Women Safety Device

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 52

Women Safety Device

ABSTRACT
Personal safety is one of the most important concerns for women, as crime against
women has not decreased. Nowadays, various devices are available in markets which claim to
protect women in many ways. Still there arises the need of a protective device which acts as a
guardian at time of an attack. This fuels a new thought of a Bluetooth Aided Safety Smart Ring
for Women. This paper aims to create a wearable Ring with provision of connecting with smart
phone via Bluetooth. If an emergency occur, the smart phone will produce a high volume alarm
and it also sends alert messages to predefined numbers with current location of the device. The
main advantage of this ring is its convenience and easiness of operation.
CHAPTER 1

INTRODUCTION

Internet of Things (IOT)

The Internet of Things (IOT) is an ecosystem of connected physical objects that


are accessible through the internet. It refers to the ever-growing network of
physical objects that feature an IP address for internet connectivity, and the
communication that occurs between these objects and other Internet-enabled
devices and systems. Typically, IOT is expected to offer advanced connectivity of
devices, systems and services that goes beyond machine-to- machine (M2M)
communications and covers a variety of protocols, domains, and applications. The
interconnection of these embedded devices (including smart objects), is expected
to usher in automation in nearly all fields, while also enabling advanced
applications like a smart grid, and expanding to areas such as smart cities.

Figure 1: Internet of Things


Figure 2: Applications of IOT

1.1 Overview

The biggest problem in today’s world is the security for the women. The atrocities against the
women can be brought to an end with the help of our product “PRO-ME”. This device is a
security system, specially designed for women’s security and facilitating quick help as in
when needed.There are two parts in our product, one is Hardware and the other is software to
make the hardware compatible on the host’s mobile. The Hardware installed in the hosts
mobile which comes with the device itself. When the user is installing the application in the
person’s phone then that time itself the user has to give some pre-stored contacts and with an
Emergency text message. This will be used by the person in the crucial situations by pressing
the button on the device.

“PRO-ME” is a guide, which aids people to take preventive measures as soon as possible
during:
• Being stalked while walking.
• Attempted physical or sexual assault.
• Unsafe neighbours.
• Domestic violence.
GPS Tracking system

Figure 3: GPS Tracking System

Cell Phones
New-generation cell phones combine many devices into one. When travelling,
one of the most convenient of these features is the built-in GPS. When visiting a
place that you aren't familiar with, getting lost is a lot harder when you have turn-
by-turn directions on your cell phone. Even the cell phones that don't have GPS
can use cell tower position and distance to calculate your location. Cell phones
function by communicating with towers connected to a base station in a
configuration called a "cell." As you move through the cell, the base station
monitors your cell phone's signal and transfers it to the nearest tower

GPS
Cell phones with GPS receivers communicate with units from among the 30
global positioning satellites in the GPS system. The built-in receiver trilaterates
your position using data from at least three GPS satellites and the receiver. GPS
can determine your location by performing a calculation based on the intersection
point of overlapping spheres determined by the satellites and your phone's GPS
receiver. In simple terms, trilateration uses the distance between the satellites and
the receiver to create overlapping "spheres" that intersect in a circle. The
intersection is your location on the ground.

Problem Statement
Considering the present situation of women and how they are objectified,
molested, abused and violated ruthlessly by insensitive men, it is high time that
some steps are taken to make the women of our world safer and stronger.

Most of the time women face such atrocities in the most unexpected place and
time where it is really difficult to ask for help and even if they do so by the time
help reaches them, the deed is done. The most difficult thing is to send her current
location as soon as the victim senses some danger. Moreover, sometimes such
incidents are so sudden that there is hardly any scope of collecting the evidence
against the criminal and the guilty escapes punishment just because of lack of
evidence. This is the reason why women are still vulnerable and scared to raise
their voice and fight for justice.

OBJECTIVE:

The Objective of the proposed method is to build an IOT based secured system for women’s
safety which is very crucial in today’s world. There are two parts in our product, one is the
Hardware and the other is the software to make the hardware compatible on the host’s mobile.
CHAPTER 2
SYSTEM ANALYSIS

EXISTING SYSTEM

Many devices are now available in the market which are meant for the safety of women
and some of which are still in the development stage. “Suraksha”-A Women Safety device is a
security system specially designed for women in distress. The basic purpose of the system is to
intimidate instant location and a distress message is send to the cops or to registered numbers, so
that unfortunate incidents would be averted and will also provide real time evidence for swift
action against the perpetrators of crime against woman. It is capable of location tracking and
screeches an alarm when blood pressure of wearer exceeds a limit. The size of the system is
more and the pressure sensors used are usually too expensive. Also the device is bulky and the
system needs a receiver transmitter system with wireless module and GSM module for
communication.

DISADVANTAGES

 The size of the existing device is more and the pressure sensors used are usually too
expensive.
 Uncomfortable to wear.
 It seems risky as available devices are not well covered.
 If the woman cannot move her hand, available devices are of no use.

PROPOSED SYSTEM

This prototype is developed with the hope that it would be capable of providing better
safety to women than many devices that are available nowadays. This system consists of a
microcontroller, Bluetooth module, Power supply, and a smart phone. The GPS tracking,
messaging and the alarm facility of the smart phone are also utilized. Here we are using a power
supply of 9V. A 5 V to the microcontroller is given after regulation. Hardware is paired with the
smart phone via Bluetooth. During normal operation, the time is displayed in the seven segment
displays. If a switch is pressed then simply the location will be sent to one or more predefined
numbers. Another switch is used to spot the phone if lost or misplaced. The circuit consists of an
ATmega328 microcontroller, HC-05 Bluetooth module and a button. When the button is pressed
twice, the ring ping the android based app via Bluetooth. Once the app receives the ping
message, it sends SMS to the nearest police station and the family or friends with GPS location.

ADVANTAGES

 Easy to wear.
 Compact
 During danger situation can be activated very easily.
 Safety Device which can be carried by everyone.
 Ultra low power consumption.
 Compact in size.
 Wireless connectivity.
 Easy and fast to install.
 Easy Maintenance
 Low cost with high performance.
 Fast response.
 Environmental friendly system.
CHAPTER 3

LITERATURE SURVEY

A literature survey or a literature review in a project report shows the various analyses and
research made in the field of interest and the results already published, taking into account the
various parameters of the project and the extent of the project.
A literature survey includes the following
• Existing theories about the topic which are accepted universally.
• Books written on the topic, both generic and specific.
• Research done in the field usually in the order of oldest to latest.
• Challenges being faced and on-going work, if available.

Literature survey describes about the existing work on the given project .It deals with the
problem associated with the existing system and also gives user a clear knowledge on how to
deal with the existing problems and how to provide solution to the existing problems .different
thing.

OBJECTIVES OF LITERATURE SURVEY

• Learning the definitions of the concepts.


• Access to latest approaches, methods and theories.
• Discovering research topics based on the existing research
• Concentrate on your own field of expertise– Even if another field uses the same words, they
usually mean completely
• It improves the quality of the literature survey to exclude sidetracks– Remember to explicate
what is excluded.

