SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
Sujata Punait. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 7, Issue 6, (Part -4) June 2017, pp.102-105
www.ijera.com DOI: 10.9790/9622-070604102105 102 | P a g e
An Improved Personal Security System
Sujata Punait*, A.R Askhedkar**
*(Department of Electronics & Telecommunication, MIT COE Pune, Maharashtra
** Department of Electronics & Telecommunication, MIT COE Pune, Maharashtra
ABSTRACT
In current period an enormous rise in crime against women can be observed and along with women even
children, old age people are also suffering with inhuman activities as kidnapping. Women feel insecure roaming
around the city alone, even the family members are always worried about their security till the time they get
back safe. Many personal security solutions are available in the market in form of mobile applications and
wearable devices as wrist bands, pendants, etc.. But all these already available solutions prove useless if the
user is unable to trigger the device or mobile app in case of danger and also if device is lost or broken or battery
goes low. This paper proposes a new improved personal security solution that will overcome these drawbacks of
wearable devices and mobile applications making it more reliable solution for security.
Keywords: AI Thinker A7, Email Scheduler, Google docs, Raspberry Pi 3, Wearable device
I. INTRODUCTION
Today in the current worldwide situation,
the prime question in each and every lady mind of
every age group , considering the continually rising
increment of issues on ladies badgering in later past,
is just about her well being and security. The main
thought frequenting in every girl mind is the point at
which they will have the capacity to move
uninhibitedly in the city indeed, even in odd hours
without stressing over their security. Rape is the
fourth most common crime against Women in India.
According to latest National Crime Records Bureau
(NCRB) 2013 annual report, 33,707 rape cases are
reported across only India. The number of reported
rape cases has been steadily increasing over the past
decade. A step towards curbing incidents of this
heinous crime is to develop a reliable security
solution. Presently, women safety is not alone an
issue but almost every individual is unsafe wether it
is a child, man ,old age people.India is growing
economically but still lot of attention is required in
security field. Many times , especially in kidnapping
or murder cases , the relatives of the victim and
police comes to know about the incidence after
several days or sometimes even after several weeks.
Till that time investigation process for the police
becomes difficult and chances of saving the person
also reduces . This paper presents a review of various
existing systems or devices that provides solution to
personal security issues and a new improved personal
security system is also presented overcoming the
drawbacks of various already available systems or
devices in the market. Most of the security solutions
are built using wearable technology. The terms
“wearable technology”, “wearable devices”, and
“wearables” all refer to electronic technologies
incorporated into items of clothing and accessories as
bracelet ,pendant etc. which can comfortably be worn
on the body. These wearable devices can perform
many of the same computing tasks as mobile phones
and laptop computers; however, in some cases,
wearable technology can outperform these hand-held
devices entirely. Generally, wearable technology will
have some form of communications capability and
that makes possible for the user access to information
in real time. Data-input capabilities are also a feature
of such devices, as is local storage.Some of the
examples of wearable devices include watches,
glasses, contact lenses, e-textiles and smart fabrics,
headbands, beanies and caps, bracelets, and hearing
aid-like devices that are designed to look like earrings.
Security devices are also becoming wearable
beacuse of ease in their usage in comparison to
smartphones . A professor at Georgia Tech, Starner
found a thumb rule for accesing devices called it the
magic two-second rule. “If you can’t get to a tool
within two seconds,” he says, “your use of it goes
down exponentially.” Even today, smartphones have
trouble meeting that standard. By the time we extract
them from our skinny jeans, swipe, type a passcode,
and find our way to whichever app we wanted, the
moment has usually passed. As Many a times
existing solutions fails to prove useful in case of
danger if our device is lost or broken or it fails due to
some technical fault or person is unable to trigger the
device or sometimes battery is discharged.This paper
presents an improved personal security system which
will overcome these drawbacks.
II. EXISTING SOLUTIONS
Many solutions are available for security of people.
These solutions are in form of a device or available as
an application which requires smartphones.
RESEARCH ARTICLE OPEN ACCESS
Sujata Punait. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 7, Issue 6, (Part -4) June 2017, pp.102-105
www.ijera.com DOI: 10.9790/9622-070604102105 103 | P a g e
2.1 Existing solutions in form of a device
This paper [1] suggests a new perspective to
use technology to protect women. The system
comprise of a normal cloves which when triggered ,
tracks the location of the victim using GPS (Global
Positioning System) and sends emergency messages
using GSM (Global System for Mobile
communication), to three emergency contacts and the
police control room. The system also consists of a
screaming alarm that uses real time clock, to call out
for help. This paper [2] presents device resembling a
wrist band incorporated with pressure switch as an
input which when activates shows the result
.Screaming alarm and tear gas mechanism are
included for self-defensing purpose and send location
and messages to the emergency contacts and also
figure out the attacker using live streaming video.
Tear gas mechanism and live streaming video using
webcam is combined together in the spectacles that
act as a weapon of the smart technology. This paper
[3] proposes a device which is the formed by
combining multiple devices, hardware comprises of a
wearable “Smart band” which continuously
communicates with Smart phone that has access to
the internet. The application is programmed and also
it is loaded with all the required data which is Human
behavior and reactions to varying situations like
anger, fear and anxiety. This generates a signal which
is transmitted to the smart phone. The software or
application has access to GPS and Messaging
services which is pre-programmed in such a way that
whenever it receives emergency signal, it can send
help request along with the location co-ordinates to
the nearest Police station, relatives and the people in
the near radius who have application. This action
enables help instantaneously from the Police as well
as Public in the near radius who can reach the victim
with great accuracy. This paper[4] intends to present
a practical and feasible combination of technologies
for Woman Safety in the society . A social group,
Guardians created by the system, where in to enlist
verified users who can be contacted in case of
emergency, acts as a community database. This
technique is to alert people closest to the victim by
