Sunteți pe pagina 1din 25

HARESSEMENT ANDROID APP

(USING IOT)

BACHELOR OF ENGINEERING
IN
COMPUTER SCIENCE & ENGINEERING

Submitted to

SUBMITTED BY

DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING


Chandigarh University, Gharuan
MAY 2019

pg. 1
ACKNOWLEDGEMENT
We have taken efforts in this project. However, it would not have been
possible without the kind support and help of many individuals and
teachers. I would like to extend my sincere thanks to all of them. We are
highly indebted to our Mentor Er. Deepti Ma’am for her guidance and
constant supervision as well as for providing necessary information
regarding the project & also for her support in completing the project.
We would like to express our special gratitude and thanks to Er.
Harmanpreet Kaur Ma’am for giving us such attention and time and
support. We would like to express our gratitude towards our parents &
faculty of Chandigarh University for their kind co-operation and
encouragement which helped us in completion of this project. Our
thanks and appreciations also go to our colleague in developing the
project and people who have willingly helped us out with their abilities.

Shantanu joshi
Araman singh
Shantam

pg. 2
ABSTRACT

In today’s world it is very unsafe to travel alone, especially for women.


Since lots of unexpected, and shameful incidents are happening around
the globe. Problems may come from anywhere and anytime, as women
are also growing equally like men so for that purpose they have to travel
alone at night where ever they go, they have to travel alone in public
transport as well, and for that reason we need to understand and solve
this problem of women so they also should not feel any fear regarding
their safety. This report represents an android application which will
serve the purpose to rescue the women from unsafe conditions. As we
all Know that nowadays every individual carries their own smartphones
and the uses of android applications have been increased rapidly so it is
better to have such an android application which will provide a safe
environment in public transport as well as travelling.

pg. 3
LIST OF FIGURES

pg. 4
TABLE OF CONTENTS
SR.NUMBE TOPIC PAGE NO.
R
1
2
3
4
5

pg. 5
INTRODUCTION

If we are to fight discrimination and injustice against women we must


start from the home, for if a woman cannot be safe in her own house
then she cannot be expected to feel safe anywhere. A recent article in
India claimed that India is the fourth most dangerous place for women
to take public transport and the second worst for safety while travelling
at night. Thee awful Delhi bus gang rape in 2012 is just the tip of the
iceberg when it comes to the dangers of taking public transport as a
woman. This rape incident occurred on 16th December 2012 at a place
Munirka, neighbourhood in south Delhi which was a fatal assault. A 23-
year-old woman a physiotherapist was hit by a gang while she was
travelling in a public transport (bus) with a male friend. Another such
incident of TCS software engineer took place at Bhandup where the
body has been found after two days near Kanjurmarg suburb, this
incident was parallel just to the one evoked by Nirbhaya case in Delhi.
One more case taken place in Mumbai where woman was travelling to
her native place and she got kidnapped and killed. This is the small
contribution taken which will provide safety android app for women.
Users will allow to scan the QR code placed inside the vehicle and the
number plate of it will be sent in the text message format to the
contacts which user selects. It lets your family and friends know your
current via GPS tracker if your android device is connected to the
network. 1.1 Motivation In today’s world, it is not safe for a person to
travel alone at night especially for women; it will be unsafe to travel
alone because a woman is not highly strong as men. To provide safety
for women the good way to reduce chances in becoming a victim of
violent crime is to identify and call on resources to help you out of
unsafe situations. Having safety app on your phone can diminish our

pg. 6
risk and bring assistance when we require it. Unlike the other
applications available, which work only at the time of Emergency or
Danger, this app can be used as a safety or precaution measure. As it is
said that precaution is better than cure. Our motto in developing this
app is to provide a safe environment through smart phone as today
most of the people are carrying smart phones to wherever they go.
Using Android, we are going to implement QR Scanning and GPS
location. Through GPS, the current address of the user will be fetched
and then we are going to scan the QR code to get the vehicle details by
pointing the camera at the code which automatically then converted
into text format so that SMS can be send to any of the contact
depending on the user.