Before building our android application the following system is taken into consideration:
[1] In 2016, Shreyas R.S, Varun.B.C, Shiva Kumar.H.K, Punith Kumar B.E, Kalpavi.C.Y.
Design And Development Of Women Self Defence Smart Watch Prototype.
International Journal of Advanced Research in Electronics and Communication
Engineering
Women all over the world are facing and even subjected to unethical physical harassment.
Security for women is still a major issue as the number of crimes and harassment over women
and girls is increasing day-by-day. In this age of technology, mobile phone is one of the
gadgets that almost everyone like and uses to keep in touch with family and friends. All they
need is a device that can be carried everywhere easily.

This proposed paper deals with a quick responding, cost protection system for an individual
and especially for women using which a woman in anguish can call for help just with the press
of a button on this smart gadget. Self Defense module for women safety is like a Smart Watch
for Women safety. It has the ability to help women with technologies that are embedded into a
compact device. It has the potential to help women with technologies that are embedded. It is
specially designed for women safety and protection. It has a control button that will be used by
women to inform nearby police when they are in distress. This watch directly gets connected to
the satellite through GPS when activated. Then the location is transferred through the GSM, it
also contains a shock mechanism to produce non-lethal electric shock in emergency situations
to deter the attacker.

[2] In 2016, M.Monisha, G.Pavithra and R.Subhashini. Women Safety Device and
Application-”FEMME”. Indian Journal of Science and Technology.

In our Country, even though it has super power and an economic development, but still
there are many crimes against women. The atrocities against the women can be brought to an end
with the help of our product “FEMME”. This device is a security system, specially designed for
women in distress. Method/Analysis: Using ARM controller for the hardware device is the most
efficient and it consumes less power. We use radio frequency signal detector to detect hidden
cameras. Findings: We analysed that there are no security device for our total safety. The user
has to carry multiple devices. We found an ALL-IN-ONE security device which has all the
features in one click. Applications/Improvements: In this paper we used ARM controller and
android application in which both the device and the smart phone are synchronized using
Bluetooth, hence both can be triggered independently. We can record audio for further
investigation and can give an alert call and message to the pre-set contacts with the instant
location every 2 minutes and can be tracked live using our application. Hidden camera detector is
also a distinct feature using which we can ensure our privacy.

[3] In 2016, Divya S, Vinitha M, Logeshwari B,Indumathi P. A WOMEN SECURE


MOBILE APP FOR EMERGENCY USAG (GO SAFE APP). International Journal of
Research in Engineering and Technology.

Many unfortunate incidents have been taking place. Problems may come from any direction
such as walking on the road after the work, going to super market or many other reasons for
which they go alone. People at home are not sure of their return safely. In order to overcome
such problems the GO SAFE (security app) mobile based application is not only necessary to use
but also plays a pivotal role with android software. The usage of smart phones equipped with
GPS navigation unit have increased rapidly. The “GO SAFE” application is mainly developed to
safeguard. By clicking on the buttons (power & volume button) alert message is sent.
Application communicates the user’s location to the registered contacts in the form of message.
Thus, it acts like a sentinel following behind the person till the user feels she is safe. Also, the
registered contacts and GPS location are saved from time to time in a database.

[4] In 2015, Ashlesha Wankhede, Ashwini Velankar, Priyanka Shinde, PORTABLE


DEVICE FOR WOMEN SECURITY ,International Journal of Research in
Engineering and Technology

Today’s world is full of rush and most of the women work independently to support their
family. They have to work till late night. For such women, safety is the most important
requirement. The security issue for such women comes forward because cases of harassment and
rapes on those women are increasing. Best suitable system for those women will be a portable
system which the women will be able to carry will her and easy to use. Portable system will
generate a shock which will make to attacking person to get back. After generation of shock the
message will be sent with the help of Global System for Mobile Communication (GSM) on the
particular number stored and the location of those women is traced with the help of Global
Positioning System (GPS). If the message is not checked by the particular number mentioned,
the system will continuously give the call until the message is checked by the particular number
mentioned.

[5] In 2015,Premkumar.P, CibiChakkaravarthi.R, Keerthana.M, Ravivarma.R,


Sharmila.T.ONE TOUCH ALARM SYSTEM FOR WOMEN’S SAFETY USING
GSM.

The paper presents a solution to solve the car detection and counting problem in images
acquired by means of unmanned aerial vehicles (UAVs). UAV images are characterized by a
very high spatial resolution (order of few centimeters), and consequently by an extremely high
level of details which calls for appropriate automatic analysis methods. The proposed method
starts with a screening step of asphalted zones in order to restrict the areas where to detect cars
and thus to reduce false alarms. Then, it performs a feature extraction process based on scalar
invariant feature transform thanks to which a set of key points is identified in the considered
image and opportunely described. Successively, it discriminates between keypoints assigned to
cars and all the others, by means of a support vector machine classifier. The last step of our
method is focused on the grouping of the key points belonging to the same car in order to get a
―one keypointone car‖ relationship. Finally, the number of cars present in the scene is given
by the number of final keypoints identified. The experimental results obtained on a real UAV
scene characterized by a spatial resolution of 2 cm show that the proposed method exhibits a
promising car counting accuracy.

[6] In 2015, Dr. Sridhar Mandapati , Sravya Pamidi , Sriharitha Ambati . A Mobile Based
Women Safety Application (I Safe Apps). IOSR Journal of Computer Engineering

Many unfortunate incidents have been taking place in woman’s case. Problems may come
from any direction such as women walking on the road after the work, going to super market or
many other reasons for which they go alone. People at home are not sure of their return safely.
Another factor is woman die without knowing the reason as they attend excursions and industrial
trips conducted by the organizations. It happens due to attacks on woman but not suicides. In
2013 there happened an incident which is a gag rape in New Delhi in the case of 23 year old
woman in bus at 9:30 PM. Another incident that has taken place at Mumbai in the case of
woman who is leaving her native place after Christmas holidays has been kidnapped and killed.
These are some of the problems that have taken place in the day to day life of women. In order to
overcome such problems faced by women the I Safety (women security apps) mobile based
application is not only necessary to use but also plays a pivotal role with android software.

[7] In 2015, S.Vigneshwari and M. Aramudhan. Social Information Retrieval Based on


Semantic Annotation and Hashing upon the Multiple Ontologies .Indian Journal of
Science and Technology.

Ontology is the best way for representing the useful information. In this paper, we have
planned to develop a model which utilizes multiple ontologies. From those ontologies, based on
the mutual information among the concepts the taxonomy is constructed, then the relationship
among the concepts is calculated. Thereby the useful information is extracted. There is multiple
numbers of ontologies available through the web. But there are various issues to be faced while
sharing and reusing the existing ontologies. To resolve the ambiguity which exists, when
comparing two concepts are semantically similar, but physically different, an approach is
proposed here to index and retrieve the documents from two different ontologies. The ontologies
used are WordNet and SWETO ontology. The results are compared based on semantic
annotation based on RMS and hashing between the cross ontologies using Rabin Karp
fingerprinting algorithm. Also the datasets are trained to yield better results.

