SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 3, Ver. IV (May – Jun. 2015), PP 01-04
www.iosrjournals.org
DOI: 10.9790/0661-17340104 www.iosrjournals.org 1 | Page
Application for Women Safety
1
S.Sangeetha, 2
P.Radhika PG Scholar,
Department of MCA, Panimalar Engineering College
1
sangeemca1991@gmail.com,2
radhika91mca@gmail.com
Abstract: This project presents an alert system for Women safety detection using common commercially
available electronic devices to both detect the problem and alert authorities. We use an Android based smart
phone with an integrated features that alert and provide location based information to alert authorities. Data
from the application is evaluated with several threshold based AES algorithms and position data to determine a
problem.
Our system provides a realizable, cost effective solution to problem detection using a simple graphical interface
while not overwhelming the user with uncomfortable sensors. Problem is very powerful software especially
developed for the safety of girls, whenever some body is in trouble they don’t have to sit and find contacts or
find ways to send short message service, or message the near ones. They might not have so much time.. All that
they have to do is shake the smart phone above the threshold value, vigorously. Immediately a message alert is
sent to the person’s mom, dad and whoever they wish to, if their guardians also have a smart phone. Even
though if it is in silent mode. When a message called alert is received it automatically changes its profile to
general, and gives a message notification YOUR DAUGHTER IS IN TROUBLE PLZ HELPS…. PLZ HELP….
PLZ HELP…. REPEATEDLY AS A message until they seen and stop it..
Now a day security of women is becoming very poor and the need for this kind of this application is steadily
increasing work wise, we will develop a routine schedule based mechanism to monitor the women’s security
using GPS (Global Positioning System), GPRS (General Packet Radio Service), etc.…
Keywords: Smartphone, GPS, GPRS…
I. Introduction
This application is generally meant for the attention of the authorities or public in the emergency
response capabilities such as terrorist attacks and the natural disaster by facilitating the communication We will
be tracking the location of the person via GPS and storing the details of the current location into a remote server
via GPRS consecutively, we will also be tracking the schedule of the person as per the schedule list which is
being uploaded by the person and we will be sending SMS to the relatives of the concerned person about the
schedule their current location of the concerned person that time. So that they will come to know about the
status and if something is wrong, we will be having another set of oppositions to give a call to a police, social
workers, volunteer organizations, etc.
With their respective along the mobile phones. The difficulties in the existing application are the lack
of situational awareness and communication terminology among their respective. Due to this response and
recovery is Difficult to the authorities. In respect of the public safety with the support of the network provider
the application runs in the android phones in efficient way to identify and recover the problem by the natural
disaster or terrorist attacks etc… Furthermore users are likely to operate the mobile devices for the security
purpose to intimate the problem detection to their respective in the emergency cases.
II. Application Requirements
To develop the application android based mobile application the station and the environment of the
surrounding has to been interviewed then the dangerous and the suspicious activates should be notified to the
device by the user .if the device detects the problem then only other process creates the attention for reporting to
the authority.
1)Time Schedule:
When the apps get installed it traces out the IMEI, SIM, mobile number and stores on the remote
server, the daily schedule list gets uploaded by the person from her mobile and get tracked as per the schedule
list, if there is any deviation in the schedule they relatives of the person will get an SMS along with the current
location and the schedule and Police station members will get a call from the mobile.
Application for Women Safety
DOI: 10.9790/0661-17340104 www.iosrjournals.org 2 | Page
2) Tracking:
The GPS will regularly transmit the latitude and longitude of the person and via GPRS we will store
the entire transmitted cloud server; if the person is lost we can trace the end location with this kind of approach.
3) Notification:
When the person is in trouble, when she presses an alarm in the application all her relatives,
voluntary organization members, police men will get an SMS with her full contact details along with the current
location from where the message has been delivered. Using the IMEI number the policemen can track the
location where they are travelling.
4) Network provider support:
Network provider has got the important role, by sending the commands through the short message type
to the different applications.
5) GPS (Global positioning system)
The GPS, elaborated as Global Positioning System, is a satellite based navigation system made up of a
network of 24 satel-lites placed into orbit by the U.S. GPS works in any weather conditions, anywhere in the
world, 24 hours a day. There are no subscription fees or setup charges to use GPS . A GPS can help us to
determine exactly where we are at any given moment. Not only can a GPS give us the name of the street we
might be traveling on, but many GPS systems can also give us the exact latitude and longitude of where you are
located. On the other hand, Android mobile platform is becoming more popular to the users for its multi-
dimensional purposes.Tracking System via Android Device” uses GPS and any mo-bile phones having an
Android operating system to track the location of a person whenever necessary.
III. System Study
Existing system
The women have to dial a number to call a police or send a Short Messaging Service (SMS) to the
particular subscriber code, after they received the service they will get in touch with you later and there is no
time to make a call or SMS. There are also so many volunteer organizations all over the world to help them, but
they could not able to get those messages.
Proposed system
We will be tracking the location of the person via GPS and storing the details of the current location
into a remote server via GPRS consecutively, we will also be tracking the schedule of the person as per the
schedule list which is being uploaded by the person and we will be sending SMS to the relatives of the
concerned person about the schedule their current location of the concerned person that time. So that they will
come to know about the status and if something is wrong, we will be having another set of oppositions to give a
call to a police, social workers, volunteer organizations, etc.
