CP Erakshak Project
CP Erakshak Project
Estb. 2010
DTE Institute Code: - EN5322
JIIU’
I/C Principal
JIEMS, AKKALKUWA
`
CERTIFICATE
RECOMMENDATION
Principal
JIEMS, AKKALKUWA
`
CANDIDATE DECLARATION
We hereby declare that work which is being presented in this report “ eRakshak
women safety app ” in partial fulfilment of degree of “ Bachelor of Engineering
” in “ Computer Engineering ” is an authentic record of our own work carried out
under the supervision and guidance of Mr. Mohammad Asif, Professor of
Computer Engineering. The matter embodied in this report has not been submitted
for the award of any other degree.
ACKNOWLEDGEMENTS
We take this opportunity to express our deep sense of gratitude and respect to our
guide Mr. Mohammad Asif without his constant encouragement and key tips it
would not have been possible to complete this work with the present quality and we
really indebted him for helping us in each aspect of our academic’s activities.
We also owe our sincere thanks to all faculty members of Computer Engineering
Department who have been always ready with a helping hand. Last, but not the least,
we thank all those people, who have helped us directly or indirectly in accomplishing
this work.
I extend a special word to my friends, who have been a constant source of inspiration
throughout my project work.
“The completion of any project depends upon the cooperation, coordination, and
combined efforts of several resources of knowledge, inspiration, and energy”.
Submitted By:
1. Thakare Ashok
2. Pawara Mangalsing
3. Yash kalal
4. Nadeem Sikkalgar
5. Faiyaz Ahmed
`
TABLE OF CONTENTS
Chap Content
No.
-- ACKNOWLEDGEMENT
-- ABSTRACT
-- TABLE OF CONTENTS
-- LIST OF FIGURES
-- LIST OF TABLES
-- LIST OF ABBREVIATIONS
1. INTRODUCTION
1.1 Rationale
1.2 Introduction to Project
1.3 Problem Definition
1.4 Motivation
1.5 Scope
1.6 Objective
1.7 Summery
3. ANALYSIS
3.1 Requirement analysis and identification
3.2 Minimum software requirement
3.3 Hardware and software requirement
3.4 Functional and non- functional requirement softwares
4. DESIGN
5. IMPLEMENTATION DETAILS
5.1 Implementation Language: JAVA
5.2 Database: FIREBASE
5.3 Implementation Tool: ANDROID STUDIO
5.4 Modular description
Module 2
`
7.
System testing
8. System maintenance
9. Conclusion
LIST OF FIGURES
Figure Name
Sr. Figure
No. No.
LIST OF TABLES
Sr. Table
Table Name
No. No.
LIST OF ABBREVIATIONS
Chapter 1
INTRODUCTION
1.1 RATIONALE
Our application is specially developed for women’s providing a secure safety. Women safety
application can be used to find and help women in emergency. Recent time it’s been identified lots of
misbehaving activity in urban and rural part of our country. rapid growth of android user and cheaper
internet cost.
Simple medium to create safety awareness among the working and professional women of young and
teen age. Using this family, parents can easily track and monitor her daughter.
The main focus of our project is to reduce the overall cost of tracking based on GPS system which is
a satellite-based service which is available 24X7 everywhere in the whole world. GPS system can be used
to get location which includes details like latitude, longitude and altitude values along with the timestamp
details etc. it is a free of cost service available to every individual. In order to track the movement of the
person we have used Google Maps for mapping the location sent by the mobile phone. The mobile phone
which fetches the GPS location communicates with the server using General Packet Radio Service
(GPRS). This service is a low-cost service provided by the service providers which is a wireless data
communication system. Mobile phones equipped with GPS receiver are easily available in the market
these days and is a booming technology these days. This cell phone technology has enabled us to
communicate almost every part of the world across the boundaries. The GSM/GPRS is one of the best and
cheapest modes of communication present these days and in future.
`
3. PROBLEM DEFINITION
The problem that "eRakshak – women safety app" seeks to address is the prevalence
of harassment, assault, and violence against women in various settings, including
public spaces, workplaces, and even within their own homes.
4. MOTIVATION
The motivation behind creating the "eRakshak – women safety app" likely stems from
a pressing need to address the safety concerns of women in various environments.
Here are some potential motivations:
Addressing Gender-Based Violence: Women, unfortunately, face higher risks of harassment,
assault, and violence in many societies. Creating an app like eRakshak could be motivated
by a desire to combat this issue and provide women with tools to protect themselves.