[8] In 2015, S. Gowri and G. S. Anandha Mala Efficacious IR System for Investigation in
Digital Textual Data. Indian Journal of Science and Technology.
There are numerous imperative digital text based proofs, some of which are SMS (Short
Message Services), messages, mails, chat logs, etc. The person who researches a case is
fundamentally overflowed with information and he needs to invest all his profitable examination
time, examining through the loud indexed lists and experiencing unimportant query items. Hence
a system is initiated using digital textual data mining standards for configuration and execution,
which enhances IIR (Intelligent Information Retrieval) viability in digital forensics. The
framework analyzes the input corpus data with domain specific keywords after which search and
ranking of the SMSs, based on the weight of the keywords of forensic interest is computed. This
software is developed as a proof of concept with data mining and weighted search concepts.

[9] In 2014, Nishant Bhardwaj and Nitish Aggarwal . Design and Development of
“Suraksha”-A Women Safety. International Journal of Information & Computation
Technology.
India which sees itself as a promising super power and an economic hub, isstill trapped in the
clutches of various patriarchal evils like molestations, dowry, crime against women, worst
among all is Rape. The atrocities against the women can be now brought to an end with the help
of a device called suraksha. This paper explains the basic idea underlying suraksha which is to
flash a warning giving an instant location of the distressed victim to the police so that the
incident could be prevented and the culprit apprehended. This would help reduce crime against
women. This paper also summarizes other significant works in this field and hence forth
discussed suraksha device in a greater detail.

[10] In 2010, Alexandros Pantelopoulos and Nikolaos G. Bourbakis, Fellow, A Survey on


Wearable Sensor-Based Systems for Health Monitoring and Prognosis IEEE
TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS

The design and development of wearable bio sensor systems for health monitoring has
garnered lots of attention in the scientific community and the industry during the last years.
Mainly motivated by increasing healthcare costs and propelled by recent technological advances
in miniature bio sensing devices, smart textiles, microelectronics, and wireless communications,
the continuous advance of wearable sensor-based systems will potentially transform the future of
healthcare by enabling proactive personal health management and ubiquitous monitoring of a
patient’s health condition. These systems can comprise various types of small physiological
sensors, transmission modules and processing capabilities, and can thus facilitate low-cost
wearable unobtrusive solutions for continuous all-day and any-place health, mental and activity
status monitoring. This paper attempts to comprehensively review the current research and
development on wearable biosensor systems for health monitoring. A variety of system
implementations are compared in an approach to identify the technological shortcomings of the
current state-of-the-art in wearable biosensor solutions. An emphasis is given to multi parameter
physiological sensing system designs, providing reliable vital signs measurements and
incorporating real-time decision support for early detection of symptoms or context awareness.
In order to evaluate the maturity level of the top current achievements in wearable health-
monitoring systems, a set of significant features, that best describe the functionality and the
characteristics of the systems, has been selected to derive a thorough study. The aim of this
survey is not to criticize, but to serve as a reference for researchers and developers in this
scientific area and to provide direction for future research improvements.
CHAPTER 4
System Requirement Specifications
System Requirement Specification (SRS) is a central report, which frames the
establishment of the product advancement process. It records the necessities of a framework as
well as has a depiction of its significant highlight. A SRS is essentially an association's seeing (in
composing) of a client or potential customer's frame work necessities and conditions at a specific
point in time (generally) before any genuine configuration or improvement work. It's a two-way
protection approach that guarantees that both the customer and the association comprehend
alternate's necessities from that viewpoint at a given point in time.
The composition of programming necessity detail lessens advancement exertion, as
watchful audit of the report can uncover oversights, mistaken assumptions, and irregularities
ahead of schedule in the improvement cycle when these issues are less demanding to right. The
SRS talks about the item however not the venture that created it, consequently the SRS serves as
a premise for later improvement of the completed item.
The SRS may need to be changed, however it does give an establishment to proceed with
creation assessment. In straightforward words, programming necessity determination is the
beginning stage of the product improvement action. The SRS means deciphering the thoughts in
the brains of the customers – the information, into a formal archive – the yield of the prerequisite
stage. Subsequently the yield of the stage is a situated of formally determined necessities, which
ideally are finished and steady, while the data has none of these properties.

Functional requirements

Functional Requirement defines a function of software system and how the system must behave
when presented with specific inputs or conditions. These may include calculations, data
manipulation and processing and other specific functionality. The functional requirements of the
project are one of the most important aspects in terms of entire mechanism of modules.

The functional requirements here are:

 The User should store personal as well as contact data in an easy manner.
 The User should be able to send alert messages along with GPS location to the
stored contacts via Bluetooth module.

Non-functional requirements:
In addition to the obvious features and functions that you will provide in your system, there are
other requirements that don't actually DO anything, but are important characteristics
nevertheless. These are called "non-functional requirements" or sometimes "Quality Attributes."
For example, attributes such as performance, security, usability, compatibility aren’t a "feature"
of the system, but are a required characteristic. You can't write a specific line of code to
implement them, rather they are "emergent" properties that arise from the entire solution. The
specification needs to describe any such attributes the customer requires. You must decide the
kind of requirements that apply to your project and include those that are appropriate.

Here are some Non-Functional Requirements:

 Reliability
The framework ought to be dependable and solid in giving the functionalities. When a
client has rolled out a few improvements, the progressions must be made unmistakable by
the framework. The progressions made by the Programmer ought to be unmistakable both
to the Project pioneer and in addition the Test designer.
 Security
Aside from bug following the framework must give important security and must secure
the entire procedure from smashing. As innovation started to develop in quick rate the
security turned into the significant concern of an association. A great many dollars are
put resources into giving security. Bug following conveys the greatest security accessible
at the most noteworthy execution rate conceivable, guaranteeing that unapproved clients
can't get to imperative issue data without consent. Bug following framework issues
diverse validated clients their mystery passwords so there are limited functionalities for
all the clients.
 Maintainability
The framework observing and upkeep ought to be basic and target in its approach. There
should not be an excess of occupations running on diverse machines such that it gets hard
to screen whether the employments are running without lapses.
 Performance
The framework will be utilized by numerous representatives all the while. Since the
framework will be facilitated on a solitary web server with a solitary database server out
of sight, execution turns into a noteworthy concern. The framework ought not succumb
when numerous clients would be utilizing it all the while. It ought to permit quick
availability to every last bit of its clients. For instance, if two test specialists are all the
while attempting to report the vicinity of a bug, then there ought not to be any irregularity
at the same time.
 Portability
The framework should to be effectively versatile to another framework. This is obliged
when the web server, which s facilitating the framework gets adhered because of a few
issues, which requires the framework to be taken to another framework.

 Scalability
The framework should be sufficiently adaptable to include new functionalities at a later
stage. There ought to be a typical channel, which can oblige the new functionalities.
 Flexibility
Flexibility is the capacity of a framework to adjust to changing situations and
circumstances, and to adapt to changes to business approaches and rules. An adaptable
framework is one that is anything but difficult to reconfigure or adjust because of diverse
client and framework prerequisites. The deliberate division of concerns between the
trough and motor parts helps adaptability as just a little bit of the framework is influenced
when strategies or principles change.
SYSTEM REQUIREMENTS:

Hardware Requirements:

System : Intel i3 2.1 GHZ

Memory : 4GB.