Features
 This project presents an alert system for Women safety detection.
 The system provides a realizable and efficient.
 The application is used Advanced Encryption Standard (AES) algorithm.
 The application is easier to use all the woman.
 The application is normal budget.
Application for Women Safety
DOI: 10.9790/0661-17340104 www.iosrjournals.org 3 | Page
IV. Architecture
V. Operating System
By considering the today’s environment most of the people using the android based mobile phones and
android is the open source which can be used and adapted easily so android operating system can be used.
Android is an operating system based on the Linux kernel, and designed primarily for touch screen
mobile devices such as smart phones and tablet computers. Initially developed by Android, Inc., which Google
backed financially .Android was unveiled in 2007 along with the founding of the Open Handset Alliance: a
consortium of hardware, software, and telecommunication companies devoted to advancing open standards for
mobile devices. The first publicly available Smartphone running Android, the HTC Dream, was released on
October 22, 2008
The user interface of Android is based on direct manipulation, using touch inputs that loosely
correspond to real-world actions, like swiping, tapping, pinching and reverse pinching to manipulate on-screen
objects. Internal hardware such as accelerometers, gyroscopes and proximity sensors are used by some
applications to respond to additional user actions, for example adjusting the screen from portrait to landscape
depending on how the device is oriented. Android allows users to customize their home screens with shortcuts
to applications and widgets, which allow users to display live content, such as emails and weather information,
directly on the home screen. Applications can further send notifications to the user to inform them of relevant
information, such as new emails and text messages.
Android is open source and Google releases the source code under the Apache License. This open-
source code and permissive licensing allows the software to be freely modified and distributed by device
manufacturers, wireless carriers and enthusiast developers. In practice, Android devices ship with a combination
of open source and proprietary software. Android has a large community of developers writing applications
("apps") that extend the functionality of devices, written primarily in the Java programming language. In
October 2012, there were approximately 700,000 apps available for Android, and the estimated number of
applications downloaded from Google Play, Android's primary app store, was 25 billion. A developer survey
conducted in April–May 2013 found that Android is the most popular platform for developers, used by 71% of
the mobile developer population.
Android is the world's most widely used Smartphone platform, overtaking Symbian in the fourth
quarter of 2010. Android is popular with technology companies who require a ready-made, low-cost,
customizable and lightweight operating system for high tech devices. Despite being primarily designed for
phones and tablets, it also has been used in televisions, games consoles, digital cameras and other electronics.
Android's open nature has encouraged a large community of developers and enthusiasts to use the open-source
Application for Women Safety
DOI: 10.9790/0661-17340104 www.iosrjournals.org 4 | Page
code as a foundation for community-driven projects, which add new features for advanced user or bring Android
to devices which were officially released running other operating systems.
As of November 2013, Android's share of the global Smartphone market, led by Samsung products, has
reached 81%.The operating system's success has made it a target for patent litigation as part of the so-called
"Smartphone" between technology companies. As of May 2013, 48 billion apps have been installed from the
Google Play store, and as of September 2013, 1 billion Android devices have been activated.
1.Applications
These are applications written in Java. Some of basic applications include a calendar, email client, SMS
program, maps, making phone calls, accessing the Web browser, accessing your contacts list and others.
If you are an average user, this is the layer you will us most, rest all layers are used by Google programmers,
developers and hardware manufacturers.
2. Application Framework
This is the skeleton or framework which all android developers has to follow. The developers can
access all framework APIs an manage phone’s n to keyword ki: basic functions like resource allocation,
switching between processes or programs, telephone applications, and keeping track of the phone’s physical
location. The architecture is well designed to simplify the reuse of components. Think of the application
framework as a set of basic tools with which a developer can build much more complex tools.
3. Libraries
This layer consists of Android libraries written in C, C++, and used by various systems. This library
tells the device how to handle different kinds of data and are exposed to Android developers via Android
Application framework. Some of these libraries includes media, graphics, 3d, SQLite, web browser library etc.
The Android runtime layer which includes set of core java libraries and DVM (Dalvik Virtual Machine) is also
located in same layer.
4. Runtime Android
This layer includes set of base libraries that are required for java libraries. Every Android application
gets its own instance of Dalvik virtual machine. Dalvik has been written so that a device can run multiple VMs
efficiently and it executes files in executable (.Dex) optimized for minimum memory.
5. Kernel – Linux:
This layer includes Android’s memory management programs, security settings, power management
software and several drivers for hardware, file system access, networking and inter-process-communication. The
kernel also acts as an abstraction layer between hardware and the rest of the software stac.
VI. Conclusion
The problem of the women safety is increased rapidly in this environment, so I proposed as an effective
Android application to prevent such type of the suspicious or natural disaster, by alerting the concern authorities
using the android mobile phone which helps to stop such type of illegal activates and to trace the concern..
References
[1]. Michael Burton ,Dohn Ferker (2012). Android Application For Dummies. 2nd ed. 111,river street,Hoboker: jhon wiely and
sons,inc. p12-90.
[2]. Cook book,reipeng liu (2013). Android Application devlopment kit. Mumbai: packt bimingam. p1-50,p67-90..
[3]. Peter Erickson, Andrew Weinert, and Dr. Paul Breimyer,Matt Samperi, Jason Huff, Carlos Parra, and Dr. Scarlett Miller. (2013).
Designing Public Safety Mobile Applications for Disconnected, Interrupted, and Low Bandwidth Communication Environments.
IEEE. 10 (978-1-4799-1535-4/13/$31.00), p790-796.

