Project Report
Project Report
Project Report
USING IOT
ABISHEK G (922520105001)
ARAVINDH S (922520105002)
PRAVEEN J (922520105030)
SARAVANASITHARDH D (922520105040)
Of
BACHELOR OF ENGINEERING
IN
JUNE 2023
Certified that this project report, “WOMEN SAFETY SYSTEM USING IOT” is the bonafide
work of ABISHEK G (922520105001), ARAVINDH S (922520105002), PRAVEEN J
(922520105030), SARAVANASITHHARDH D (922520105040) who carried out the project
work under my supervision.
SIGNATURE : SIGNATURE :
First and foremost, we communicate our thanks to our parents for providing us a
very nice environment for doing this project. We wish to express our sincere thanks to our
founder and chairmen Shri.V.S.BALSAMY, B.Sc., B.L., for his endeavor in educating us in this
premier institution.
Our genuine thanks to all the teaching staff members of V.S.B Engineering College and our
friends for their help in the successful achievement of this project work.
Finally, we bow before God the almighty who will always had a better plan for us. We give
our admire and glory to Almighty god for successful conclusion of our project.
I
• To prepare the graduates to be professionally competent to meet out the industrial needs.
PSO2: Apply suitable Electronic controllers for Power conversion, Control and Automation.
PSO3: Make use of appropriate technique and modern tools to analyze and evaluate the performance
of Electrical machines and Electronic circuit.
ABSTRACT
III
TABLE OF CONTENT
CHAPTER NO. TITLE PAGE NO.
Abstract III
1 Introduction 1
1.1 About the project 2
1.2 Block Diagram 2
1.3 Module description 3
2 SYSTEM SPECIFICATION 6
2.1 Hardware specification 7
2.2 Software specification 7
2.3 About the software 7
3 SYSTEM STUDY 14
3.1 Existing system 15
3.2 Proposed system 15
4 SYSTEM DESIGN 16
4.1 Data flow diagrams 17
4.2 Time Table 20
4.3 Input design 20
4.4 Output design 21
5 SYSTEM TESTING AND 22
IMPLEMENTATION
5.1 System testing 23
5.2 System implementation 26
6 CONCLUSION 28
7 FUTURE ENHANCEMENT 30
REFERENCE 32
IV
CHAPTER-1
1
INTRODUCTION
At the present scenario Women are competing with men in every prospect of society.
Women contribute fifty percent to the development of our nation. But the women have
fear of getting harassed and killed. All these types of women harassment cases are
increasing day by day. So it is very important to ensure the safety of women. In this
paper proposed model of a band will provide a required safety to women so that they
can do late night work. Proposed model contains various sensors which will measure
different parameters continually. IoT (internet of things) is relatively new and fast-
developing concept. By using IoT-based technology guardians, relatives and police can
monitor and track different sensors value and position of a device. A device is wearable
and so it is easy to carry.This can be achieved by the use of Arduino unit that
continuously monitor and records the all sensor reading in its permanent (non-volatile)
memory location.This system continuously records the reading and the live meter
2
1.2 BLOCK DIAGRAM
✔ Hardware
✔ Software
1.3.1 HARDWARE:
3
1. ARDUINO UNO
The Microcontroller used here is an Arduino UNO. The UNO is a
Microcontroller board based on ATMEGA 328P.
The ATMEGA 328P has 32kB of flash memory for storing code. The board has
14 digital input and output pins, 6 analog inputs, 16 MHz quartz crystal, USB, an
ICSP circuit and a reset button. The UNO can be programmed with the Arduino
software.
2. SENSORS
a sensor is a device, module, machine, or subsystem whose purpose is to detect
events or changes depends upon tranducer in its environment and send the
information to other electronics, frequently a microcontroller.A sensor is always
used with other electronics.
3. ESP8266 WIFI
The ESP8266 arduino compatible module is a low-cost Wi-Fi chip with full
TCP/IP capability, and the amazing thing is that this little board has a MCU
(Micro Controller Unit) integrated which gives the possibility to control I/O
digital pins via simple and almost pseudo-code like programming language. This
device is produced by Shanghai-based Chinese manufacturer, Espressif Systems.