Hard Disk : 40 GB.

Bluetooth module - HCO5

Button

Power supply

GSM module

Software Requirements:

Operating System : Windows 7 / 8.

Language : JAVA / J2EE, Embedded C

Database : MySQL, Tomcat Server

Tool : NetBeans, Navicat, Arduino UNO

HARDWARE REQUIREMENT DESCRIPTION:

Power Supply:

Control supply is a reference to a wellspring of electrical compel. A contraption or


system that provisions electrical or diverse sorts of essentialness to a yield load or assembling of
weights is known as constrain supply unit or PSU. The term is most generally associated with
electrical essentialness supplies, less much of the time to mechanical ones, and once in a while to
others
This power supply segment is required to change over AC flag to DC flag furthermore to
decrease the plenitude of the flag. The available voltage motion from the mains is 230V/50Hz
which is an AC voltage, yet the required is DC voltage (no repeat) with the sufficiency of +5V
and +12V for various applications.

BLUETOOTH MODULE (HC-05)


HC-05 module is an easy to use Bluetooth SPP (Serial Port Protocol) module, designed
for transparent wireless serial connection setup.

Serial port Bluetooth module is fully qualified Bluetooth V2.0+EDR (Enhanced Data
Rate) 3Mbps Modulation with complete 2.4GHz radio transceiver and baseband. It uses CSR
Bluecore 04-External single chip Bluetooth system with CMOS technology and with
AFH(Adaptive Frequency Hopping Feature). It has the footprint as small as 12.7mmx27mm.
Hope it will simplify your overall design/development cycle.

Hardware Features:
 Typical -80dBm sensitivity
 Up to +4dBm RF transmit power
 Low Power 1.8V Operation ,1.8 to 3.6V I/O
 PIO control
 UART interface with programmable baud rate
 With integrated antenna
 With edge connector
Software Features:
 Default Baud rate: 38400, Data bits:8, Stop bit:1,Parity:No parity, Data control: has.
Supported baud rate: 9600,19200,38400,57600,115200,230400,460800.
 Given a rising pulse in PIO0, device will be disconnected.
 Status instruction port PIO1: low-disconnected, high-connected;
 PIO10 and PIO11 can be connected to red and blue led separately. When master and
slave are paired, red and blue led blinks 1time/2s in interval, while disconnected only
blue led blinks 2times/s.
 Auto-connect to the last device on power as default.
 Permit pairing device to connect as default.
 Auto-pairing PINCODE:”0000” as default
 Auto-reconnect in 30 min when disconnected as a result of beyond the range of
connection.

Fig. Bluetooth Module


GSM Module

GSM is a mobile communication modem as shown in Fig 4.5. It is stands for global
system for mobile communication (GSM). The idea of GSM was developed at Bell Laboratories
in 1970. It is widely used mobile communication system in the world. GSM is an open and
digital cellular technology used for transmitting mobile voice and data services operates at the
850MHz, 900MHz, 1800MHz and 1900MHz frequency bands.

GSM system was developed as a digital system using time division multiple access
(TDMA) technique for communication purpose. A GSM digitizes and reduces the data, then
sends it down through a channel with two different streams of client data, each in its own
particular time slot. The digital system has an ability to carry 64 kbps to 120 Mbps of data rates.
Since many GSM network operators have roaming agreements with foreign operators, users can
often continue to use their mobile phones when they travel to other countries. SIM cards
(Subscriber Identity Module) holding home network access configurations may be switched to
those will metered local access, significantly reducing roaming costs while experiencing no
reductions in service. GSM, together with other technologies, is part of the evolution of wireless
mobile telecommunications that includes High-Speed Circuit-Switched Data (HSCSD), General
Packet Radio System (GPRS), Enhanced Data GSM Environment (EDGE), and Universal
Mobile Telecommunications Service (UMTS).

Fig 4.5 GSM Module


GSM Specifications
 Quad-band 850/900/1800/1900MHz
 GPRS multi-slot class 12/10
 GPRS mobile station class B
 Compliant to GSM phase 2/2+
– Class 4 (2 W @ 850/900MHz)
– Class 1 (1 W @ 1800/1900MHz)
 Bluetooth: compliant with 3.0+EDR
 FM: 76~109MHz worldwide bands with 50KHz
 tuning step
 Dimensions: 15.8*17.8*2.4mm
 Weight: 1.35g
 Control via AT commands (3GPP TS 27.007,
 27.005 and SIMCOM enhanced AT Commands)
 Supply voltage range 3.4 ~ 4.4V
 Low power consumption
 Operation temperature:-40℃~85℃
 SIM800 Quad Band GSM Module
 Voltage Supply Required- 9VDC to 12VDC with atleast 2A Peak Current Capability
 TTL Rx and TTL Tx and DB9 Connector Based RS232 Outputs
 External Finger type antenna
 Switching Regulator Based Power Supply

Software features
 0710 MUX protocol
 Embedded TCP/UDP protocol
 FTP/HTTP
 MMS
 E-MAIL
 DTMF
 Jamming Detection
 Audio Record
 TTS
 Embedded AT (optional)

4.5.1 SIM800A GSM Module

The SIM800A modem has a SIM800A GSM chip as shown in fig 4.5.1 and RS232
interface while enables easy connection with the computer or laptop using the USB to Serial
connector or to the microcontroller using the RS232 to TTL converter. SIM800A - GSM/GPRS
module Designed for global market, SIM800 is a quad-band GSM/GPRS module that works on
frequencies GSM 850MHz, EGSM 900MHz, DCS 1800MHz and PCS 1900MHz.

Fig 4.5.1 SIM800A GSM Module

4.5.2 MAX232 IC

The MAX232 shown in Fig 4.5.2 is an integrated circuit that converts signal from an RS-
232 serial port to signals suitable for using TTL compatible digital logic circuits, so that devices
work on TTL logic can share the data with devices connected to serial port.

There are different types of GSM modems are available in the market and the common
GSM mode, which is common or mostly using in the market is TTL logic and sometimes some
are using the RS232 standards by using this there is a problem in communication with GSM
modem which is used by the Microcontroller, Aurdino, and some TTL platform. BY using the
MAX 232 we can overcome the problems.
Fig 4.5.2 MAX232 IC

4.5.3 Serial Port

User just needs to attach RS-232 cable here so that it can be connected to a device which
has serial port connected. The typical connector is as shown in fig 4.5.3.

Fig 4.5.3 Serial Port

4.5.4 Power supply socket

This power supply socket named as AC/DC socket shown in Fig 4.5.4 provides the
functionality to user to connect external power supply from transformer, battery or adapter
through DC jack. User can provide maximum of 12V AC/DC power supply through AC/DC
socket. This power supply designed into maximum protection consideration so that it can even
prevent reverse polarity DC power supply as well as DC conversion from AC power supply. It
also includes voltage regulator which provides as output voltage adjustable over a 1.2V to 3.7 V.