Más contenido relacionado

La actualidad más candente

IRIS RECOGNITION
IRIS RECOGNITION IRIS RECOGNITION
IRIS RECOGNITION Ankit Kumar
 
Gesture recognition adi
Gesture recognition adiGesture recognition adi
Gesture recognition adiaditya verma
 
Presentation slides on Child Tracking System
Presentation slides on Child Tracking SystemPresentation slides on Child Tracking System
Presentation slides on Child Tracking SystemMd Kafiul Islam
 
A Cloud-Based Smart-Parking System Based on Internet-of-Things Technologies
A Cloud-Based Smart-Parking System Based on Internet-of-Things TechnologiesA Cloud-Based Smart-Parking System Based on Internet-of-Things Technologies
A Cloud-Based Smart-Parking System Based on Internet-of-Things TechnologiesKamal Spring
 
Real Time Vehicle Tracking System
Real Time Vehicle Tracking SystemReal Time Vehicle Tracking System
Real Time Vehicle Tracking SystemDiLip ChauDhary
 
Vehicle Theft control system
Vehicle Theft control systemVehicle Theft control system
Vehicle Theft control systemAnkush Jamthikar
 
Gesture recognition document
Gesture recognition documentGesture recognition document
Gesture recognition documentNikhil Jha
 
Smart Voting System with Face Recognition
Smart Voting System with Face RecognitionSmart Voting System with Face Recognition
Smart Voting System with Face RecognitionNikhil Katte
 
Vehicle Detection using Camera
Vehicle Detection using CameraVehicle Detection using Camera
Vehicle Detection using CameraShubham Agrahari
 
SIXTH SENSE TECHNOLOGY REPORT
SIXTH SENSE TECHNOLOGY REPORTSIXTH SENSE TECHNOLOGY REPORT
SIXTH SENSE TECHNOLOGY REPORTJISMI JACOB
 
Women safety device with gps tracking and alerts
Women safety device with gps tracking  and alertsWomen safety device with gps tracking  and alerts
Women safety device with gps tracking and alertsPraween Lakra
 
Crime Pattern Detection using K-Means Clustering
Crime Pattern Detection using K-Means ClusteringCrime Pattern Detection using K-Means Clustering
Crime Pattern Detection using K-Means ClusteringReuben George
 
Smart surveillance
Smart surveillanceSmart surveillance
Smart surveillancePuneet soni
 
Iris recognition system
Iris recognition systemIris recognition system
Iris recognition systemNilu Desai
 
IRJET - Women’s Safety System using IoT
IRJET -  	  Women’s Safety System using IoTIRJET -  	  Women’s Safety System using IoT
IRJET - Women’s Safety System using IoTIRJET Journal
 
Gesture Recognition Technology-Seminar PPT
Gesture Recognition Technology-Seminar PPTGesture Recognition Technology-Seminar PPT
Gesture Recognition Technology-Seminar PPTSuraj Rai
 

La actualidad más candente (20)

IRIS RECOGNITION
IRIS RECOGNITION IRIS RECOGNITION
IRIS RECOGNITION
 
Gesture recognition adi
Gesture recognition adiGesture recognition adi
Gesture recognition adi
 
Presentation slides on Child Tracking System
Presentation slides on Child Tracking SystemPresentation slides on Child Tracking System
Presentation slides on Child Tracking System
 
advanced security system for women
advanced security system for womenadvanced security system for women
advanced security system for women
 
Iris Recognition
Iris RecognitionIris Recognition
Iris Recognition
 
A Cloud-Based Smart-Parking System Based on Internet-of-Things Technologies
A Cloud-Based Smart-Parking System Based on Internet-of-Things TechnologiesA Cloud-Based Smart-Parking System Based on Internet-of-Things Technologies
A Cloud-Based Smart-Parking System Based on Internet-of-Things Technologies
 
Real Time Vehicle Tracking System
Real Time Vehicle Tracking SystemReal Time Vehicle Tracking System
Real Time Vehicle Tracking System
 
Vehicle Theft control system
Vehicle Theft control systemVehicle Theft control system
Vehicle Theft control system
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
 
Gesture recognition document
Gesture recognition documentGesture recognition document
Gesture recognition document
 
Smart Voting System with Face Recognition
Smart Voting System with Face RecognitionSmart Voting System with Face Recognition
Smart Voting System with Face Recognition
 
Vehicle Detection using Camera
Vehicle Detection using CameraVehicle Detection using Camera
Vehicle Detection using Camera
 
SIXTH SENSE TECHNOLOGY REPORT
SIXTH SENSE TECHNOLOGY REPORTSIXTH SENSE TECHNOLOGY REPORT
SIXTH SENSE TECHNOLOGY REPORT
 
Women safety device with gps tracking and alerts
Women safety device with gps tracking  and alertsWomen safety device with gps tracking  and alerts
Women safety device with gps tracking and alerts
 