4.GPS
GPS or Global Positioning System is a satellite navigation system that
furnishes location and time information in all climate conditions to the user. GPS
is used for navigation in planes, ships, cars and trucks also. The system gives
critical abilities to military and civilian users around the globe. GPS provides
continuous real time, 3-dimensional positioning, navigation and timing
worldwide.
4
1.3.2 SOFTWARE SIDE
1. COLLECT
There are sensors all around—in our homes, smart phones, automobiles, city
infrastructure, and industrial equipment. Sensors detect and measure information
on all sorts of things. And they communicate that data in some form, such as a
numerical value or electrical signal.
Sensors, or things, sense data and typically act locally. ThingSpeak enables
sensors, instruments, and websites to send data to the cloud where it is stored in
either a private or a public channel. ThingSpeak stores data in private channels
by default, but public channels can be used to share data with others. Once data is
in a ThingSpeak channel, you can analyze and visualize it, calculate new data, or
interact with social media, web services, and other devices.
Storing data in the cloud provides easy access to your data. Using online
analytical tools, you can explore and visualize data. You can discover
relationships, patterns, and trends in data. You can calculate new data. And you
can visualize it in plots, charts, and gauges. Storing data in the cloud provides
easy access to your data. Using online analytical tools, you can explore and
visualize data. You can discover relationships, patterns, and trends in data. You
can calculate new data. And you can visualize it in plots, charts, and gauges
5
CHAPTER-2
6
SYSTEM SPECIFICATION
2.1 HARDWARE SPECIFICATION
✔ Microcontroller
✔ Motion Sensor
✔ Temperature Sensor
✔ Panic Button
✔ Transformer
✔ Resistors
✔ Capacitors
✔ Diodes
Arduino Compiler
⮚ MC Programming Language: C
7
⮚ IOT Gecko
PHP
PHP stands for Hypertext Preprocessor. PHP scripts run inside Apache server or
Microsoft IIS. PHP and Apache server are free. PHP code is very easy. PHP is the
most used server side scripting language. PHP files contain PHP scripts and
HTML. PHP files have the extension “php”, “php3”, “php4”, or “phtml”.
Generate dynamic web pages. PHP can display different content to different user
or display different content at different times of the day Process the contents of
HTML forms. We can use an PHP to retrieve and respond to the data entered into
an HTML form. Can create database-driven web pages. An PHP can insert new
data or retrieve existing data from a database such a MySQL. PHP is a standard
HTML file that is extended with additional features. Like a standard HTML file,
PHP contains HTML tag that can be interpreted and displayed by a web browser.
Anything we could normally place in an HTML file Java applets, Blinking text,
server side scripts .we can place in PHP. However, PHP has three important
features that make it unique. PHP contains server side scripts. PHP provides
8
HYPER TEXT MARKUP LANGUAGE (HTML)
also a Meta language for formally describing document markup system. Infact
document’s structure and inter connectivity. Following the rigors of SGML, TBL
bore HTML to the world in 1990. Since then, many of us have it to be easy to use
but sometimes quite limiting. These limiting factors are being addressed but the
World Wide Web Consortium (aka W3c) at MIT. But HTML had to start
somewhere, and its success argues that it didn’t start out too badly.
PHP Syntax
A PHP scripting block always starts with <?php and ends with ?>. A PHP
scripting block can be placed anywhere in the document.
On servers with shorthand support enabled you can start a scripting block with <?
And end with ?>.
For maximum compatibility, we recommend that you use the standard form (<?
php) rather than the shorthand form.
A PHP file normally contains HTML tags, just like an HTML file, and some PHP
scripting code.each code line in PHP must end with a semicolon.
The semicolon is a separator and is used to distinguish one set of instructions
from another
9
BENEFIT OF PHP
• Cross Platform
All the PHP based applications can run on various types of platforms. PHP is
supported by majority of Operating Systems, some of which includes Solaris,
UNIX, Windows and Linux. The mentioned platforms can be used to write codes
in PHP and also view web pages or run the PHP based applications.
• Easy to use
PHP is widely used because it is easy to use. In contrast with other programming
languages that are complex, PHP is simple, fluent, clean and organized, hence it
is a boon for the new users. PHP has a well-organized syntax which is logical at
the same time.