Fig 4.5.4 Power supply socket

4.5.5 Power ON/OFF And GSM On Switch


Power ON/OFF switch is a type of push-on push-off switch which is used for only to
make power supply ON/OFF provided through AC/DC socket indicated by ‘power LED’. GSM
on switch is type of push-on tactile switch which is used for only to make GSM module ‘on’
indicated by ‘module ON/OFF LED’.

4.5.6 SIM (Subscriber Identity Module) Card Slot

Fig 4.5.6 SIM Card Slot

The onboard SIM card slot shown in Fig 4.5.6 provides user functionality of insert a SIM
card of any service provider. While inserting in and removing out SIM card from SIM card slot,
user needs to take precaution that power supply should be off so that after making power supply
on it will be easy to re-initialize with SIM for this module. User just needs to unlock the SIM
card cover by sliding back. Then user needs to open this cover and insert SIM card according to
slot. Put down cover on SIM card and then lock by sliding forward.

4.5.7 Indicator LEDs

Indicator LEDs just used to indicate status of the GSM module. These are 3 LEDs
represents power ON/OFF status, network status and module ON/OFF status completely. Power
LED will keep on until the power supply is enabling to the board by using push-on push-off
switch. Network status LED will show whether inserted SIM card successfully connected to
service provider’s network or not, in short signal strength. Module ON/OFF indicator LED
shown in fig will show status of GSM module’s power ON/OFF.
4.5.8 GSM Interface with Arduino

This part of instructable explains GSM module interfacing to arduino as shown in Fig
4.5.8. Nowadays GSM is used in all the projects for wireless data transmission or alerting or
messaging system.

Hardware Required

1) Arduino Uno Board


2) SIM800 GSM module
3) Connecting Wire
Connection Between Arduino Board And GSM Module
1) GSM Module is powered using 12Volts DC adapter.
2) Arduino is powered using USB cable / Adapter.
3) 2nd pin of Arduino is connected to TX pin in GSM module.
4) 3rd Pin of Arduino is connected to RX pin of GSM Module.
5) Arduino GND is connected to GSM GND.
Fig 4.5.8 GSM Interface with Arduino

SOFTWARE REQUIREMENT DESCRIPTION:

Introduction to C:
C is an extensively helpful, unusual state tongue that was at first made by Dennis M. Ritchie to
develop the UNIX working system at Bell Labs. C was at first completed on the DEC PDP-11
PC in 1972.

In 1978, Brian Kernighan and Dennis Ritchie conveyed the chief openly available depiction of
C, now known as the K&R standard.

The UNIX working structure, the C compiler, and essentially all UNIX application programs
have been formed in C. C has now transformed into a for the most part used capable lingo for
various reasons:
• Easy to learn

• Structured vernacular

• It produces capable undertakings

• It can manage low-level activities

• It can be gathered on a grouping of PC stages

Truths about C

• C was devised to form a working system called UNIX.

• C is a successor of B vernacular which was introduced around the mid 1970s.

• The vernacular was formalized in 1988 by the American National Standard Institute
(ANSI).

• The UNIX OS was totally created in C.

• Today C is the most extensively used and renowned System Programming Language.

• Most of the best in class programming have been executed using C.

• Today's most well known Linux OS and RDBMS MySQL have been formed in C.

Why Use C?

C was at initially used for structure progression work, particularly the tasks that make-up the
working system. C was gotten as a structure change vernacular since it produces code that keeps
running about as speedy as the code written in low level figuring develop. A couple instance of
the use of C might be:

• Operating Systems

• Language Compilers

• Assemblers
• Text Editors

• Print Spoolers

• Network Drivers

• Modern Programs

• Databases

• Language Interpreters

• Utilities

NET BEANS IDE

NetBeans IDE is the official IDE for Java 8. With its editors, code analyzers, and
converters, you can quickly and smoothly upgrade your applications to use new Java 8 language
constructs, such as lambdas, functional operations, and method references. Batch analyzers and
converters are provided to search through multiple applications at the same time, matching
patterns for conversion to new Java 8 language constructs. With its constantly improving Java
Editor, many rich features and an extensive range of tools, templates and samples, NetBeans IDE
sets the standard for developing with cutting edge technologies out of the box. An IDE is much
more than a text editor. The NetBeans Editor indent lines, matches words and brackets, and
highlight source code syntactically and semantically. It also provides code templates, coding tips,
and refactoring tools. The editor supports many languages from Java, C/C++, XML and HTML,
to PHP, Groovy, Javadoc, JavaScript and JSP. Because the editor is extensible, you can plug in
support for many other languages. Keeping a clear overview of large applications, with
thousands of folders and files, and millions of lines of code, is a daunting task. NetBeans IDE
provides different views of your data, from multiple project windows to helpful tools for setting
up your applications and managing them efficiently, letting you drill down into your data quickly
and easily, while giving you versioning tools via Subversion, Mercurial, and Get integration out
of the box. When new developers join your project, they can understand the structure of your
application because your code is well-organized.
Design GUIs for Java SE, HTML5, Java EE, PHP, C/C++, and Java ME applications
quickly and smoothly by using editors and drag-and-drop tools in the IDE. For Java SE
applications, the NetBeans GUI Builder automatically takes care of correct spacing and
alignment, while supporting in-place editing, as well. The GUI builder is so easy to use and
intuitive that it has been used to prototype GUIs live at customer presentations. The cost of
buggy code increases the longer it remains unfixed. NetBeans provide static analysis tools,
especially integration with the widely used FindBugs tool, for identifying and fixing common
problems in Java code. In addition, the NetBeans Debugger lets you place breakpoints in your
source code, add field watches, step through your code, run into methods. The NetBeans Profiler
provides expert assistance for optimizing your application's speed and memory usage, and makes
it easier to build reliable and scalable Java SE, JavaFX and Java EE applications. NetBeans IDE
includes a visual debugger for Java SE applications, letting you debug user interfaces without
looking into source code. Take GUI snapshots of your applications and click on user interface
elements to jump back into the related source code.

Fig.: Snap Shot of Net Beans


MySQL

MySQL ("My Sequel") is (as of 2008) the world's most widely used open source
relational database management system (RDBMS) that runs as a server providing multi-user
access to a number of databases. The SQL phrase stands for Structured Query Language.
The MySQL development project has made its source code available under the terms of
the GNU General Public License, as well as under a variety of proprietary agreements. MySQL
was owned and sponsored by a single for-profit firm, the Swedish company MySQL AB, now
owned by Oracle Corporation.
MySQL is a popular choice of database for use in web applications, and is a central
component of the widely used LAMP open source web application software stack (and other
'AMP' stacks). LAMP is an acronym for "Linux, Apache, MySQL, Perl/PHP/Python." Free-
software-open source projects that require a full-featured database management system often use
MySQL.
MySQL is a relational database management system (RDBMS), and ships with no GUI
tools to administer MySQL databases or manage data contained within the databases. Users may
use the included command line tools, or use MySQL "front-ends", desktop software and web
applications that create and manage MySQL databases, build database structures, back up data,
inspect status, and work with data records. The official set of MySQL front-end tools, MySQL
Workbench is actively developed by Oracle, and is freely available for use.
MySQL, like most other transactional relational databases, is strongly limited by hard
disk performance. This is especially true in terms of write latency. Given the recent appearance
of very affordable consumer grade SATA interface Solid-state drives that offer zero mechanical
latency, a fivefold speedup over even an eight drive RAID array can be had for a smaller
investment.
Fig.: MySQL Workbench in Windows