Crime Pattern Detection using K-Means Clustering
Crime Pattern Detection using K-Means ClusteringCrime Pattern Detection using K-Means Clustering
Crime Pattern Detection using K-Means Clustering
 
Smart surveillance
Smart surveillanceSmart surveillance
Smart surveillance
 
Cyber Forensics Module 1
Cyber Forensics Module 1Cyber Forensics Module 1
Cyber Forensics Module 1
 
Iris recognition system
Iris recognition systemIris recognition system
Iris recognition system
 
IRJET - Women’s Safety System using IoT
IRJET -  	  Women’s Safety System using IoTIRJET -  	  Women’s Safety System using IoT
IRJET - Women’s Safety System using IoT
 
Gesture Recognition Technology-Seminar PPT
Gesture Recognition Technology-Seminar PPTGesture Recognition Technology-Seminar PPT
Gesture Recognition Technology-Seminar PPT
 

Destacado

Mata Yasoda - Mobile Application for Anganwadi Centers (ICDS)
Mata Yasoda - Mobile Application for Anganwadi Centers (ICDS)Mata Yasoda - Mobile Application for Anganwadi Centers (ICDS)
Mata Yasoda - Mobile Application for Anganwadi Centers (ICDS)Nagarajan M
 
A Mobile Based Women Safety Application (I Safe Apps)
A Mobile Based Women Safety Application (I Safe Apps)A Mobile Based Women Safety Application (I Safe Apps)
A Mobile Based Women Safety Application (I Safe Apps)IOSR Journals
 
Location sharing and automatic message sender Android Application
Location sharing and automatic message sender Android ApplicationLocation sharing and automatic message sender Android Application
Location sharing and automatic message sender Android ApplicationKavita Sharma
 
SMART INTELLIGENT SECURITY SYSTEM FOR WOMEN
SMART INTELLIGENT SECURITY SYSTEM FOR WOMENSMART INTELLIGENT SECURITY SYSTEM FOR WOMEN
SMART INTELLIGENT SECURITY SYSTEM FOR WOMENIAEME Publication
 
Sagar Project Report (2)
Sagar Project Report (2)Sagar Project Report (2)
Sagar Project Report (2)Sagar Divetiya
 
Project Report on "Women Safety and Empowerment"
Project Report on "Women Safety and Empowerment"Project Report on "Women Safety and Empowerment"
Project Report on "Women Safety and Empowerment"Abhishek Suman
 
Final Year Project Report on Self Tacit Zone (Location Based Android App)
Final Year Project Report on Self Tacit Zone (Location Based Android App)Final Year Project Report on Self Tacit Zone (Location Based Android App)
Final Year Project Report on Self Tacit Zone (Location Based Android App)Parthik Poshiya
 
Vehicle tracking system,be computer android report,android project report,gps...
Vehicle tracking system,be computer android report,android project report,gps...Vehicle tracking system,be computer android report,android project report,gps...
Vehicle tracking system,be computer android report,android project report,gps...Sujit9561
 
Location Tracking of Android Device Based on SMS.
Location Tracking of Android Device Based on SMS.Location Tracking of Android Device Based on SMS.
Location Tracking of Android Device Based on SMS.iCreateWorld
 
Microfinance : Project Report
Microfinance : Project ReportMicrofinance : Project Report
Microfinance : Project Reportyogi3250
 
My Project Report Documentation with Abstract & Snapshots
My Project Report Documentation with Abstract & SnapshotsMy Project Report Documentation with Abstract & Snapshots
My Project Report Documentation with Abstract & SnapshotsUsman Sait
 
Women security application
Women security applicationWomen security application
Women security applicationAkshay Surve
 
Android College Application Project Report
Android College Application Project ReportAndroid College Application Project Report
Android College Application Project Reportstalin george
 

Destacado (17)

Mata Yasoda - Mobile Application for Anganwadi Centers (ICDS)
Mata Yasoda - Mobile Application for Anganwadi Centers (ICDS)Mata Yasoda - Mobile Application for Anganwadi Centers (ICDS)
Mata Yasoda - Mobile Application for Anganwadi Centers (ICDS)
 
Session 6.2 – Gender Security & Public Transport
Session 6.2 – Gender Security & Public TransportSession 6.2 – Gender Security & Public Transport
Session 6.2 – Gender Security & Public Transport
 
A Mobile Based Women Safety Application (I Safe Apps)
A Mobile Based Women Safety Application (I Safe Apps)A Mobile Based Women Safety Application (I Safe Apps)
A Mobile Based Women Safety Application (I Safe Apps)
 
CONNECTKaro 2015 - 4B - Women's Safety in Public Transport
CONNECTKaro 2015 - 4B - Women's Safety in Public TransportCONNECTKaro 2015 - 4B - Women's Safety in Public Transport
CONNECTKaro 2015 - 4B - Women's Safety in Public Transport
 
Location sharing and automatic message sender Android Application
Location sharing and automatic message sender Android ApplicationLocation sharing and automatic message sender Android Application
Location sharing and automatic message sender Android Application
 