1.2. Goals and Objectives


We are trying to contribute little efforts towards women which will
ensure the safety and respect for women, so that she can also have
rights to grow equally like men. Our project is based on such application
which is going to help user by locating the root device through GPS and
also be able to scan the QR code, and message the content in text
format to contacts as per user wish.

pg. 7
1.3 Scope and Applications
As the Indian economy and the society embrace new frontiers, the
Indian woman of today is more and more a part of the public places,
claiming her rightful place in the society and the commercial world.
Women need to feel safe in public places, and children form another
vulnerable category as well, when it comes to road safety. For future
upgrades we will be linking our application with the databases of
driver’s details, i.e. if at all the driver is committing any sort of crime
and he or she has gone missing so we would be able to trace him by the
information provided in the databases. We will link our app directly
with the drivers details which will contain information like photo,
address of driver, contact details, batch assigned by the RTO and the
certification of vehicle details as well.

pg. 8
SRS

Aim: -Development of SRS document for Women’s Protection Android


App.
1. Introduction:-

➢ Purpose: - We are trying to contribute little efforts towards


women which will ensure the safety and respect for women, so
that she can also have rights to grow equally like men.

➢ Intended Audience and reading suggestion: - We are trying to


contribute little efforts towards women which will ensure the
safety and respect for women, so that she can also have rights to
grow equally like men.

➢ Reference: - google, youtube, android studio.

pg. 9
2. Overall Description: -
➢ Product Perspective:Our project is based on such application
which is going to help user by locating the root device through
GPS and also be able to scan the QR code, and message the
content in text format to contacts as per user wish.

➢ Product features:live tracking, live location broadcasting,


emergency contacts

➢ OPERATING ENVIRONMENT: Operating environment for the


Women Protection App is as listed below.
· distributed database
· client/server system
· Operating system: Windows, MacOs
· database: MySQL+ database
· platform: Java/PHP,Android Development Kit
· Local host: Xampp

➢ PURPOSE OF THE SYSTEM:

1.SECURITY: There is a lot of security of data on this content


management system. One cannot open our system without
knowing the password. Immediately after opening login screen

pg. 10
will appear on screen. Only after entering the correct username
and password user can operate our system.

2.REFERENTIAL INTEGRITY: User cannot change the date in the


transaction files. Addition of data can be done only on the master
files date in transaction files cannot be entered until addition is
done on the master files

3.EASY RETRIEVAL OF DATA: Data is retrieved easily and quick


using sql commands. Online commands are used to retrieve huge
amount of data.

4.GENERATION OF AUTOMATIC VALUES: In project in some screen


some fields generated automatically like Profile detail, Account
number, etc. First, it means that the same file containing IL code
instructions can be placed on any platform; at run-time the final
stage of compilation can then be easily accomplished so that the
code will run on that particular platform. In other words, by
compiling to IL you obtain platform independence for .NET, in
much the same way as compiling to Java byte code gives Java
platform independence.

pg. 11
➢ Assumptions: Embedded real-time environment, or
compatible, available on platform if the client changes or upgrades
their office system, the Online Banking System will not be
guaranteed to function unless the new operating system is fully
compatible with the current system as described in section 3 of
this document. All timings stated in this SRS shall be adhered to
within +/- 10% all requirements are addressed in this version of
the Online Banking System. No requirements are delayed to future
versions.

➢ Dependencies: The various numbers of users and services on


the Online Banking system are Power source

Systems (User systems/Servers) Communication

mediums(wired/wireless)

Internet Connections

3.SYSTEM FEATURES: -

3.1 FUNCTIONAL REQUIREMENTS

➢ DISTRIBUTED DATABASE: -

pg. 12
Distributed database implies that a single application should be
able to operate transparently on data that is spread across a
variety of different databases and connected by a communication
network as shown in below figure.

➢ CLIENT/SERVER SYSTEM: -

The term client/server refers primarily to an architecture or logical


division of responsibilities, the client is the application (also
known as the front-end), and the server is the DBMS (also known
as the back-end).

A client/server system is a distributed system in which,


• Some sites are client sites and others are server sites.
• All the data resides at the server sites.
• All applications execute at the client sites.

3. EXTERNAL INTERFACE REQUIREMENTS: -

➢ User Interfaces:
▪ Front-end software: HTML, CSS
▪ Back-end software: php

➢ Interfaces:
▪ A computer
▪ Windows or any operating system
▪ A browser which supports HTML

pg. 13
➢ Software interfaces:

Operating system-We have chosen Windows operating system for


its best support and user-friendliness.

Database- To save the user records we have chosen MySql


database.

XAMPP: - stands for Cross-Platform (X), Apache (A), MySQL (M),


PHP (P) and Perl (P). It is a simple, light-weighted Apache server
that allows developers to create a local http server.

phpMyAdmin:- is a free web application that provides a


convenient GUI for working with the MySQL database
management system.

➢ Communication Interfaces:

This project supports all types of web browsers. We are using


simple electronic forms for the reservation forms, ticket booking
etc.

pg. 14
4. NON-FUNCTIONAL REQUIREMENTS: -

➢ Performance Requirements:

The system must be interactive and the delays involved must be


less .So in every action-response of the system, there are no
immediate delays. . In case of opening windows forms, of popping
error messages and saving the settings or sessions there is delay
much below 2 seconds.