NAVICAT PREMIUM
Navicat Premium is a multi-connections database administration tool allowing you to
connect to MySQL, MariaDB, SQL Server, and SQLite, Oracle and PostgreSQL databases
simultaneously within a single application, making database administration to multiple kinds of
database so easy.
Navicat Premium combines the functions of other Navicat members and supports most of
the features in MySQL, MariaDB, SQL Server, SQLite, Oracle and PostgreSQL including Stored
Procedure, Event, Trigger, Function, View, etc.
Navicat Premium enables you to easily and quickly transfer data across various database
systems, or to a plain text file with the designated SQL format and encoding. Also, batch job for
different kind of databases can also be scheduled and run at a specific time. Other features
include Import/ Export Wizard, Query Builder, Report Builder, Data Synchronization, Backup,
Job Scheduler and more. Features in Navicat are sophisticated enough to provide professional
developers for all their specific needs, yet easy to learn for users who are new to database server.
Establish a secure SSH session through SSH Tunnelling in Navicat. You can enjoy a
strong authentication and secure encrypted communications between two hosts. The
authentication method can use a password or public / private key pair. And, Navicat comes with
HTTP Tunnelling while your ISPs do not allow direct connections to their database servers but
allow establishing HTTP connections. HTTP Tunnelling is a method for connecting to a server
that uses the same protocol (http://) and the same port (port 80) as a webserver does.

Embedded Software – ARDUINO PLATFORM

Arduino can sense the environment by receiving input from a variety of sensors and can affect its
surroundings by controlling lights, motors, and other actuators. The microcontroller on the board
is programmed using the Arduino programming language (based on Wiring) and the Arduino
development environment (based on Processing). Arduino projects can be stand-alone or they
can communicate with software on running on a computer (e.g. Flash, Processing, MaxMSP).
Arduino is a cross-platform program. You’ll have to follow different instructions for your
personalOS..

Once you have downloaded/unzipped the arduino IDE, you can Plug the Arduino to your PC via
USB cable.

Now you’re actually ready to “burn” your first program on the arduino board.
To select “blink led”, the physical translation of the well known programming “hello world”,
select
File>Sketchbook>Arduino-0017>Examples>Digital>Blink

Once you have your sketch you’ll see something very close to the screenshot on the right.

In Tools>Board select Now you have to go to Tools>SerialPort and select the right serial port,
the one arduino is attached to.
Flashing Code to Arduino Board:
CHAPTER 5
FEASIBILITY STUDY

The feasibility of the project is analyzed in this phase and business proposal is put forth
with a very general plan for the project and some cost estimates. During system analysis the
feasibility study of the proposed system is to be carried out. This is to ensure that the proposed
system is not a burden to the company. For feasibility analysis, some understanding of the major
requirements for the system is essential.

Three key considerations involved in the feasibility analysis are:

 Economical Feasibility
 Technical Feasibility
 Social Feasibility

Economical Feasibility:

This study is carried out to check the economic impact that the system will have on the
organization. The amount of fund that the company can pour into the research and development
of the system is limited. The expenditures must be justified. Thus the developed system as well
within the budget and this was achieved because most of the technologies used are freely
available. Only the customized products had to be purchased.

Technical Feasibility:
This study is carried out to check the technical feasibility, that is, the technical
requirements of the system. Any system developed must not have a high demand on the available
technical resources. This will lead to high demands on the available technical resources. This
will lead to high demands being placed on the client. The developed system must have a modest
requirement, as only minimal or null changes are required for implementing this system.
Social Feasibility:

The aspect of study is to check the level of acceptance of the system by the user. This
includes the process of training the user to use the system efficiently. The user must not feel
threatened by the system, instead must accept it as a necessity. The level of acceptance by the
users solely depends on the methods that are employed to educate the user about the system and
to make him familiar with it. His level of confidence must be raised so that he is also able to
make some constructive criticism, which is welcomed, as he is the final user of the system.
CHAPTER 6

IMPLEMENTATION
The implementation phase involves the actual materialization of the ideas, which are
expressed in the analysis document and developed in the design phase. Implementation should be
perfect mapping of the design document in a suitable programming language in order to achieve
the necessary final product. Often the product is ruined due to incorrect programming language
chosen for implementation or unsuitable method of programming. It is better for the coding
phase to be directly linked to the design phase in the sense if the design is in terms of object
oriented terms then implementation should be preferably carried out in a object oriented way.

The implementation involves:

1. Careful planning.
2. Investigation of the current system and the constraints on implementation.
3. Training of staff in the newly developed system.

Implementation of any software is always preceded by important decisions regarding


selection of the platform, the language used, etc. these decisions are often influenced by several
factors such as real environment in which the system works, the speed that is required, the
security concerns, and other implementation specific details. There are three major
implementation decisions that have been made before the implementation of this project. They
are as follows:

1. Selection of the platform (Operating System).


2. Selection of the programming language for development of the application.
3. Coding guideline to be followed.

The GUI is developed using Android Studio, which is the client side. Android Studio is
the official integrated development environment (IDE) for the Android platform. The server side
of the implementation is done using NetBeans. NetBeans is a software development platform
written in Java. The NetBeans Platform allows applications to be developed from a set of
modular software components called modules. Applications based on the NetBeans Platform,
including the NetBeans integrated development environment (IDE), can be extended by third
party developers. The NetBeans IDE is primarily intended for development in Java, but also
supports other languages, in particular PHP, C/C++ and HTML5.

The protocol implemented in this project is Light Weight Anonymous Authentication


Protocol. This protocol aims at providing Data Freshness, Authentication, Secure Localization
and Maintains Anonymity.

PROGRAMMING LANGUAGE SELECTION


Java is a little, basic, safe, item situated, translated or rapidly improved, byte coded,
engineering, waste gathered, multithreaded programming dialect with a specifically exemption
taking care of for composing circulated and powerfully extensible projects.
With most programming dialects, you either accumulate or translate a project so you can run it
on your PC. The Java programming dialect is irregular in that a project is both accumulated and
deciphered. The stage autonomous codes deciphered by the mediator on the Java stage. The
mediator parses and runs every Java byte code guideline on the PC. Aggregation happens just
once; understanding happens every time the project is executed. The accompanying figure
delineates how this function You can consider Java byte codes as the machine code directions for
the Java Virtual Machine (Java VM). Each Java mediator, whether it’s an advancement device or
a Web program that can run applets, is an execution of the Java VM.

PLATFORM SELECTION
A platform is the hardware or software environment in which a program runs. As already
mentioned some of the most popular platforms like Windows 2000, Linux, Solaris, and MacOS.
Most platforms can be described as a combination of the operating system and hardware. The
Java platform differs from most other platforms in that it’s a software-only platform that runs on
top of other hardware-based platforms.
The Java platform has two components:
• The Java Virtual Machine (JVM)
• The Java Application Programming Interface (Java API)
We’ve already been introduced to the Java VM. It’s the base for the Java platform and is ported
onto various hardware-based platforms.