SMART INTELLIGENT SECURITY SYSTEM FOR WOMEN
SMART INTELLIGENT SECURITY SYSTEM FOR WOMENSMART INTELLIGENT SECURITY SYSTEM FOR WOMEN
SMART INTELLIGENT SECURITY SYSTEM FOR WOMEN
 
Sagar Project Report (2)
Sagar Project Report (2)Sagar Project Report (2)
Sagar Project Report (2)
 
Mobile GPS Tracking
Mobile GPS TrackingMobile GPS Tracking
Mobile GPS Tracking
 
Project Report on "Women Safety and Empowerment"
Project Report on "Women Safety and Empowerment"Project Report on "Women Safety and Empowerment"
Project Report on "Women Safety and Empowerment"
 
Final Year Project Report on Self Tacit Zone (Location Based Android App)
Final Year Project Report on Self Tacit Zone (Location Based Android App)Final Year Project Report on Self Tacit Zone (Location Based Android App)
Final Year Project Report on Self Tacit Zone (Location Based Android App)
 
Vehicle tracking system,be computer android report,android project report,gps...
Vehicle tracking system,be computer android report,android project report,gps...Vehicle tracking system,be computer android report,android project report,gps...
Vehicle tracking system,be computer android report,android project report,gps...
 
Location Tracking of Android Device Based on SMS.
Location Tracking of Android Device Based on SMS.Location Tracking of Android Device Based on SMS.
Location Tracking of Android Device Based on SMS.
 
Microfinance : Project Report
Microfinance : Project ReportMicrofinance : Project Report
Microfinance : Project Report
 
My Project Report Documentation with Abstract & Snapshots
My Project Report Documentation with Abstract & SnapshotsMy Project Report Documentation with Abstract & Snapshots
My Project Report Documentation with Abstract & Snapshots
 
Security of women ppt
Security of women pptSecurity of women ppt
Security of women ppt
 
Women security application
Women security applicationWomen security application
Women security application
 
Android College Application Project Report
Android College Application Project ReportAndroid College Application Project Report
Android College Application Project Report
 

Similar a Application Alerts Women's Safety

WOMEN’s SAFETY APP
WOMEN’s SAFETY APPWOMEN’s SAFETY APP
WOMEN’s SAFETY APPIRJET Journal
 
IRJET- A Survey on Child Safety & Tracking Management System
IRJET- A Survey on Child Safety & Tracking Management SystemIRJET- A Survey on Child Safety & Tracking Management System
IRJET- A Survey on Child Safety & Tracking Management SystemIRJET Journal
 
IRJET- Online Event Location Tracking using GPS
IRJET-  	  Online Event Location Tracking using GPSIRJET-  	  Online Event Location Tracking using GPS
IRJET- Online Event Location Tracking using GPSIRJET Journal
 
A women secure mobile app for emergency usage (go safe app)
A women secure mobile app for emergency usage (go safe app)A women secure mobile app for emergency usage (go safe app)
A women secure mobile app for emergency usage (go safe app)eSAT Journals
 
Personal Security Tracking based on Android and Web Application
Personal Security Tracking based on Android and Web ApplicationPersonal Security Tracking based on Android and Web Application
Personal Security Tracking based on Android and Web ApplicationTELKOMNIKA JOURNAL
 
Activity Tracker Wrist Band for Children Monitoring using IOT
Activity Tracker Wrist Band for Children Monitoring using IOTActivity Tracker Wrist Band for Children Monitoring using IOT
Activity Tracker Wrist Band for Children Monitoring using IOTrahulmonikasharma
 
Swarma – A Women Safety Device
Swarma – A Women Safety DeviceSwarma – A Women Safety Device
Swarma – A Women Safety DeviceIRJET Journal
 
Child tracking system
Child tracking systemChild tracking system
Child tracking systembalaji1986
 
Biometric Security Bags
Biometric Security BagsBiometric Security Bags
Biometric Security Bagsijtsrd
 
Ijacsa published research paper march 2020
Ijacsa published research paper march 2020Ijacsa published research paper march 2020
Ijacsa published research paper march 2020shoaibulhassanuos
 
76201975
7620197576201975
76201975IJRAT
 
DasGreenPerezMurphy_Paper
DasGreenPerezMurphy_PaperDasGreenPerezMurphy_Paper
DasGreenPerezMurphy_PaperMichael Murphy
 
Advancement in Android Authentication System Using Direct Significance Service
Advancement in Android Authentication System Using Direct Significance ServiceAdvancement in Android Authentication System Using Direct Significance Service
Advancement in Android Authentication System Using Direct Significance ServiceIRJET Journal
 
Paper id 71201905
Paper id 71201905Paper id 71201905
Paper id 71201905IJRAT
 
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoTIRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoTIRJET Journal
 
Cloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewCloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewIJSRD
 
Cloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewCloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewIJSRD
 
Networking smartphones for disaster recovery using teamphone
Networking smartphones for disaster recovery using teamphoneNetworking smartphones for disaster recovery using teamphone
Networking smartphones for disaster recovery using teamphoneIJARIIT
 

Similar a Application Alerts Women's Safety (20)