Normalization

The basic objective of normalization is to reduce redundancy


which means that information is to be stored only once. Storing
information several times leads to wastage of storage space and
increase in the total size of the data stored.

If a database is not properly designed it can give rise to


modification anomalies. Modification anomalies arise when data
is added to, changed or deleted from a database table. Similarly, in
traditional databases as well as improperly designed relational
databases, data redundancy can be a problem. These can be
eliminated by normalizing a database. Normalization is the
process of breaking down a table into smaller tables. So that each
table deals with a single theme.

➢ Safety Requirements:

pg. 15
If there is extensive damage to a wide portion of the database
due to catastrophic failure, such as a disk crash, the recovery
method restores a past copy of the database that was backed up
to archival storage (typically tape) and reconstructs a more current
state by reapplying or redoing the operations of committed
transactions from the backed up log, up to the time of failure .

➢ Security Requirements: Information transmission should be


securely transmitted to server without any changes in information
In a net banking website, it is highly required as not taking security
measures can lead to loss in data of the users.

pg. 16
Architecture diagrams

1.use case diagram

pg. 17
2.Activity Daigram for Login(registration)

pg. 18
3.Data flow daigram(Level-0)

pg. 19
Data flow diagram(Level-1)

pg. 20
Flow chart

pg. 21
Conclusion and future scope

1. Conclusion

Unfortunately, the safety of women is in doubt and security is not


concerned. Many headlines still coming across against women indicates
that increasing trends of such sexual assault, rapes still happening in
today’s generation. Around 80 percent of women are losing confidence
and have fear towards the realization of freedom. So, we are trying to
contribute little efforts towards women which will ensure the safety and
respect for women so that she can also have rights to grow equally like
men. This mobile application is very much helpful for anyone. This
application will help user by scanning the QR code which will be nothing
but scan and extract the vehicle details and through GPS the current
address will be fetched and send it to any contact depending on user.
Here the user can take precautions before coming to the actual danger .

2.limitations

1. You can’t send messages to any of the contacts if there is no


balance.

2. If your mobile is not connected to network, the current location


will not be fetched.

pg. 22
3. Future enhancement:-

As the technology emerges, it is possible to upgrade the system


and can be adaptable to desired environment. Because it is based
on object-oriented design, any further changes can be easily
adaptable. For future upgrades we will be linking our application
with the databases of driver’s details, i.e. if at all the driver is
committing any sort of crime and he or she has gone missing so
we would be able to trace him by the information provided in the
databases. We will link our app directly with the drivers details
which will contain information like photo, address of driver,
contact details, batch assigned by the RTO and the certification of
vehicle details as well.

pg. 23
References

[1] C. Yi and Y. Tian Text string detection from natural scenes by


structure-based partition and groupingIEEE Conf. Computer. Vis.
Pattern Recognition., Jun. 2012, pp. 1083â“1090.

[2] C. Yi and Y. Tian Localizing text in scene images by boundary


clustering, stroke segmentation, andstring fragment
classiïcationIEEETrans.ImageProcess.,vol.21,no.9,Sep.
2012,pp.4256ı4268,.L.NeumannandJ.MatasReal
́timescenetextlocalizationandrecognition,inProc.IEEECon
f.Computer.Vis.PatternRecognitionJun.2012,pp.3538ı3545.
[3] Digital image processing Rafael C Gonzalez
[4] INTERNATIONAL JOURNAL OF TECHNOLOGY ENHANCEMENTS
AND EMERGING ENGI-NEERING RESEARCH, VOL 3, ISSUE 05 122
ISSN 2347-4289 Copyright Âc©2015 IJTEEE. Sauver:An Android
Application For Women Safety.

[5] IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-


0661,p-ISSN: 2278-8727, Volume17, Issue 1, Ver. I (Jan â“ Feb.
2015), PP 29-34 www.iosrjournals.org DOI: 10.9790/0661-
17112934www.iosrjournals.org 29 | Page A Mobile Based Women
Safety Application (I Safe Apps)978-1-4673-6540-6/15.

[6] VaijayantiPawar et al Int. Journal of Engineering Research and


Applications www.ijera.com ISSN:2248-9622, Vol. 4, Issue
3( Version 1), March 2014, pp.823-826 www.ijera.com 823|P a g e
SCIWARSAndroid App for Women Safety.

pg. 24
[7] Google

[8] YouTube

[9] Quora and The hindu newspaper

pg. 25

S-ar putea să vă placă și