Ideation
canvas, Product Development canvas, Learning need matrix canvas and Mind mapping canvas.

In summary, safety and security applications are of paramount importance, safeguarding assets,
individuals, and data across diverse domains. This review highlights their critical role in our
interconnected world. Key components, technologies, and compliance with regulations are
vital. Emerging trends offer promise, while real-world case studies provide valuable insights.
Methodologies and best practices guide implementation. However, gaps in existing literature
persist, and the evolving technological landscape demands ongoing research and adaptation.
Safety and security applications are an ever-evolving journey, ensuring the protection of assets,
data, and people in a dynamic environment.

GDEC/CE/2023-24 Page 28
Group ID-453877

REFERENCES

Website:

1. Safetipin.com
2. getbBsafe.com
3. https://www.w3schools.com
4. NirbhayaApp.com
5. RakshaApp.com

GDEC/CE/2023-24 Page 29

You might also like