WOMEN’s SAFETY APP
WOMEN’s SAFETY APPWOMEN’s SAFETY APP
WOMEN’s SAFETY APP
 
IRJET- A Survey on Child Safety & Tracking Management System
IRJET- A Survey on Child Safety & Tracking Management SystemIRJET- A Survey on Child Safety & Tracking Management System
IRJET- A Survey on Child Safety & Tracking Management System
 
IRJET- Online Event Location Tracking using GPS
IRJET-  	  Online Event Location Tracking using GPSIRJET-  	  Online Event Location Tracking using GPS
IRJET- Online Event Location Tracking using GPS
 
A women secure mobile app for emergency usage (go safe app)
A women secure mobile app for emergency usage (go safe app)A women secure mobile app for emergency usage (go safe app)
A women secure mobile app for emergency usage (go safe app)
 
Personal Security Tracking based on Android and Web Application
Personal Security Tracking based on Android and Web ApplicationPersonal Security Tracking based on Android and Web Application
Personal Security Tracking based on Android and Web Application
 
Activity Tracker Wrist Band for Children Monitoring using IOT
Activity Tracker Wrist Band for Children Monitoring using IOTActivity Tracker Wrist Band for Children Monitoring using IOT
Activity Tracker Wrist Band for Children Monitoring using IOT
 
Swarma – A Women Safety Device
Swarma – A Women Safety DeviceSwarma – A Women Safety Device
Swarma – A Women Safety Device
 
Child tracking system
Child tracking systemChild tracking system
Child tracking system
 
Biometric Security Bags
Biometric Security BagsBiometric Security Bags
Biometric Security Bags
 
[IJET-V1I3P1] Authors :Sayli Nikumbh,Suchal Gujarathi,Shubham Pawar,S.P.Pingat
[IJET-V1I3P1] Authors :Sayli Nikumbh,Suchal Gujarathi,Shubham Pawar,S.P.Pingat[IJET-V1I3P1] Authors :Sayli Nikumbh,Suchal Gujarathi,Shubham Pawar,S.P.Pingat
[IJET-V1I3P1] Authors :Sayli Nikumbh,Suchal Gujarathi,Shubham Pawar,S.P.Pingat
 
Ej4301823826
Ej4301823826Ej4301823826
Ej4301823826
 
Ijacsa published research paper march 2020
Ijacsa published research paper march 2020Ijacsa published research paper march 2020
Ijacsa published research paper march 2020
 
76201975
7620197576201975
76201975
 
DasGreenPerezMurphy_Paper
DasGreenPerezMurphy_PaperDasGreenPerezMurphy_Paper
DasGreenPerezMurphy_Paper
 
Advancement in Android Authentication System Using Direct Significance Service
Advancement in Android Authentication System Using Direct Significance ServiceAdvancement in Android Authentication System Using Direct Significance Service
Advancement in Android Authentication System Using Direct Significance Service
 
Paper id 71201905
Paper id 71201905Paper id 71201905
Paper id 71201905
 
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoTIRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
 
Cloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewCloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature Review
 
Cloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewCloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature Review
 
Networking smartphones for disaster recovery using teamphone
Networking smartphones for disaster recovery using teamphoneNetworking smartphones for disaster recovery using teamphone
Networking smartphones for disaster recovery using teamphone
 

Más de iosrjce

An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...iosrjce
 
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?iosrjce
 
Childhood Factors that influence success in later life
Childhood Factors that influence success in later lifeChildhood Factors that influence success in later life
Childhood Factors that influence success in later lifeiosrjce
 
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...iosrjce
 
Customer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in DubaiCustomer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in Dubaiiosrjce
 
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...iosrjce
 
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model ApproachConsumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model Approachiosrjce
 
Student`S Approach towards Social Network Sites
Student`S Approach towards Social Network SitesStudent`S Approach towards Social Network Sites
Student`S Approach towards Social Network Sitesiosrjce
 
Broadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeBroadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeiosrjce
 
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...iosrjce
 
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...iosrjce
 
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on BangladeshConsumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladeshiosrjce
 
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...iosrjce
 
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...iosrjce
 
Media Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & ConsiderationMedia Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & Considerationiosrjce
 
Customer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative studyCustomer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative studyiosrjce
 
Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...iosrjce
 
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...iosrjce
 
Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...iosrjce
 
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...iosrjce
 

Más de iosrjce (20)

An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...
 
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
 
Childhood Factors that influence success in later life
Childhood Factors that influence success in later lifeChildhood Factors that influence success in later life
Childhood Factors that influence success in later life
 
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
 
Customer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in DubaiCustomer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in Dubai
 
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
 
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model ApproachConsumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
 
Student`S Approach towards Social Network Sites
Student`S Approach towards Social Network SitesStudent`S Approach towards Social Network Sites
Student`S Approach towards Social Network Sites
 
Broadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeBroadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperative
 
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
 
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
 
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on BangladeshConsumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
 
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
 
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
 
Media Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & ConsiderationMedia Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & Consideration
 
Customer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative studyCustomer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative study
 
Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...
 
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
 
Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...
 