using IEEE 802.15.4 standard, ZigBee wireless
communication and a GPS tracking application. On
triggering alert, a GSM module sends text message to
individuals predefined list. Simultaneously the
wireless communication module sends location
details to other devices in range. While the broadcast
receiver of the victims smart phone application
checks for the message sent from the wearable piece
on doing so the application retrieves contacts from
the database for any Guardian in range.
2.2 Existing solution in form of mobile
applications
This paper[5] presents Abhaya, an Android
Application for the Safety of Women and this app can
be activated this app by a single click, whenever need
arises. A single click on this app identifies the
location of place through GPS and sends a message
comprising this location URL to the registered
contacts and also call on the first registered contact to
help the one in dangerous situations. The unique
feature of this application is to send the message to
the registered contacts continuously for every five
minutes until the “stop” button in the application is
clicked. Continuous location tracking information via
SMS helps to find the location of the victim quickly
and can be rescued safely. This paper[6] presents
SCIWARS (Spy Camera Identification And Women
Attack Rescue System) intelligent alerts system
which will help to prevent from being victim of any
kind of attack or spy cameras. This system comprises
of two parts, first part will detect Hidden cameras,
which are hidden in hotels room, changing rooms.
The second part will helps victims from attack like
physical violence, if victims feels unsecure and
helpless at any time then by pressing any key of her
mobile continuously the alert message is send to
nearest police control room, family, ambulance,
friends which are in emergency list that alert message
will contains the entire location of that victims place
and images of that location which are taken by
camera of her mobile.
III. PROPOSED SYSTEM
The proposed system comprises of a
wearable device that can be embedded into a purse or
clutch or also into clothes .Below figure represents
the block diagram of proposed security system for
personal safety.
Fig 1. Block diagram of Personal Security System
The device part consists of a wearable
device like a bracelet. Wearable devices can be worn
and forgotten about , very easy to handle and use .
This wearable bracelet is integration of Rapberry Pi 3
, AI thinker A7 having GSM and GPS module on
same chip and a switch for triggering the device.
Sujata Punait. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 7, Issue 6, (Part -4) June 2017, pp.102-105
www.ijera.com DOI: 10.9790/9622-070604102105 104 | P a g e
Raspberry Pi is a series of small single board
computers which has evolved through various
versions to improve memory capacity and peripheral
device support. In this system, Raspberry Pi 3 having
quad -core Cortex A53gives 10 times the
performance of Raspberry pi 1 , 80% faster than
Raspberry Pi 2 in parallelized task and provides Wi-
Fi facility is used for forwarding location of user to
preset contacts and along with that ,stores data to the
Google cloud.
AI Thinker A7 is a GSM/GPRS/GPS function
module. It supports GSM/GPRS Quad-
Band(850/900/1800/1900) network. Also, it
supports voice calls, SMS messages, GPRS data
service and GPS function .We can use it make a
simple phone. The module is controlled by AT
command via UART and supports 3.3V and 4.2V
logical level.
IV. METHODOLOGY
If device is working properly then,
 When user is in danger , will trigger the device
by pressing a switch and help SMS with detail of
location will be sent to predefined contact.
 Along side user’s location information is getting
stored continuously on google cloud.
If device not working properly / gets broken / user
unable to trigger the device/internet is not available
then,
 Location information was getting stored on the
cloud so by use of gmail scheduler this
information as an attachement will be forwarded
to some predefined email Id’s if the user is
unable to reset the scheduled time of the email
and this also ensures that user is in danger .
V. PROTOTYPE DEVELOPED AND
OUTCOMES
Wearable device protoype is developed which can be
embedded into a purse or clutch of a women or even
in clothes. Fig. 2 shows the prototype developed of
the device.
Fig 2 . Prototype of Wearable Device
Below figure shows the stored location information
of the user in google spreadsheet.
Fig 3. Stored location information of the user
When device works properly and user is able to
trigger the device then an SMS is sent to pre-
registered numbers as shown in below figure.
Sujata Punait. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 7, Issue 6, (Part -4) June 2017, pp.102-105
www.ijera.com DOI: 10.9790/9622-070604102105 105 | P a g e
Fig.4 : SMS sent to pre-registered contacts
Below figure depicts the email scheduler screen
where email is scheduled by the user .
Fig 5 .Email scheduled using email scheduler
VI. ADVANTAGES
 Easy to use as can be used as a wearable device
such as it can be embedded into a purse or clutch
or attached with the belt so it will not be visible
and attacker may not be able to identify the
device
 Ensures privacy of data as location information
of person is getting stored onto google docs i.e
google spreadsheet
 User relatives and friends will come to know that
he/she is in danger even if he/she is unable to
trigger the device or it gets broken
 Stored data on google spreadsheet will prove
really useful to the police in investigation
procedure as it can rely on the stored location
information of the user
 This stored information speeds up the
investigation procedure
VII. CONCLUSION
Personal Security system presented in this
paper will overcome the drawbacks of already
available solutions in the market for safety of a child ,
a girl or an old age person by ensuring data is getting
continuously stored to google spreadsheet and can be
forwarded to the relatives or friends of user in case of
danger. Solar and thermal energy harvesting
techniques can be used to power the wearable device
and also Raspberry pi 3 can be replaced by more
appropriate component.
REFERENCES
[1]. Gowri Predeba.B et al. , “Women Security
System Using GSM and GPS,” International
Journal of Advanced Reasearch in Engineering
and Technology,Volume 3 , Issue 19, pp.247-250,
April 2016
[2]. Geetha Pratyusha Miriyala et al. , “Smart
Intelligent Security System for Women”
International Journal of Electronics and
Communication Engineering &
TechnologyVolume 7, Issue 2, pp. 41–46
,March-April 2016
[3]. G.C. Harikiran et al. , “Smart security
solution for women based on IoT,”
International Conference on Electrical,
Electronics, and Optimization Techniques
(ICEEOT) ,Chennai ,India – 2016
[4]. Tuman Poddar et al., “Using wearable
technology to answer women’s safety
International Journal of Science, Technology
& Management ,Volume No.04, Issue No.
05, May 2015
[5]. Ravi Sekhar Yarrabothu and Bramaramika
Thota , “Abhaya :An Android App for
Safety of Women,” Annual IEEE India
Conference (INDICON), 2015,New Delhi
,India
[6]. VaijayantiPawar et al. “SCIWARS Android
App for Women Safety,” International
Journal of Engineering Research and
Applications, Vol. 4, Issue 3( Version 1),
pp.823-826,March 2014,

