You are on page 1of 9

Procedure of the Study

Figure 2 procedure on how kEyMERGENCY work

Figure 2 shows what is happening when you are using the kEyMERGENCY

keychain and application and its parts. The keychain comprises a battery, which is the

power supply of the keychain, three buttons with different color and different use, GPS

chip for the system to know the real time location, LED to show if it is functioning or not,

emergency button for the victim to press it and ask help, and code. The web-based

application consists of a GPS map for the security to know the location of the keychain

holder, and a list of registered keychains. Registration is required for the web-based app

and the keychain to be connected. When the victim presses the emergency button on

the keychain, a notification and a loud sound will be sent to the web-based app to alert

the security. Hence, they will alert the authorities and use the GPS map to find the

location of the victim.


The flow diagram in Figure 3 shows how the safety

keychain and web-based application will perform. The

device will operate when the emergency button is

pressed through the web-based app. While pressing

the emergency button, the red LED will turn on,

indicating that the device is working. Also, the GPS

location will send and An encoded message with the

serial number of the device and it will be sent to the

website of the rescue department and/or security.

Serial number and password of the keychain is a

requirement in order to receive notifications and track

the person. It is for privacy to prevent others from

sharing information. The web-based app features GPS

to navigate the keychain holder. Notification is included

in the web-based app to notify the receivers and get

immediate attention and help. There are 3 color code

buttons with different use; Code red indicates a

combative or aggressive person, requiring security

personnel. Code blue indicates the person is in urgent

need of medical care. Code gray alerts indicate that the

person is trapped somewhere or missing due to lost

track of place and needs a rescue service.

Figure 3 Data Flow Diagram


Figure 4.1-3 Home

Figure 4.1 shows the login.

Hospitality sector security

department needs to sign in first

to access the system. By

scrolling through the page you

can see the description of the

study.
Figure 4.4-5 List of register and

Registration

Figure 4.4 and 4.5 shows the list

of registered keychains and their

serial numbers(examples are

shown in the figure), the search

button is located beside the

menu button, where users can

register, delete, edit the list of the

registered keychain.

When you have registered your

keychain, the LED will blink three

times to indicate that the

keychain is already connected to

the web-based app.


Figure 4.6-8 Sign up and log

in

Figure 4.4 and 4.5 shows the

login and sign up. Users need

to sign in their personal

information(shown in the figure)

first to access the Web-based

application.
Figure 4.9-10 Location,

Reports and History

Figure 4.9 and 4.10 shows the

GPS map, Reports, and History.

It can show you the real time

location of the victim and the type

of rescue they need, based on

the color shown in the screen. At

the bottom left side there is

history of past reports. There’s an

option to delete the data.

Figure 4.11 Notification

Figure 4.11 shows the

the notification sent by the

keychain holder when he/she

presses the emergency button,

there will be an Alert sound once

the notification is received. Once

you click the button, the LED will

blink, it means that the keychain

holder is in danger and needs

help.
Figure 4.12 Settings

Figure 4.9 shows the about,

account settings. Users can log

out anytime, Change their

password, and can share

thoughts about the app through

feedback. It also includes the

ringtone settings.

Figure 4.13 Ringtone

Figure 4.10 shows here what

ringtone you want and how loud

the ringtone is.

Proposed design

Code red indicates a combative or aggressive person, requiring security personnel.

Code blue indicates the person is in urgent need of medical care. Code gray alerts

indicate that the person is trapped somewhere or missing due to lost track of place and

needs a rescue service.


(papaltan pa to)

RESEARCH DESIGN

The researchers used different methods and procedures to develop an

improvised keychain and emergency application. The design, program diagrams, and

methods are discussed in this chapter.

The methodology that will be implemented for the research is Python , Arduino Uno,

and Internet of things (IoT). More broadly, the Internet of Things is a platform which

enables the exchange of goods and services between all elements, equipment, and

objects connected to the network. Traditionally, Wi-Fi is the only way to connect to other

devices, while now, network platforms like 5G are now increasingly capable of handling

large datasets with speed and reliability. Thus, the IoT is a true innovation of what we

know as the Internet by adding a more extensive interconnectivity, a better perception of

information and more complete intelligent services. The foregoing method is an

emerging paradigm based on the global internet that will change people's quality lives

and enterprises’ productivity. Offering numerous new opportunities for access to data,

specific services in education, utilities, security, healthcare or transport, among other

fields. Imagine a world where everything is interconnected through technological

innovation. (Kumar et al., 2019)


Python is undoubtedly the most accessible programming language available as it is

user-friendly and not complicated. Python is very easy to learn for beginners, new

developers and non-developers. It has a simplified syntax and is not complicated, and

Python codes can be written more easily than other languages. (Summerfield, 2013)

Lastly, the idea of the Arduino development concept is to make it easier to create

interactive objects or environments and to make them more accessible. To this end it

was designed to be affordable and accessible, allowing amateur developers, students,

and professionals to create devices and projects that interact with the environment

through the use of sensors and actuators. Simple robots, system security concerns, and

motion sensors are common Arduino projects. (Louis, 2018 )

You might also like