The high speed of PHP gives it an advantage over other scripting languages and
gives it an application in important administrations such as the server
administration and mail functionalities.
• Open source
10
languages used for web development which requires the user to pay for the
support files, PHP is open to everyone, anytime and anywhere. PHP is
maintained and developed by a large group of PHP developers which helps in
creating support community of PHP that helps people in PHP implementation
and manipulation.
Fields
Fields are places in a table where we store individual chunks of information.
11
Primary key and other indexed fields
MySQL use key fields and indexing to help speed many database operations. We
can tell MySQL, which should be key fields, or MySQL can assign them
automatically.
Properties:
Properties are the specification we assigned to parts of our database design. We
can define properties for fields, forms, controls and most other access objects.
12
FEATURES OF MYSQL
• MYSQL is a relational database system. If you can believe many diehard
MYSQL fans, MYSQL is faster, more reliable, and cheaper -- or, simply put,
better -- than any other database system (including commercial systems such as
Oracle and DB2). Many MYSQL opponents continue to challenge this
viewpoint, going even so far as to assert that MYSQL is not even a relational
database system. We can safely say that there is a large bandwidth of opinion.
• The fact is that there is an ever increasing number of MYSQL users, and
the overwhelming majority of them are quite satisfied with MYSQL. Thus for
these users we may say that MYSQL is good enough.
• It is also the fact, however, that MYSQL still lacks a number of features
that are taken for granted with other database systems.
• If you require such features, then MYSQL is (at least for the present) not
the database system for you. MYSQL is not a panacea.
• The following list shows the most important properties of MYSQL. This
section is directed to the reader who already has some knowledge of relational
databases. We will use some terminology from the relational database world
without defining our terms exactly. On the other hand, the explanations should
make it possible for database novices to understand to some extent what we are
talking about.
• Relational Database System: Like almost all other database systems on the
market, MYSQL is a relational database system.
13
• the familiar large database systems (Oracle, Microsoft SQL Server, etc.)
are client/server systems. These are in contrast to the file-server systems, which
include Microsoft Access, dBase and FoxPro. The decisive drawback to
fileserver systems is that when run over a network, they become extremely
inefficient as the number of users grows.
14
CHAPTER-3
SYSTEM STUDY
There are few already created devices and products in market that are related to
our research. Following are the few examples of the existing systems/devices:-
1. ROAR (Athena)
15
2. Foot wear chip
3. Shake2Safety
III. DRAWBACKS OF EXISTING DEVICES
There existed a chip that was sticked to the footwear and was used to send the
alerts. The other research showed up with the smart band that was used to
generate the SOS signals along with the personal health information and based
on that the alert was generated.
We have developed a prototype that is a smart device that can be worn by any
individual on their wrists. The band is always active, the victim needs to tap on
the screen twice when she feels the need of it or she feels someone is abusing her.
After tapping on the button, the device will start sending the current latitudinal
and longitudinal co-ordinates to the near ICE contacts and the police
controlroom.. All sensor reading continuously and send to webserver via IOT
device. In this system we use, Arduino UNO acts as main controller which
continuously get data from sensor . By using the microcontroller we can able
toset the threshold value. If it reaches the threshold value it sends the notification
to the user.
16
CHAPTER-4
SYSTEM DESIGN
System design is the process of planning a new system or to replace the existing
system. Simply, system design is like the blueprint for building, it specifies all
the features that are to be in the finished product. System design phase follows
17
system analysis phase. Design is concerned with identifying functions, data
streams among those functions, maintaining a record of the design decisions and
providing a blueprint the implementation phase.
Design is the bridge between system analysis and system implementation. Some
of the essential fundamental concepts involved in the design of application
software are:
• Abstraction
• Modularity
• Verification
A data flow diagram is graphical tool used to describe and analyze movement of
data through a system. These are the central tool and the basis from which the
physical components associated with the system. These are known as the logical
data flow diagrams. The physical data flow diagrams show the actual implements
TRANSMITTER SIDE:
18
RECIVER SIDE:
19
Field Name Attribute Type Size Description
Id Primary key Int 10 It uniquely store id in the table
20
4.2 TABLE DESIGN
System analysts decide the following input design details like, what data item to
input, what medium to use, how the data should be arranged or coded data items
and transaction needing validations to detect errors and at last the dialogue to
guide users in providing input. Input data of a system may not be necessarily a
raw data captured in the system form scratch. These can also be the output of
another system or sub-system. The design of input covers all phases of input
from the certain of initial data to actual entering the data to the system for
processing.