Más contenido relacionado

La actualidad más candente

76201975
7620197576201975
76201975IJRAT
 
Activity Tracker Wrist Band for Children Monitoring using IOT
Activity Tracker Wrist Band for Children Monitoring using IOTActivity Tracker Wrist Band for Children Monitoring using IOT
Activity Tracker Wrist Band for Children Monitoring using IOTrahulmonikasharma
 
87202003
8720200387202003
87202003IJRAT
 
IRJET - Women Safety Device with GPS Tracking and Alerts
IRJET -  	  Women Safety Device with GPS Tracking and AlertsIRJET -  	  Women Safety Device with GPS Tracking and Alerts
IRJET - Women Safety Device with GPS Tracking and AlertsIRJET Journal
 
A women secure mobile app for emergency usage (go safe app)
A women secure mobile app for emergency usage (go safe app)A women secure mobile app for emergency usage (go safe app)
A women secure mobile app for emergency usage (go safe app)eSAT Journals
 
IRJET- Intelligent Manhole Cover System
IRJET- Intelligent Manhole Cover SystemIRJET- Intelligent Manhole Cover System
IRJET- Intelligent Manhole Cover SystemIRJET Journal
 
A Mobile Based Women Safety Application (I Safe Apps)
A Mobile Based Women Safety Application (I Safe Apps)A Mobile Based Women Safety Application (I Safe Apps)
A Mobile Based Women Safety Application (I Safe Apps)IOSR Journals
 
IRJET - Ensuring Women Safety by Offline Tracking
IRJET -  	  Ensuring Women Safety by Offline TrackingIRJET -  	  Ensuring Women Safety by Offline Tracking
IRJET - Ensuring Women Safety by Offline TrackingIRJET Journal
 
IRJET- Smart Rescue System using Android Smart Phone
IRJET-  	  	  Smart Rescue System using Android Smart PhoneIRJET-  	  	  Smart Rescue System using Android Smart Phone
IRJET- Smart Rescue System using Android Smart PhoneIRJET Journal
 
Cloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewCloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewIJSRD
 
Application for Women Safety
Application for Women SafetyApplication for Women Safety
Application for Women Safetyiosrjce
 
IRJET- Use of Artificial Intelligence in Cyber Defence
IRJET- Use of Artificial Intelligence in Cyber DefenceIRJET- Use of Artificial Intelligence in Cyber Defence
IRJET- Use of Artificial Intelligence in Cyber DefenceIRJET Journal
 
Sniffer Technology Complete Report
Sniffer Technology Complete ReportSniffer Technology Complete Report
Sniffer Technology Complete ReportChethanHR10
 
Importance of Electronic Surveillance in Criminal Investigation
Importance of Electronic Surveillance in Criminal InvestigationImportance of Electronic Surveillance in Criminal Investigation
Importance of Electronic Surveillance in Criminal InvestigationIRJET Journal
 
IRJET - Smart License Generation in RTO
IRJET - Smart License Generation in RTOIRJET - Smart License Generation in RTO
IRJET - Smart License Generation in RTOIRJET Journal
 
IRJET- Body Sensor Network using Raspberry Pi3: IoT
IRJET- Body Sensor Network using Raspberry Pi3: IoTIRJET- Body Sensor Network using Raspberry Pi3: IoT
IRJET- Body Sensor Network using Raspberry Pi3: IoTIRJET Journal
 
IRJET - Android App for Women Security
IRJET -  	  Android App for Women SecurityIRJET -  	  Android App for Women Security
IRJET - Android App for Women SecurityIRJET Journal
 

La actualidad más candente (20)

76201975
7620197576201975
76201975
 
Activity Tracker Wrist Band for Children Monitoring using IOT
Activity Tracker Wrist Band for Children Monitoring using IOTActivity Tracker Wrist Band for Children Monitoring using IOT
Activity Tracker Wrist Band for Children Monitoring using IOT
 
87202003
8720200387202003
87202003
 
IRJET - Women Safety Device with GPS Tracking and Alerts
IRJET -  	  Women Safety Device with GPS Tracking and AlertsIRJET -  	  Women Safety Device with GPS Tracking and Alerts
IRJET - Women Safety Device with GPS Tracking and Alerts
 
A women secure mobile app for emergency usage (go safe app)
A women secure mobile app for emergency usage (go safe app)A women secure mobile app for emergency usage (go safe app)
A women secure mobile app for emergency usage (go safe app)
 
Women’s Safety Jacket
Women’s Safety JacketWomen’s Safety Jacket
Women’s Safety Jacket
 
IRJET- Intelligent Manhole Cover System
IRJET- Intelligent Manhole Cover SystemIRJET- Intelligent Manhole Cover System
IRJET- Intelligent Manhole Cover System
 
A Mobile Based Women Safety Application (I Safe Apps)
A Mobile Based Women Safety Application (I Safe Apps)A Mobile Based Women Safety Application (I Safe Apps)
A Mobile Based Women Safety Application (I Safe Apps)
 
IRJET - Ensuring Women Safety by Offline Tracking
IRJET -  	  Ensuring Women Safety by Offline TrackingIRJET -  	  Ensuring Women Safety by Offline Tracking
IRJET - Ensuring Women Safety by Offline Tracking
 
IRJET- Smart Rescue System using Android Smart Phone
IRJET-  	  	  Smart Rescue System using Android Smart PhoneIRJET-  	  	  Smart Rescue System using Android Smart Phone
IRJET- Smart Rescue System using Android Smart Phone
 
Cloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewCloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature Review
 
Application for Women Safety
Application for Women SafetyApplication for Women Safety
Application for Women Safety
 
IRJET- Use of Artificial Intelligence in Cyber Defence
IRJET- Use of Artificial Intelligence in Cyber DefenceIRJET- Use of Artificial Intelligence in Cyber Defence
IRJET- Use of Artificial Intelligence in Cyber Defence
 
GO SAFE: Rapid Intelligent System for Women and Child Safety
GO SAFE: Rapid Intelligent System for Women and Child SafetyGO SAFE: Rapid Intelligent System for Women and Child Safety
GO SAFE: Rapid Intelligent System for Women and Child Safety
 
Sniffer Technology Complete Report
Sniffer Technology Complete ReportSniffer Technology Complete Report
Sniffer Technology Complete Report
 
Importance of Electronic Surveillance in Criminal Investigation
Importance of Electronic Surveillance in Criminal InvestigationImportance of Electronic Surveillance in Criminal Investigation
Importance of Electronic Surveillance in Criminal Investigation
 
I am secure android application
I am secure android applicationI am secure android application
I am secure android application
 