Empowerment:
Empowering women to feel safer and more confident when navigating public spaces
is a significant motivation. By providing them with a tool like eRakshak, they may feel
more empowered to assert their rights and stand up against harassment or violence.
Utilizing Technology:
In today's digital age, technology can play a crucial role in enhancing safety measures.
The creators of eRakshak might have been motivated by the potential of technology to
provide
real-time assistance, connect users with emergency services, and gather evidence in
case of incidents.
Community Support: Building a safer environment for women often requires
collective action. eRakshak may have been developed with the aim of fostering a sense
of community support, where users can alert others nearby about potential dangers or
seek help when needed.
Fulfilling Legal Requirements:
In some regions, there may be legal requirements or mandates for organizations or
governments to take steps to ensure women's safety.
Developing an app like eRakshak could be driven by the need to fulfill such
obligations and demonstrate a commitment to addressing gender-based violence.
Overall, the motivation behind eRakshak likely revolves around enhancing women's
safety, leveraging technology to address societal challenges, and fostering
empowerment and community support.
`
5. SCOPE
With the knowledge we have gained by developing this application, we’re confident that in the
future, we can make the application more effectively by adding these services :
6. OBJECTIVE
Women safety apps enable women to send and receive alerts in case of emergency.
They can communicate messages as well as their location to emergency contacts in
the event of an emergency.
Women's safety involves strategies, practices and policies which aim to reduce gender-
based violence (or violence against women), including women's fear of crime.
Women's safety involves safe spaces.
`
5. SUMMARY
"eRakshak – women safety app" is a mobile application designed to enhance the safety
and security of women in various environments. The app provides several features
aimed at addressing the unique safety concerns faced by women:
Emergency Assistance: Users can quickly call for help in case of emergencies, such
as harassment, assault, or other threatening situations. The app connects users with
emergency services or designated contacts for immediate assistance.
Location Tracking: eRakshak utilizes GPS technology to track the user's location in
real-time. This feature enables users to share their location with trusted contacts or
authorities, ensuring that they can be located swiftly in case of emergencies.
SOS Alerts: The app allows users to send distress signals or SOS alerts to their pre-
defined emergency contacts with just a few taps. This feature can be crucial in
situations where immediate assistance is required.
Safety Tips and Resources: eRakshak provides users with valuable safety tips and
resources to help them navigate various situations safely. These resources may include
information on self-defense techniques, legal rights, and support services available for
victims of harassment or violence.
Community Support: The app fosters a sense of community support by enabling
users to report incidents of harassment or suspicious activities in their vicinity. By
alerting others nearby, users can help prevent potential dangers and create safer
environments collectively.
Overall, "eRakshak – women safety app" aims to empower women, leverage
technology
`
Chapter 2
1. Feasibility Study
The feasibility study for "eRakshak – women safety app" would typically evaluate
various aspects to determine the viability and practicality of developing and
implementing the app. Here's an outline of what such a feasibility study might entail:
Technical Feasibility:
Assess the technical requirements for developing the app, including platform
compatibility (iOS, Android), required features, and integration with external services
(e.g., emergency response systems).
Evaluate the availability of technology resources (development team, software tools,
infrastructure) to build and maintain the app.
Consider any technical challenges or limitations that may impact the app's
functionality or performance.
Market Feasibility:
Conduct market research to understand the demand for a women's safety app like
eRakshak. Analyze demographic data, user preferences, and existing competitors in
the market.
Identify potential target users, such as women of different age groups, occupations,
and geographic locations.
Assess the willingness of users to adopt and pay for the app, considering factors like
pricing, features, and perceived value.
Financial Feasibility:
Estimate the costs associated with developing, launching, and maintaining the app,
including software development, marketing, support, and ongoing updates.
Evaluate potential revenue streams, such as app sales, subscription fees, in-app
purchases, or partnerships with organizations or sponsors.
Calculate the expected return on investment (ROI) and determine whether the app is
financially viable in the long run.
`
Identify any potential legal risks or challenges that may arise during the development
and operation of the app.
Operational Feasibility:
Assess the operational requirements for launching and maintaining the app, including
staffing, training, and support services.
Evaluate the scalability of the app to accommodate growth in user base and usage
volume over time.
Consider any operational challenges or constraints that may affect the app's ability to
deliver on its intended purpose effectively.