21
4.4 OUTPUT DESIGN
Output design generally refers to the results and information that are generated
by the system. For many end-users, output is the main reason for developing the
system and the basis on which they evaluate the usefulness of the application.
The objective of a system finds its shape in terms of output. The analysis of the
objective of a system leads to determination of outputs. Outputs of a system can
take various forms. The most common are reports, screens displays printed form,
graphical drawing etc. the outputs vary in terms of their contents, frequency,
timing and format. The users of the output, its purpose and sequence of details to
be printed are all considered. When designing output, the system analyst must
accomplish things like, to determine what information to be present, to decide
whether to display or print the information and select the output medium to
distribute the output to intended recipients.
Internal outputs are those, whose destination is within the organization. It is to
be carefully designed, as they are the user’s main interface with the system.
Interactive outputs are those, which the user uses in communication directly with
the computer.
22
CHAPTER -5
23
SYSTEM TESTING AND IMPLEMENTATION
System testing is the stage before system implementation where the system is
made error free and all the needed modifications are made. The system was
tested with test data and necessary corrections to the system were carried out. All
the reports were checked by the user and approved. The system was very user
friendly with online help to assist the user wherever necessary.
TEST PLAN
A test plan is a general document for the entire project, which defines the scope,
approach to be taken, and schedule of testing, as well as identifying the test item
for the entire testing process, and the personal responsible for the different
activities of testing. This document describes the plan for testing, the knowledge
management tool.
Major testing activities are:
▪ Test units
▪ Features to be tested
▪ Test deliverables
▪ Schedule
▪ Personal allocation
24
TEST UNITS
Test Case specification is major activity in the testing process. In this project, I
have performed two levels of testing.
• Unit testing
• System testing
• Exception handling
TEST DELIVERABLES
25
✔ The report for system testing
✔ Error report
The test case specification for system testing has to be submitted for review
before the system testing commences.
UNIT TESTING
VALIDATION TESTING
The objectives of this testing is to tell user about the validity and the reliability of
the system
26
SYSTEM TESTING
Entire system is tested as per the requirements. Black-box type testing that is
based on the overall requirements, covers all combined parts of a system.
INTEGRATION TESTING
This type of testing is especially relevant to client/server and distributed systems.
27
5.2 SYSTEM IMPLEMENTATION
System Implementation is the stage of the project when the theoretical design is
tuned into working system. If the implementation system stage is not carefully
controlled and planned, it can cause chaos. Thus it can be considered to be the
most critical stage in achieving a successful new system and in giving the users a
confidence that the system will work and be effective.
The implementation stage in a project involves,
28
The application’s validations are made, taken into account of the entry levels
available in various modules. Possible restrictions like number formatting, date
formatting and confirmations for both save and update options ensures the
correct data to be fed into the database. Thus all the aspects are charted out and
the complete project study is practically implemented successfully for the end
users.
29
CHAPTER -6
CONCLUSION
30
The occurrence of threats to women leads to increase in number of security
devices and applications. This research shows the various factors which have
been used in applications and smart devices developed for women safety. In this
paper, the various techniques used so far for the sake of women safety against the
fraudulent people have been discussed. Also a brief explanation about the devices
31
CHAPTER-7
FUTURE ENHANCEMENT
32
In future, we can add shooting of video at the time of the emergency that helps
in reaching the criminal very easily. It also provides an evidence against the
criminal. We can also save the photos and videos on the drive so that it will be
easy for further any used. Prototype can be further calibrated into a complete
market product which will be made with chips and utility hardware so that it can
be attached to the public transport vehicles that will help every person to know
about the location of their near and dear ones. We can also capture and send
photos to the registered number in the applications along with the location.
BIBLIOGRAPHY
33
REFERENCE
3. Digital.csic.es/bitstream/10261/127788/7/D-C-%20Arduino%20uno
6. Thingspeak (www.Thingspeak.co.in)
5090-4967- 7, 2018.
34
35