IRJET - Smart License Generation in RTO
IRJET - Smart License Generation in RTOIRJET - Smart License Generation in RTO
IRJET - Smart License Generation in RTO
 
IRJET- Body Sensor Network using Raspberry Pi3: IoT
IRJET- Body Sensor Network using Raspberry Pi3: IoTIRJET- Body Sensor Network using Raspberry Pi3: IoT
IRJET- Body Sensor Network using Raspberry Pi3: IoT
 
IRJET - Android App for Women Security
IRJET -  	  Android App for Women SecurityIRJET -  	  Android App for Women Security
IRJET - Android App for Women Security
 

Similar a An Improved Personal Security System

ELECTRONIC JACKET FOR WOMEN SAFETY
ELECTRONIC JACKET FOR WOMEN SAFETYELECTRONIC JACKET FOR WOMEN SAFETY
ELECTRONIC JACKET FOR WOMEN SAFETYIRJET Journal
 
IRJET- Modern Era and Security of Women: An Intellectual Device
IRJET- Modern Era and Security of Women: An Intellectual DeviceIRJET- Modern Era and Security of Women: An Intellectual Device
IRJET- Modern Era and Security of Women: An Intellectual DeviceIRJET Journal
 
Implementation of Women Safety System using Internet of Things
Implementation of Women Safety System using Internet of ThingsImplementation of Women Safety System using Internet of Things
Implementation of Women Safety System using Internet of Thingsijtsrd
 
Biometric Security Bags
Biometric Security BagsBiometric Security Bags
Biometric Security Bagsijtsrd
 
IRJET- Women Safety using IoT
IRJET- Women Safety using IoTIRJET- Women Safety using IoT
IRJET- Women Safety using IoTIRJET Journal
 
Women Safety Application Android Project
Women Safety Application Android ProjectWomen Safety Application Android Project
Women Safety Application Android ProjectIRJET Journal
 
SMART SECURITY DEVICE FOR WOMEN USING IOT
SMART SECURITY DEVICE FOR WOMEN USING IOTSMART SECURITY DEVICE FOR WOMEN USING IOT
SMART SECURITY DEVICE FOR WOMEN USING IOTIRJET Journal
 
Internet of Things Based Women Tracking and Security with Auto-Defender System
Internet of Things Based Women Tracking and Security with Auto-Defender SystemInternet of Things Based Women Tracking and Security with Auto-Defender System
Internet of Things Based Women Tracking and Security with Auto-Defender Systemrahulmonikasharma
 
Published in the journal
Published in the journalPublished in the journal
Published in the journalsamuu45sam
 
thomson reuters indexing journals
 thomson reuters indexing journals thomson reuters indexing journals
thomson reuters indexing journalssana473753
 
PHD research publications
PHD research publicationsPHD research publications
PHD research publicationssana473753
 
PHD research publications
 PHD research publications PHD research publications
PHD research publicationssana473753
 
IJSRED-V2I3P47
IJSRED-V2I3P47IJSRED-V2I3P47
IJSRED-V2I3P47IJSRED
 
IRJET- Smart Shield for Women Safety
IRJET-  	  Smart Shield for Women SafetyIRJET-  	  Smart Shield for Women Safety
IRJET- Smart Shield for Women SafetyIRJET Journal
 
Biometric Security Bags
Biometric Security BagsBiometric Security Bags
Biometric Security Bagsijtsrd
 
Smartphone Security
Smartphone SecuritySmartphone Security
Smartphone SecurityMalasta Hill
 
RAT Trap: Home Surveillance System Using IoT & AI
RAT Trap: Home Surveillance System Using IoT & AIRAT Trap: Home Surveillance System Using IoT & AI
RAT Trap: Home Surveillance System Using IoT & AIIRJET Journal
 
Seminer 1 iot based
Seminer 1 iot basedSeminer 1 iot based
Seminer 1 iot basedHari haran
 
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLE
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLEDESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLE
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLEijdpsjournal
 
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLE
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLEDESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLE
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLEijdpsjournal
 

Similar a An Improved Personal Security System (20)

ELECTRONIC JACKET FOR WOMEN SAFETY
ELECTRONIC JACKET FOR WOMEN SAFETYELECTRONIC JACKET FOR WOMEN SAFETY
ELECTRONIC JACKET FOR WOMEN SAFETY
 
IRJET- Modern Era and Security of Women: An Intellectual Device
IRJET- Modern Era and Security of Women: An Intellectual DeviceIRJET- Modern Era and Security of Women: An Intellectual Device
IRJET- Modern Era and Security of Women: An Intellectual Device
 
Implementation of Women Safety System using Internet of Things
Implementation of Women Safety System using Internet of ThingsImplementation of Women Safety System using Internet of Things
Implementation of Women Safety System using Internet of Things
 