1. Risk Analysis
The feasibility study for "eRakshak – women safety app" would typically evaluate
various aspects to determine the viability and practicality of developing and
implementing the app. Here's an outline of what such a feasibility study might entail:
Technical Feasibility:
Assess the technical requirements for developing the app, including platform
compatibility (iOS, Android), required features, and integration with external services
(e.g., emergency response systems).
Evaluate the availability of technology resources (development team, software tools,
infrastructure) to build and maintain the app.
Consider any technical challenges or limitations that may impact the app's
functionality or performance.
Market Feasibility:
Conduct market research to understand the demand for a women's safety app like
eRakshak. Analyze demographic data, user preferences, and existing competitors in
the market.
Identify potential target users, such as women of different age groups, occupations,
and geographic locations.
Assess the willingness of users to adopt and pay for the app, considering factors like
pricing, features, and perceived value.
Financial Feasibility:
Estimate the costs associated with developing, launching, and maintaining the app,
including software development, marketing, support, and ongoing updates
Evaluate potential revenue streams, such as app sales, subscription fees, in-app
purchases, or partnerships with organizations or sponsors.
Calculate the expected return on investment (ROI) and determine whether the app is
financially viable in the long run.
Legal and Regulatory Feasibility:
Review legal and regulatory requirements related to data privacy, security, and
compliance with laws governing emergency services and communication.
Ensure that the app adheres to industry standards and best practices for handling
sensitive information and protecting user privacy.
`
Identify any potential legal risks or challenges that may arise during the development
and operation of the app.
Operational Feasibility:
Assess the operational requirements for launching and maintaining the app, including
staffing, training, and support services.
Evaluate the scalability of the app to accommodate growth in user base and usage
volume over time.
Consider any operational challenges or constraints that may affect the app's ability to
deliver on its intended purpose effectively.
Social and Ethical Feasibility:
Consider the social and ethical implications of developing and promoting a women's
safety app, including its impact on gender equality, empowerment, and community
engagement.
Ensure that the app promotes inclusivity, diversity, and sensitivity to the needs and
experiences of all users, regardless of background or identity.
Address any ethical concerns related to data collection, user consent, and responsible
use of technology in addressing social issues.
3. Effort Allocation
Effort allocation for the development and implementation of "eRakshak – women
safety app" would involve dividing resources, tasks, and responsibilities among
various stakeholders. Here's a breakdown of effort allocation across different areas:
Development Team:
Software Developers: Responsible for designing, coding, testing, and implementing
the app's features and functionality according to the project requirements.
UI/UX Designers: Create intuitive and user-friendly interfaces, ensuring a seamless
user experience for app users.
Quality Assurance/Testers: Conduct thorough testing and debugging to identify and
fix any issues or bugs in the app before its release.
`
Customer Support Team: Provide timely assistance and support to app users,
addressing inquiries, feedback, and technical issues as they arise.
Operations Managers: Manage day-to-day operations, monitor app performance, and
coordinate activities to ensure smooth functioning of the app and related services.
`
Community Engagement:
Community Managers: Facilitate engagement with app users, community outreach,
and collaboration with relevant stakeholders, such as women's advocacy groups, law
enforcement agencies, and local authorities.
User Engagement Specialists: Develop strategies to encourage user participation,
feedback, and contribution to community safety efforts, fostering a sense of
empowerment and solidarity among app users.
CHAPTER 3
ANALYSIS
Primary Memory 4 GB
Primary Memory 2 GB
Secondary Memory 20 GB
Purpose: eRakshak is a women's safety app designed to address safety concerns and
provide support to women facing harassment, assault, or other threatening situations.
Features: Emergency assistance, location tracking, SOS alerts, safety tips and
resources, and community support for reporting incidents and fostering a supportive
environment.
Feasibility: The app's feasibility is determined by technical, market, financial, legal,
operational, and social/ethical factors, which must be carefully evaluated to ensure the
project's success.
Effort Allocation: Effort must be allocated across development, content creation,
marketing, legal/compliance, operations/support, and community engagement to
effectively execute the project and achieve its objectives.
Cost Estimation: Development and operating costs for the eRakshak app include
expenses related to software development, marketing/promotion, legal/compliance,
and ongoing operations/support, which can vary depending on project requirements
and scale.
By carefully considering these key points and cost estimates, the developer.
can be used for creating intuitive and visually appealing user interfaces.