The Java API is a large collection of ready-made software components that provide many useful
capabilities, such as graphical user interface (GUI) widgets. The Java API is grouped into
libraries of related classes and interfaces; these libraries are known as packages.

The figure below depicts a program that’s running on the Java platform. As the figure shows, the
Java API and the virtual machine insulate the program from the hardware.

Fig. Java Interpreter Architecture

Native code is code that after you compile it, the compiled code runs on a specific hardware
platform. As a platform-independent environment, the Java platform can be a bit slower than
native code. However, smart compilers, well-tuned interpreters, and just-in-time byte code
compilers can bring performance close.

Input Design
The info outline is the connection between the client and data framework and creating particular
and strategies for information arrangement and those strides are important to put exchange
information into a usable structure for handling can be accomplished by investigating the PC to
peruse information from a composed or printed archive or it can happen by having individuals
entering the information specifically into the framework.

Output Design
A quality output is one, which meets the necessities of the end client and presents the data
obviously. In any framework consequences of preparing are conveyed to the clients and to other
framework through yields. In yield outline it is resolved how the data is to be dislodged for
prompt need furthermore the printed version yield. It is the most essential and direct source data
to the client. Productive and insightful yield outline enhances the framework's relationship to
help client choice making.

GRAPHICAL USER INTERFACE DESIGN

Graphical user interface is a type of user interface that allows users to interact with
electronic devices using images rather than text commands, A GUI represents the information &
action available to a user through graphical icons & visual indicators such as secondary notation,
as opposed to text-based interfaces, type command labels or text navigation. The actions are
usually performed through direct manipulation of the graphical elements. A GUI uses a
combination of technologies & devices to provide a platform that the user can interact with, for
the tasks of gathering & producing information.

A series of elements confirming a visual language have evolved to represent information


stored in computers. This makes it easier for people with a few computer skills to work with and
use computer software.

Designing the visual composition & temporal behavior of a GUI is an important part of
software application programming in the area of human-computer interaction. Its goal is to
enhance the efficiency & ease of use for the underlying logical design of a stored program, a
design discipline known as usability. Methods of user-centered design are used to ensure that the
visual language introduced in the design is well tailored to the tasks.
The Graphical user interface is developed using Android Studio which makes our application
easier to use. The user needs to login or register if he is a new user and connect to the Bluetooth
device.

Overview of Java/JSP/Swings

Java was conceived by James Gosling, Patrick Naughton, Chris wrath, Ed Frank, and
Mike Sheridan at Sun Micro system. It is a platform independent programming language that
extends its features wide over the network. Java2 version introduces a new components than are
possible with AWT

• It’s a light weight package, as they are not implemented by platform-specific code.
• Related classes are contained in javax.swing and its sub packages, such as
javax.swing.tree
• Components explained in the swing have more capabilities than those of AWT.
The Java programming language is a high-level language that can be characterized by all of
the following buzzwords

• Simple
• Architecture neutral
• Object oriented
• Portable
• Distributed
• High performance
• Interpreted
• Multithreaded
• Robust
• Dynamic
• Secure

With most programming languages, it either compile or interpret a program so that it can
run it on our computer. The Java programming language is unusual in that a program is both
compiled and interpreted. With the compiler, first it translate a program into an intermediate
language called Java byte codes.
Java byte codes are the platform-independent codes interpreted by the interpreter on the
Java platform. The interpreter parses and runs each Java byte code instruction on the computer.
Compilation happens just once; interpretation occurs each time the program is executed. The
following figure illustrates how this works.

Fig. Java Programming Language Execution

We can think of Java byte codes as the machine code instructions for the Java Virtual
Machine (Java VM). Every Java interpreter, whether it’s a development tool or a Web browser
that can run applets, is an implementation of the Java VM. Java byte codes help make “write
once, run anywhere” possible. You can compile your program into byte codes on any platform
that has a Java compiler. The byte codes can then be run on any implementation of the Java VM.
That means that as long as a computer has a Java VM, the same program written in the Java
programming language can run on Windows 2000, a Solaris workstation, or on an iMac.
Fig. Sample program execution
CHAPTER 7

TESTING

Testing is an important phase in the development life cycle of the product. This is the
phase, where the remaining errors, if any, from all the phases are detected. Hence testing
performs a very critical role for quality assurance and ensuring the reliability of the software.
During the testing, the program to be tested was executed with a set of test cases and the
output of the program for the test cases was evaluated to determine whether the program was
performing as expected. Errors were found and corrected by using the below stated testing steps
and correction was recorded for future references. Thus, a series of testing was performed on the
system, before it was ready for implementation.
It is the process used to help identify the correctness, completeness, security, and quality
of developed computer software. Testing is a process of technical investigation, performed on
behalf of stake holders, i.e. intended to reveal the quality-related information about the product
with respect to context in which it is intended to operate. This includes, but is not limited to, the
process of executing a program or application with the intent of finding errors.
The quality is not an absolute; it is value to some person. With that in mind, testing can
never completely establish the correctness of arbitrary computer software; Testing furnishes a
‘criticism’ or comparison that compares the state and behaviour of the product against
specification. An important point is that software testing should be distinguished from the
separate discipline of Software Quality Assurance (SQA), which encompasses all business
process areas, not just testing.
There are many approaches to software testing, but effective testing of complex products
is essentially a process of investigation not merely a matter of creating and following routine
procedure.
Although most of the intellectual processes of testing are nearly identical to that of
review or inspection, the word testing is connoted to mean the dynamic analysis of the product-
putting the product through its paces. Some of the common quality attributes include capability,
reliability, efficiency, portability, maintainability, compatibility and usability.

A good test is sometimes described as one, which reveals an error; however, more recent
thinking suggest that a good test is one which reveals information of interest to someone who
matters within the project community.
7.1 Types of Testing
7.1.1 Unit Testing
Individual component are tested to ensure that they operate correctly. Each component is
tested independently, without other system component. This system was tested with the set of
proper test data for each module and the results were checked with the expected output. Unit
testing focuses on verification effort on the smallest unit of the software design module. This is
also known as MODULE TESTING. This testing is carried out during phases, each module is
found to be working satisfactory as regards to the expected output from the module.
7.1.2 Integration Testing
Integration testing is another aspect of testing that is generally done in order to uncover errors
associated with flow of data across interfaces. The unit-tested modules are grouped together and
tested in small segment, which make it easier to isolate and correct errors. This approach is
continued unit I have integrated all modules to form the system as a whole.
7.1.3 System Testing
System testing is actually a series of different tests whose primary purpose is to fully exercise
the computer-based system. System testing ensures that the entire integrated software system
meets requirements. It tests a configuration to ensure known and predictable results. An example
of system testing is the configuration oriented system integration testing. System testing is based
on process description and flows, emphasizing pre-driver process and integration points
7.1.4 Performance Testing
The performance testing ensure that the output being produced within the time limits and time
taken for the system compiling, giving response to the users and request being send to the
system in order to retrieve the results.