Biometric Security Bags
Biometric Security BagsBiometric Security Bags
Biometric Security Bags
 
IRJET- Women Safety using IoT
IRJET- Women Safety using IoTIRJET- Women Safety using IoT
IRJET- Women Safety using IoT
 
Women Safety Application Android Project
Women Safety Application Android ProjectWomen Safety Application Android Project
Women Safety Application Android Project
 
SMART SECURITY DEVICE FOR WOMEN USING IOT
SMART SECURITY DEVICE FOR WOMEN USING IOTSMART SECURITY DEVICE FOR WOMEN USING IOT
SMART SECURITY DEVICE FOR WOMEN USING IOT
 
Internet of Things Based Women Tracking and Security with Auto-Defender System
Internet of Things Based Women Tracking and Security with Auto-Defender SystemInternet of Things Based Women Tracking and Security with Auto-Defender System
Internet of Things Based Women Tracking and Security with Auto-Defender System
 
Published in the journal
Published in the journalPublished in the journal
Published in the journal
 
thomson reuters indexing journals
 thomson reuters indexing journals thomson reuters indexing journals
thomson reuters indexing journals
 
PHD research publications
PHD research publicationsPHD research publications
PHD research publications
 
PHD research publications
 PHD research publications PHD research publications
PHD research publications
 
IJSRED-V2I3P47
IJSRED-V2I3P47IJSRED-V2I3P47
IJSRED-V2I3P47
 
IRJET- Smart Shield for Women Safety
IRJET-  	  Smart Shield for Women SafetyIRJET-  	  Smart Shield for Women Safety
IRJET- Smart Shield for Women Safety
 
Biometric Security Bags
Biometric Security BagsBiometric Security Bags
Biometric Security Bags
 
Smartphone Security
Smartphone SecuritySmartphone Security
Smartphone Security
 
RAT Trap: Home Surveillance System Using IoT & AI
RAT Trap: Home Surveillance System Using IoT & AIRAT Trap: Home Surveillance System Using IoT & AI
RAT Trap: Home Surveillance System Using IoT & AI
 
Seminer 1 iot based
Seminer 1 iot basedSeminer 1 iot based
Seminer 1 iot based
 
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLE
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLEDESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLE
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLE
 
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLE
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLEDESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLE
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLE
 

Último

SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 

Último (20)

SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 

An Improved Personal Security System

  • 1. Sujata Punait. Int. Journal of Engineering Research and Application www.ijera.com ISSN : 2248-9622, Vol. 7, Issue 6, (Part -4) June 2017, pp.102-105 www.ijera.com DOI: 10.9790/9622-070604102105 102 | P a g e An Improved Personal Security System Sujata Punait*, A.R Askhedkar** *(Department of Electronics & Telecommunication, MIT COE Pune, Maharashtra ** Department of Electronics & Telecommunication, MIT COE Pune, Maharashtra ABSTRACT In current period an enormous rise in crime against women can be observed and along with women even children, old age people are also suffering with inhuman activities as kidnapping. Women feel insecure roaming around the city alone, even the family members are always worried about their security till the time they get back safe. Many personal security solutions are available in the market in form of mobile applications and wearable devices as wrist bands, pendants, etc.. But all these already available solutions prove useless if the user is unable to trigger the device or mobile app in case of danger and also if device is lost or broken or battery goes low. This paper proposes a new improved personal security solution that will overcome these drawbacks of wearable devices and mobile applications making it more reliable solution for security. Keywords: AI Thinker A7, Email Scheduler, Google docs, Raspberry Pi 3, Wearable device I. INTRODUCTION Today in the current worldwide situation, the prime question in each and every lady mind of every age group , considering the continually rising increment of issues on ladies badgering in later past, is just about her well being and security. The main thought frequenting in every girl mind is the point at which they will have the capacity to move uninhibitedly in the city indeed, even in odd hours without stressing over their security. Rape is the fourth most common crime against Women in India. According to latest National Crime Records Bureau (NCRB) 2013 annual report, 33,707 rape cases are reported across only India. The number of reported rape cases has been steadily increasing over the past decade. A step towards curbing incidents of this heinous crime is to develop a reliable security solution. Presently, women safety is not alone an issue but almost every individual is unsafe wether it is a child, man ,old age people.India is growing economically but still lot of attention is required in security field. Many times , especially in kidnapping or murder cases , the relatives of the victim and police comes to know about the incidence after several days or sometimes even after several weeks. Till that time investigation process for the police becomes difficult and chances of saving the person also reduces . This paper presents a review of various existing systems or devices that provides solution to personal security issues and a new improved personal security system is also presented overcoming the drawbacks of various already available systems or devices in the market. Most of the security solutions are built using wearable technology. The terms “wearable technology”, “wearable devices”, and “wearables” all refer to electronic technologies incorporated into items of clothing and accessories as bracelet ,pendant etc. which can comfortably be worn on the body. These wearable devices can perform many of the same computing tasks as mobile phones and laptop computers; however, in some cases, wearable technology can outperform these hand-held devices entirely. Generally, wearable technology will have some form of communications capability and that makes possible for the user access to information in real time. Data-input capabilities are also a feature of such devices, as is local storage.Some of the examples of wearable devices include watches, glasses, contact lenses, e-textiles and smart fabrics, headbands, beanies and caps, bracelets, and hearing aid-like devices that are designed to look like earrings. Security devices are also becoming wearable beacuse of ease in their usage in comparison to smartphones . A professor at Georgia Tech, Starner found a thumb rule for accesing devices called it the magic two-second rule. “If you can’t get to a tool within two seconds,” he says, “your use of it goes down exponentially.” Even today, smartphones have trouble meeting that standard. By the time we extract them from our skinny jeans, swipe, type a passcode, and find our way to whichever app we wanted, the moment has usually passed. As Many a times existing solutions fails to prove useful in case of danger if our device is lost or broken or it fails due to some technical fault or person is unable to trigger the device or sometimes battery is discharged.This paper presents an improved personal security system which will overcome these drawbacks. II. EXISTING SOLUTIONS Many solutions are available for security of people. These solutions are in form of a device or available as an application which requires smartphones. RESEARCH ARTICLE OPEN ACCESS
  • 2. Sujata Punait. Int. Journal of Engineering Research and Application www.ijera.com ISSN : 2248-9622, Vol. 7, Issue 6, (Part -4) June 2017, pp.102-105 www.ijera.com DOI: 10.9790/9622-070604102105 103 | P a g e 2.1 Existing solutions in form of a device This paper [1] suggests a new perspective to use technology to protect women. The system comprise of a normal cloves which when triggered , tracks the location of the victim using GPS (Global Positioning System) and sends emergency messages using GSM (Global System for Mobile communication), to three emergency contacts and the police control room. The system also consists of a screaming alarm that uses real time clock, to call out for help. This paper [2] presents device resembling a wrist band incorporated with pressure switch as an input which when activates shows the result .Screaming alarm and tear gas mechanism are included for self-defensing purpose and send location and messages to the emergency contacts and also figure out the attacker using live streaming video. Tear gas mechanism and live streaming video using webcam is combined together in the spectacles that act as a weapon of the smart technology. This paper [3] proposes a device which is the formed by combining multiple devices, hardware comprises of a wearable “Smart band” which continuously communicates with Smart phone that has access to the internet. The application is programmed and also it is loaded with all the required data which is Human behavior and reactions to varying situations like anger, fear and anxiety. This generates a signal which is transmitted to the smart phone. The software or application has access to GPS and Messaging services which is pre-programmed in such a way that whenever it receives emergency signal, it can send help request along with the location co-ordinates to the nearest Police station, relatives and the people in the near radius who have application. This action enables help instantaneously from the Police as well as Public in the near radius who can reach the victim with great accuracy. This paper[4] intends to present a practical and feasible combination of technologies for Woman Safety in the society . A social group, Guardians created by the system, where in to enlist verified users who can be contacted in case of emergency, acts as a community database. This technique is to alert people closest to the victim by using IEEE 802.15.4 standard, ZigBee wireless communication and a GPS tracking application. On triggering alert, a GSM module sends text message to individuals predefined list. Simultaneously the wireless communication module sends location details to other devices in range. While the broadcast receiver of the victims smart phone application checks for the message sent from the wearable piece on doing so the application retrieves contacts from the database for any Guardian in range. 