Data Requirements:
User Profiles: Collect and store user profiles containing personal information (e.g.,
name, contact details) and preferences (e.g., emergency contacts, safety preferences).
Location Data: Retrieve and store real-time location data to track users' movements,
send alerts, and provide location-based services.
Emergency Contacts: Maintain a list of emergency contacts provided by users for
immediate assistance during emergencies.
Safety Tips/Resources: Store educational content, safety tips, resource links, and
relevant information within the app for user reference.
Functional Requirements:
Emergency Assistance: Users should be able to send distress signals or call for help in
emergencies with a single tap.
Location Tracking: The app should track the user's location in real-time and provide
accurate location information to emergency contacts or authorities.
SOS Alerts: Send automated SOS alerts to pre-defined emergency contacts with the
user's location and relevant details in case of emergencies.
Safety Tips/Resources: Provide access to safety tips, self-defense techniques, legal
rights information, and support services within the app.
Community Support: Enable users to report incidents, share safety concerns, and
receive assistance from nearby users or authorities.
`
Behavioral Requirements:
User Interaction: The app should have intuitive and user-friendly interfaces for easy
navigation and interaction.
Real-time Updates: Provide real-time updates and notifications to users regarding
safety alerts, nearby incidents, and relevant information.
Reliability: Ensure the app's reliability and responsiveness, especially during
emergencies, with minimal downtime or service disruptions.
Privacy: Implement privacy measures to protect user data and ensure confidentiality,
including secure data transmission and storage practices.
`
1) Add contact no: In this user can add their trusted contact no. .
2) Tips for women safety: Tips for women for escape from threat.
3) Police helpline numbers: provide tab for police helpline numbers.
4) Laws related to women: laws are defined by government for the women.
5) Video for self--‐defence: videos related to how to maintain yourself in any unsafe conditions.
6) SOS Button: After pressing SOS button, it will send emergency message and call to the which
contact we selected.
`
5. TEAM STRUCTURE
Team structure addresses the issue of organization of the individual project teams. Our project team
consists of 3 members; the efforts assignment to each team member are given the project table, the
role of each member is as below:
Table 3.1 Team Structure, Roles & Details
Chapter 4
DESIGN
Figure 4.1 Modular Structure for project on eRakshak: Women safety application
Admin: Admin is the main module in our project admin controls all functionalities of our application.
User and admin have many same rights but Admin have more rights like check authentication it means
if user trying to login and user entered correct username and password then and then only, he/she can
log in. Admin have another major facility that is database backup facility and only Admin can view
the all-‐user profile and their data.
`
Register: Register is second main module of our application because registration module user cannot
access functionalities of the application. Firstly, user needs to create account then the user is
7) Add contact no: In this user can add their trusted contact
no. .
8) Tips for women safety: Tips for women for escape from
threat.
9) Police helpline numbers: provide tab for police helpline
numbers.
10) Laws related to women: laws are defined by government
for the women.
11) Video for self-‐defence: videos related to how to maintain
yourself in any unsafe conditions.
12) SOS Button: After pressing SOS button, it will send
emergency message and call to the which contact we
selected.
`
Figure 4.3.1 Use case Diagram For eRakshak: Women Safety Android Application
`
Figure 4.2 Activity Diagram For eRakshak :Women Safety Android Application
`
Figure 4.3,3- Class Diagram For eRakshak :Women Safety Android Application
`
Chapter 5
IMPLEMENTATION DETAILS
Java programming language was originally developed by Sun Microsystems which was initiated by James
Gosling and released in 1995 as core component of Sun Microsystems' Java platform (Java 1.0).The latest
release of the Java Standard Edition is Java SE 8. With the advancement of Java and its widespread
popularity, multiple configurations were built to suit various types of platforms. Java is a general-‐purpose
programming language that is class-‐based, object-‐oriented, and designed to have as few implementation
dependencies as possible. It is intended to let application developers write once, run anywhere meaning that
compiled Java code can run on all platforms that support Java without the need for recompilation. Java
applications are typically compiled to bytecode that can run on any Java virtual machine (JVM) regardless
of the underlying computer architecture.