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
 

Último

The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGSIVASHANKAR N
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 

Último (20)

The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 

Application Alerts Women's Safety

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 3, Ver. IV (May – Jun. 2015), PP 01-04 www.iosrjournals.org DOI: 10.9790/0661-17340104 www.iosrjournals.org 1 | Page Application for Women Safety 1 S.Sangeetha, 2 P.Radhika PG Scholar, Department of MCA, Panimalar Engineering College 1 sangeemca1991@gmail.com,2 radhika91mca@gmail.com Abstract: This project presents an alert system for Women safety detection using common commercially available electronic devices to both detect the problem and alert authorities. We use an Android based smart phone with an integrated features that alert and provide location based information to alert authorities. Data from the application is evaluated with several threshold based AES algorithms and position data to determine a problem. Our system provides a realizable, cost effective solution to problem detection using a simple graphical interface while not overwhelming the user with uncomfortable sensors. Problem is very powerful software especially developed for the safety of girls, whenever some body is in trouble they don’t have to sit and find contacts or find ways to send short message service, or message the near ones. They might not have so much time.. All that they have to do is shake the smart phone above the threshold value, vigorously. Immediately a message alert is sent to the person’s mom, dad and whoever they wish to, if their guardians also have a smart phone. Even though if it is in silent mode. When a message called alert is received it automatically changes its profile to general, and gives a message notification YOUR DAUGHTER IS IN TROUBLE PLZ HELPS…. PLZ HELP…. PLZ HELP…. REPEATEDLY AS A message until they seen and stop it.. Now a day security of women is becoming very poor and the need for this kind of this application is steadily increasing work wise, we will develop a routine schedule based mechanism to monitor the women’s security using GPS (Global Positioning System), GPRS (General Packet Radio Service), etc.… Keywords: Smartphone, GPS, GPRS… I. Introduction This application is generally meant for the attention of the authorities or public in the emergency response capabilities such as terrorist attacks and the natural disaster by facilitating the communication We will be tracking the location of the person via GPS and storing the details of the current location into a remote server via GPRS consecutively, we will also be tracking the schedule of the person as per the schedule list which is being uploaded by the person and we will be sending SMS to the relatives of the concerned person about the schedule their current location of the concerned person that time. So that they will come to know about the status and if something is wrong, we will be having another set of oppositions to give a call to a police, social workers, volunteer organizations, etc. With their respective along the mobile phones. The difficulties in the existing application are the lack of situational awareness and communication terminology among their respective. Due to this response and recovery is Difficult to the authorities. In respect of the public safety with the support of the network provider the application runs in the android phones in efficient way to identify and recover the problem by the natural disaster or terrorist attacks etc… Furthermore users are likely to operate the mobile devices for the security purpose to intimate the problem detection to their respective in the emergency cases. II. Application Requirements To develop the application android based mobile application the station and the environment of the surrounding has to been interviewed then the dangerous and the suspicious activates should be notified to the device by the user .if the device detects the problem then only other process creates the attention for reporting to the authority. 1)Time Schedule: When the apps get installed it traces out the IMEI, SIM, mobile number and stores on the remote server, the daily schedule list gets uploaded by the person from her mobile and get tracked as per the schedule list, if there is any deviation in the schedule they relatives of the person will get an SMS along with the current location and the schedule and Police station members will get a call from the mobile.
  • 2. Application for Women Safety DOI: 10.9790/0661-17340104 www.iosrjournals.org 2 | Page 2) Tracking: The GPS will regularly transmit the latitude and longitude of the person and via GPRS we will store the entire transmitted cloud server; if the person is lost we can trace the end location with this kind of approach. 3) Notification: When the person is in trouble, when she presses an alarm in the application all her relatives, voluntary organization members, police men will get an SMS with her full contact details along with the current location from where the message has been delivered. Using the IMEI number the policemen can track the location where they are travelling. 4) Network provider support: Network provider has got the important role, by sending the commands through the short message type to the different applications. 5) GPS (Global positioning system) The GPS, elaborated as Global Positioning System, is a satellite based navigation system made up of a network of 24 satel-lites placed into orbit by the U.S. GPS works in any weather conditions, anywhere in the world, 24 hours a day. There are no subscription fees or setup charges to use GPS . A GPS can help us to determine exactly where we are at any given moment. Not only can a GPS give us the name of the street we might be traveling on, but many GPS systems can also give us the exact latitude and longitude of where you are located. On the other hand, Android mobile platform is becoming more popular to the users for its multi- dimensional purposes.Tracking System via Android Device” uses GPS and any mo-bile phones having an Android operating system to track the location of a person whenever necessary. III. System Study Existing system The women have to dial a number to call a police or send a Short Messaging Service (SMS) to the particular subscriber code, after they received the service they will get in touch with you later and there is no time to make a call or SMS. There are also so many volunteer organizations all over the world to help them, but they could not able to get those messages. Proposed system We will be tracking the location of the person via GPS and storing the details of the current location into a remote server via GPRS consecutively, we will also be tracking the schedule of the person as per the schedule list which is being uploaded by the person and we will be sending SMS to the relatives of the concerned person about the schedule their current location of the concerned person that time. So that they will come to know about the status and if something is wrong, we will be having another set of oppositions to give a call to a police, social workers, volunteer organizations, etc. Features  This project presents an alert system for Women safety detection.  The system provides a realizable and efficient.  The application is used Advanced Encryption Standard (AES) algorithm.  The application is easier to use all the woman.  The application is normal budget.