7.1.5 Validation Testing


The validation testing can be defined in many ways, but a simple definition is that. Validation
succeeds when the software functions in a manner that can be reasonably expected by the end
user.
Black Box testing
Black box testing is done to find the following
 Incorrect or missing functions
 Interface errors
 Errors on external database access
 Performance error
 Initialization and termination error

White Box Testing


This allows the tests to
 Check whether all independent paths within a module have been exercised at least
once
 Exercise all logical decisions on their false sides
 Execute all loops and their boundaries and within their boundaries
 Exercise the internal data structure to ensure their validity
 Ensure whether all possible validity checks and validity lookups have been
provided to validate data entry.

7.1.6 Acceptance Testing


This is the final stage of testing process before the system is accepted for operational use.
The system is tested within the data supplied from the system procurer rather than simulated data
Table 6.1 Unit Test Case 1

S1 # 3Test 3Case UTC-*1

Name3of3Test User registration.

Expected3Result The user makes the registration by entering the name, email,
password, confirm password fields.

Actual3output Registration successful.

Remarks3 Successful

Table 6.2 Unit Test Case 2

S2 # 3Test 3Case UTC-*2

Name3of3Test User login.

User should enter mobile no and correct password to login.


Expected3Result

Actual3output A message popped up stating login success.

Remarks3 Successful
Table 6.3 Unit Test Case 3

S3 # 3Test 3Case UTC-*3

Name3of3Test Add contact details.

Expected3Result The user should be able to add the contact from phone
book and a message should pop up stating OK.

Actual3output A message popped up stating ok.

Remarks3 Successful

Table 6.4 Unit Test Case 4

S4 # 3Test 3Case UTC-*4

Name3of3Test Send alert message.

Expected3Result Alert message should be sent to the predefined contact


numbers and it should contain Help message along with
current location URL.

Actual3output Alert message with current location URL has been sent.

Remarks3 Successful
Conclusion
The proposed system helps to supports the gender equality by providing safe environment to
women in the society, and allows them to work till late nights. Anyone before doing any crime
against the women will be deterred and it help reducing the crime rate against the women.
In some of the cases the system can provide useful evidences. Since the system can do audio-
video recording of incidences which can act as the evidences.

FUTURE SCOPE

The system can be improved and extended with the following aspects in future:

o The product which is getting implemented on a ring with a mobile application is the best
suited and possibly the most essential design which could have happened now.

o In future by the technology being changed or there are things invented everyday, there
are expectations that the size of the device can be varied so that it becomes more
adequate to carry and to operate.

o There are possibilities by artificial intelligence and machine learning, the product can be
operated by just two blinks of eye of the user and the main device can be kept within
them and will capture all the information and route it to the places it is programmed by
using brain signals.

o Also in future the device can be programmed as a safety weapon in the form of a shock
providing instrument which will make the user to fight for safety by there own to protect
themselves at the time of critical situations.
o The device can be implemented with different features, one of them is hidden camera
detector.
References

[1] Dongare Uma, Vyavahare Vishakha and Raut Ravina, “An Android Application for Women
Safety Based on Voice Recognition”, Department of Computer Sciences BSIOTR wagholi,
Savitribai Phule Pune University India, ISSN 2320–088X International Journal of Computer
Science and Mobile Computing (IJCSMC) online at www.ijcsmc.com,Vol.4 Issue.3, pg. 216-
220, March- 2015

[2] MAGESH KUMAR.S and RAJ KUMAR.M, “IPROB – EMERGENCY APPLICATION


FOR WOMEN”, Department of Computer science Sree Krishna College of Engineering Unai
village Vellore (TN) India, ISSN 2250-3153 International Journal of Scientific and Research
Publications, online at the link www.ijsrp.org , Volume 4, Issue 3, March 2014.

[3] Vaijayanti Pawar, Prof. N.R.Wankhade, Dipika Nikam, Kanchan Jadhav and Neha Pathak,
“SCIWARS Android Application for Women Safety”, Department of Computer Engineering,
Late G.N.S.COE Nasik India, ISSN: 2248-9622 International Journal of Engineering Research
and Applications Online at the link www.ijera.com, Volume 4, Issue 3(Version 1), pp.823-826,
March 2014.

[4] Bhaskar Kamal Baishya, “Mobile Phone Embedded With Medical and Security
Applications”, Department of Computer Science North Eastern Regional Institute of Science and
Technology Nirjuli Arunachal Pradesh India, e-ISSN: 2278-0661 p- ISSN: 2278-8727 IOSR
Journal of Computer Engg (IOSR-JCE) www.iosrjournals.org, Volume 16, Issue 3 (Version IX ),
PP 30-3, May-Jun. 2014.

[5] Dr. Sridhar Mandapati, Sravya Pamidi and Sriharitha Ambati, “A Mobile Based Women
Safety Application (I Safe Apps)”, Department of Computer Applications R.V.R & J.C College
of Engineering Guntur India, e-ISSN: 2278-0661, p-ISSN: 2278-8727, IOSR Journal of
Computer Engg (IOSR-JCE) www.iosrjournals.org, Volume 17, Issue 1 (Version I), PP 29-34,
Jan.–Feb. 2015

[6] THOOYAVAN V, “ADVANCED SECURITY SYSTEM FOR WOMEN”, Department of


ECE Vidyaa Vikas College of Engineering and Technology Vasai Thane India, Final year
project, Serial number HEM 128 IEEE 2014 Project List under real time target surveillance
system, slides share on www.slideshare.net, Jun 24, 2014.

[7] Prof. Basavaraj Chougula, Archana Naik, Monika Monu, Priya Patil and Priyanka Das
“SMART GIRLS SECURITY SYSTEM”, Department of Electronics and telecommunication
KLE’s College of Engineering and Technology Belgaum India, ISSN 2319 – 4847 International
Journal of Application or Innovation in Engineering & Management (IJAIEM) Web Site:
www.ijaiem.org, Volume 3, Issue 4, April 2014.

[8] Nishant Bhardwaj and Nitish Aggarwal, “Design and Development of “Suraksha”-A Women
Safety Device”, Department of Electronics and Communication ITM UNIVERSITY Huda
Sector 23-A Gurgaon Delhi India, ISSN 0974-2239 International Journal of Information &
Computation Technology online available at http://www. irphouse.com, Volume 4, pp. 787-792,
November 2014.

[9] Poonam Bhilare, Akshay Mohite, Dhanashri Kamble, Swapnil Makode and Rasika Kahane,
“Women Employee Security System using GPS And GSM Based Vehicle Tracking”,
Department of Computer Engineering Vishwakarma IOT Savitribai Phule Pune University India,
E-ISSN:-2349-7610 INTERNATIONAL JOURNAL FOR RESEARCH IN EMERGING
SCIENCE AND TECHNOLOGY, Volume-2, ISSUE-1, JAN-2015.

[10] Remya George, Anjaly Cherian.V, Annet Antony, Harsha Sebestian, Mishal Antony and
Rosemary Babu.T, “An Intelligent Security System for Violence against Women in Public
Places”, ISSN: 2249 – 8958 International Journal of Engineering and Advanced Technology
(IJEAT), Volume-3, Issue-4, April 2014.

You might also like