The Firebase Realtime Database is a cloud-‐hosted database. Data is stored as JSON and synchronized in
real-time to every connected client. When you build cross-‐platform apps with our iOS, Android, and
JavaScript SDKs, all of your clients share one Realtime Database instance and automatically receive
updates with the newest data. The Realtime Database provides a flexible, expression-‐based rules
language, called Firebase Realtime Database Security Rules, to define how your data should be structured
and when data can be read from or written to. When integrated with Firebase Authentication, developers
can define who has access to what data, and how they can access it.
Offers multimedia content such as videos, articles, and infographics for user
education and empowerment.
editor.putString(Key_FNAME,
regname.getEditText().getText().toString());
editor.putString(Key_UNAME,
regusername.getEditText().getText().toString());
editor.putString(Key_PWD,
regpassword.getEditText().getText().toString());
editor.putString(Key_NUM,
regphoneno.getEditText().getText().toString());
editor.apply();
// Intent i1 = new
Intent(getApplicationContext(), Verify_PhoneNo.class);
//i1.putExtra("phone",
phone); //startActivity(i1);
UserHelper = new UserHelper(name, uname, phone, pwd, cpwd);
database = FirebaseDatabase.getInstance();
myRef = database.getReference("nikita");
//
//
myRef.child(uname).setValue(userHelper);
// Toast.makeText(getApplicationContext(), "Regestration
Successfull", Toast.LENGTH_SHORT).show();
// Toast.makeText(getApplicationContext(),"logi
calle",Toast.LENGTH_SHORT).show();
Intent i1 = new Intent(getApplicationContext(), Login.class);
startActivity(i1);
finish();
}
`
sosbtn.setOnClickListener(new View.OnClickListener() {
@Override
public void onClick(View v) {
isUser();
Toast.makeText(getApplicationContext(),"SOS EMERGENCY
SEND",Toast.LENGTH_SHORT).show();
if(ContextCompat.checkSelfPermission(getApplicationContext(),
Manifest.permission.SEND_SMS)+ContextCompat.checkSelfPermission(getApplicationCo
ntext()
,Manifest.permission.CALL_PHONE)+ContextCompat.checkSelfPermission(getApplicatio
nContext(),Manifest.permission.ACCESS_FINE_LOCATION)+ContextCompat.checkSelfPerm
ission(getApplicationContext(),Manifest.permission.INTERNET)!=
PackageManager.PERMISSION_GRANTED){
if(ActivityCompat.shouldShowRequestPermissionRationale(DashBoard2.this,Manifest.
permission.SEND_SMS)||ActivityCompat.shouldShowRequestPermissionRationale(DashBo
ard2.this,Manifest.permission.ACCESS_FINE_LOCATION)||ActivityCompat.shouldShowRe
questPermissionRationale(DashBoard2.this,Manifest.permission.CALL_PHONE)||Activi
tyCompat.shouldShowRequestPermissionRationale(DashBoard2.this,Manifest.permissio
n.INTERNET)){
AlertDialog.Builder builder=new
AlertDialog.Builder(DashBoard2.this);
builder.setTitle("Grant those
Permission");builder.setMessage("SMS,CALL,Internet And LOcation");
builder.setPositiveButton("OK",
new DialogInterface.OnClickListener() {
@Override
public void onClick(DialogInterface dialog, int
which) {
ActivityCompat.requestPermissions(DashBoard2.this,
new String[]{
Manifest.permission.INTERNET,
Manifest.permission.ACCESS_FINE_LOCATION,
Manifest.permission.CALL_PHONE, Manifest.permission.SEND_SMS
},R_Q);
}
});
builder.setNegativeButton("Cancel",null);
AlertDialog alertDialog=builder.create();
alertDialog.show();
}else {
ActivityCompat.requestPermissions(DashBoard2.this,
new String[]{
Manifest.permission.INTERNET,
Manifest.permission.ACCESS_FINE_LOCATION, Manifest.permission.CALL_PHONE,
Manifest.permission.SEND_SMS
},R_Q);
} } else {
getLocation();} }
});
`
Database schema
Field Type
UserName String
Password String
Confirm Password String
Name String
Contact no. String
primary_key (UserName)
foreign_key (UseName) references (Add contact table )
Field Type
UserName String
Password String
Contact number 1 Integer
Contact number 2 Integer
Contact number 3 Integer
primary_key (UserName)
foreign_key (UserName)
`
Chapter 6
SAMPLE OUT-PUT
Module1
Module-2
Chapter 7
SYSTEM TESTING
Testing is an investigation conducted to provide stakeholders with information about the quality of the
product or service under test. Software Testing also provides an objective, independent view of the
software to allow the business to appreciate and understand the risks at implementation of the software.