2.2 Existing solution in form of mobile applications This paper[5] presents Abhaya, an Android Application for the Safety of Women and this app can be activated this app by a single click, whenever need arises. A single click on this app identifies the location of place through GPS and sends a message comprising this location URL to the registered contacts and also call on the first registered contact to help the one in dangerous situations. The unique feature of this application is to send the message to the registered contacts continuously for every five minutes until the “stop” button in the application is clicked. Continuous location tracking information via SMS helps to find the location of the victim quickly and can be rescued safely. This paper[6] presents SCIWARS (Spy Camera Identification And Women Attack Rescue System) intelligent alerts system which will help to prevent from being victim of any kind of attack or spy cameras. This system comprises of two parts, first part will detect Hidden cameras, which are hidden in hotels room, changing rooms. The second part will helps victims from attack like physical violence, if victims feels unsecure and helpless at any time then by pressing any key of her mobile continuously the alert message is send to nearest police control room, family, ambulance, friends which are in emergency list that alert message will contains the entire location of that victims place and images of that location which are taken by camera of her mobile. III. PROPOSED SYSTEM The proposed system comprises of a wearable device that can be embedded into a purse or clutch or also into clothes .Below figure represents the block diagram of proposed security system for personal safety. Fig 1. Block diagram of Personal Security System The device part consists of a wearable device like a bracelet. Wearable devices can be worn and forgotten about , very easy to handle and use . This wearable bracelet is integration of Rapberry Pi 3 , AI thinker A7 having GSM and GPS module on same chip and a switch for triggering the device.
  • 3. Sujata Punait. Int. Journal of Engineering Research and Application www.ijera.com ISSN : 2248-9622, Vol. 7, Issue 6, (Part -4) June 2017, pp.102-105 www.ijera.com DOI: 10.9790/9622-070604102105 104 | P a g e Raspberry Pi is a series of small single board computers which has evolved through various versions to improve memory capacity and peripheral device support. In this system, Raspberry Pi 3 having quad -core Cortex A53gives 10 times the performance of Raspberry pi 1 , 80% faster than Raspberry Pi 2 in parallelized task and provides Wi- Fi facility is used for forwarding location of user to preset contacts and along with that ,stores data to the Google cloud. AI Thinker A7 is a GSM/GPRS/GPS function module. It supports GSM/GPRS Quad- Band(850/900/1800/1900) network. Also, it supports voice calls, SMS messages, GPRS data service and GPS function .We can use it make a simple phone. The module is controlled by AT command via UART and supports 3.3V and 4.2V logical level. IV. METHODOLOGY If device is working properly then,  When user is in danger , will trigger the device by pressing a switch and help SMS with detail of location will be sent to predefined contact.  Along side user’s location information is getting stored continuously on google cloud. If device not working properly / gets broken / user unable to trigger the device/internet is not available then,  Location information was getting stored on the cloud so by use of gmail scheduler this information as an attachement will be forwarded to some predefined email Id’s if the user is unable to reset the scheduled time of the email and this also ensures that user is in danger . V. PROTOTYPE DEVELOPED AND OUTCOMES Wearable device protoype is developed which can be embedded into a purse or clutch of a women or even in clothes. Fig. 2 shows the prototype developed of the device. Fig 2 . Prototype of Wearable Device Below figure shows the stored location information of the user in google spreadsheet. Fig 3. Stored location information of the user When device works properly and user is able to trigger the device then an SMS is sent to pre- registered numbers as shown in below figure.
  • 4. Sujata Punait. Int. Journal of Engineering Research and Application www.ijera.com ISSN : 2248-9622, Vol. 7, Issue 6, (Part -4) June 2017, pp.102-105 www.ijera.com DOI: 10.9790/9622-070604102105 105 | P a g e Fig.4 : SMS sent to pre-registered contacts Below figure depicts the email scheduler screen where email is scheduled by the user . Fig 5 .Email scheduled using email scheduler VI. ADVANTAGES  Easy to use as can be used as a wearable device such as it can be embedded into a purse or clutch or attached with the belt so it will not be visible and attacker may not be able to identify the device  Ensures privacy of data as location information of person is getting stored onto google docs i.e google spreadsheet  User relatives and friends will come to know that he/she is in danger even if he/she is unable to trigger the device or it gets broken  Stored data on google spreadsheet will prove really useful to the police in investigation procedure as it can rely on the stored location information of the user  This stored information speeds up the investigation procedure VII. CONCLUSION Personal Security system presented in this paper will overcome the drawbacks of already available solutions in the market for safety of a child , a girl or an old age person by ensuring data is getting continuously stored to google spreadsheet and can be forwarded to the relatives or friends of user in case of danger. Solar and thermal energy harvesting techniques can be used to power the wearable device and also Raspberry pi 3 can be replaced by more appropriate component. REFERENCES [1]. Gowri Predeba.B et al. , “Women Security System Using GSM and GPS,” International Journal of Advanced Reasearch in Engineering and Technology,Volume 3 , Issue 19, pp.247-250, April 2016 [2]. Geetha Pratyusha Miriyala et al. , “Smart Intelligent Security System for Women” International Journal of Electronics and Communication Engineering & TechnologyVolume 7, Issue 2, pp. 41–46 ,March-April 2016 [3]. G.C. Harikiran et al. , “Smart security solution for women based on IoT,” International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT) ,Chennai ,India – 2016 [4]. Tuman Poddar et al., “Using wearable technology to answer women’s safety International Journal of Science, Technology & Management ,Volume No.04, Issue No. 05, May 2015 [5]. Ravi Sekhar Yarrabothu and Bramaramika Thota , “Abhaya :An Android App for Safety of Women,” Annual IEEE India Conference (INDICON), 2015,New Delhi ,India [6]. VaijayantiPawar et al. “SCIWARS Android App for Women Safety,” International Journal of Engineering Research and Applications, Vol. 4, Issue 3( Version 1), pp.823-826,March 2014,