  • 3. Application for Women Safety DOI: 10.9790/0661-17340104 www.iosrjournals.org 3 | Page IV. Architecture V. Operating System By considering the today’s environment most of the people using the android based mobile phones and android is the open source which can be used and adapted easily so android operating system can be used. Android is an operating system based on the Linux kernel, and designed primarily for touch screen mobile devices such as smart phones and tablet computers. Initially developed by Android, Inc., which Google backed financially .Android was unveiled in 2007 along with the founding of the Open Handset Alliance: a consortium of hardware, software, and telecommunication companies devoted to advancing open standards for mobile devices. The first publicly available Smartphone running Android, the HTC Dream, was released on October 22, 2008 The user interface of Android is based on direct manipulation, using touch inputs that loosely correspond to real-world actions, like swiping, tapping, pinching and reverse pinching to manipulate on-screen objects. Internal hardware such as accelerometers, gyroscopes and proximity sensors are used by some applications to respond to additional user actions, for example adjusting the screen from portrait to landscape depending on how the device is oriented. Android allows users to customize their home screens with shortcuts to applications and widgets, which allow users to display live content, such as emails and weather information, directly on the home screen. Applications can further send notifications to the user to inform them of relevant information, such as new emails and text messages. Android is open source and Google releases the source code under the Apache License. This open- source code and permissive licensing allows the software to be freely modified and distributed by device manufacturers, wireless carriers and enthusiast developers. In practice, Android devices ship with a combination of open source and proprietary software. Android has a large community of developers writing applications ("apps") that extend the functionality of devices, written primarily in the Java programming language. In October 2012, there were approximately 700,000 apps available for Android, and the estimated number of applications downloaded from Google Play, Android's primary app store, was 25 billion. A developer survey conducted in April–May 2013 found that Android is the most popular platform for developers, used by 71% of the mobile developer population. Android is the world's most widely used Smartphone platform, overtaking Symbian in the fourth quarter of 2010. Android is popular with technology companies who require a ready-made, low-cost, customizable and lightweight operating system for high tech devices. Despite being primarily designed for phones and tablets, it also has been used in televisions, games consoles, digital cameras and other electronics. Android's open nature has encouraged a large community of developers and enthusiasts to use the open-source
  • 4. Application for Women Safety DOI: 10.9790/0661-17340104 www.iosrjournals.org 4 | Page code as a foundation for community-driven projects, which add new features for advanced user or bring Android to devices which were officially released running other operating systems. As of November 2013, Android's share of the global Smartphone market, led by Samsung products, has reached 81%.The operating system's success has made it a target for patent litigation as part of the so-called "Smartphone" between technology companies. As of May 2013, 48 billion apps have been installed from the Google Play store, and as of September 2013, 1 billion Android devices have been activated. 1.Applications These are applications written in Java. Some of basic applications include a calendar, email client, SMS program, maps, making phone calls, accessing the Web browser, accessing your contacts list and others. If you are an average user, this is the layer you will us most, rest all layers are used by Google programmers, developers and hardware manufacturers. 2. Application Framework This is the skeleton or framework which all android developers has to follow. The developers can access all framework APIs an manage phone’s n to keyword ki: basic functions like resource allocation, switching between processes or programs, telephone applications, and keeping track of the phone’s physical location. The architecture is well designed to simplify the reuse of components. Think of the application framework as a set of basic tools with which a developer can build much more complex tools. 3. Libraries This layer consists of Android libraries written in C, C++, and used by various systems. This library tells the device how to handle different kinds of data and are exposed to Android developers via Android Application framework. Some of these libraries includes media, graphics, 3d, SQLite, web browser library etc. The Android runtime layer which includes set of core java libraries and DVM (Dalvik Virtual Machine) is also located in same layer. 4. Runtime Android This layer includes set of base libraries that are required for java libraries. Every Android application gets its own instance of Dalvik virtual machine. Dalvik has been written so that a device can run multiple VMs efficiently and it executes files in executable (.Dex) optimized for minimum memory. 5. Kernel – Linux: This layer includes Android’s memory management programs, security settings, power management software and several drivers for hardware, file system access, networking and inter-process-communication. The kernel also acts as an abstraction layer between hardware and the rest of the software stac. VI. Conclusion The problem of the women safety is increased rapidly in this environment, so I proposed as an effective Android application to prevent such type of the suspicious or natural disaster, by alerting the concern authorities using the android mobile phone which helps to stop such type of illegal activates and to trace the concern.. References [1]. Michael Burton ,Dohn Ferker (2012). Android Application For Dummies. 2nd ed. 111,river street,Hoboker: jhon wiely and sons,inc. p12-90. [2]. Cook book,reipeng liu (2013). Android Application devlopment kit. Mumbai: packt bimingam. p1-50,p67-90.. [3]. Peter Erickson, Andrew Weinert, and Dr. Paul Breimyer,Matt Samperi, Jason Huff, Carlos Parra, and Dr. Scarlett Miller. (2013). Designing Public Safety Mobile Applications for Disconnected, Interrupted, and Low Bandwidth Communication Environments. IEEE. 10 (978-1-4799-1535-4/13/$31.00), p790-796.