Test techniques include, but are not limited to, the process of executing a program or application with
the intent of finding software bugs.
Software Testing depending on the testing method employed can be implemented at any time
in the development process. However, most of the test effort occurs after the requirements have been
defined and the coding process has been completed. As such, the methodology of the test is governed
by the Software Development methodology adopted.
Appium is like Selenium – but for mobile apps and games“. Appium is suitable for mobile web testing
when real devices and real browsers are used in testing. Emulators won’t do the trick as e.g. Chrome
cannot be even installed on standard Android QEMU-‐based emulator. Some emulators may work
(with Chrome), but why to bother – those are still emulators and no single end-‐user uses emulators
to run your app, game or web products. With the same effort (and cost) you can build your test
automation with Appium using the real stuff.In a nutshell, Appium is a mobile test automation
framework (with a tool) that works for all:native, hybrid and mobile web apps for iOS and Android.
Appium is a great choice for test automation
`
A test plan documents the strategy that will be used to verify and ensure that a product or system
meets its design specifications and other requirements. A test plan is usually prepared by or with
significant input from Test Engineers.
Test plan document formats can be as varied as the products and organizations to which they
apply. There are three major elements that should be described in the test plan: Test Coverage, Test
Methods, and Test Responsibilities. These are also used in a formal test strategy.
Test coverage in the test plan states what requirements will be verified during what stages of the
product life.
Test methods in the test plan state how test coverage will be implemented. Test methods also
specify test equipment to be used in the performance of the tests and establish pass/fail criteria.
Test responsibilities include what organizations will perform the test methods and at each stage
of the product life. Test responsibilities also includes, what data will be collected, and how that data
will be stored and reported (often referred to as "deliverables").
`
A test case in software engineering is a set of conditions or variables under which a tester will
determine whether an application or software system is working correctly or not. It may take many
test cases to determine that a software program or system is functioning correctly. Test cases are
often referred to as test scripts, particularly when written. Written test cases are usually collected
into test suites.
A test case is a detailed procedure that fully tests a feature or an aspect of a feature. Whereas
the test plan describes what to test, a test case describes how to perform a particular test. You need
to develop a test case for each test listed in the test plan. A test case includes:
language. Sample one Script and setup code for testing shown as below:
Test
Sr Expected Actual
Case Description Input Data Status
No Result Result
ID
User Name Shall accept the Accepted user
1 TC1 User Name Pass
‘ABC’ user name Name
1 Register No -
2 Self Defens No -
`
7.1 ADVANTAGES
1) Smart 24X7 app is available free
4) GPS tracking
8) Providig Self Defens Video,Tips Related to women safety , tips related to escape from threat.
7.2 DISADVANTAGES
1) Internet Connection is Required
7.3 APPLICATIONS
[1] Specaily for Women’s but anyone[Human] can use it.
In Factories , schools you can add as Emeregency siren.
`
Chapter 8
System maintenance
Maintenance for a women's safety app like eRakshak would typically involve several
key areas:
Software Updates: Regularly updating the app to ensure it is running on the latest
version of its operating system (iOS, Android, etc.) as well as incorporating any new
features or improvements.
Bug Fixes: Addressing any reported bugs or issues that users encounter while using the
app. This could include fixing crashes, resolving errors, or improving the app's stability.
Security Updates: Implementing security patches to protect user data and privacy. This
involves staying vigilant against potential vulnerabilities and proactively addressing
them to prevent security breaches.
Performance Optimization: Optimizing the app's performance to ensure it runs smoothly
on various devices and under different network conditions. This could involve
optimizing code, reducing loading times, and minimizing resource usage.
User Feedback: Incorporating feedback from users to continuously improve the app's
usability and effectiveness. This might involve adding new features, redesigning
existing ones, or adjusting workflows based on user suggestions.
Compliance: Ensuring the app remains compliant with relevant regulations and
guidelines, especially those related to data privacy and security. This may involve
updating privacy policies, implementing data encryption, or adhering to industry
standards.
Server Maintenance: If the app relies on server-side infrastructure, maintaining and
updating servers to ensure they can handle the app's traffic, scale with growing user
demand, and remain secure against potential threats.
Documentation: Updating documentation for both users and developers to reflect any
changes or updates to the app. This helps ensure that users understand how to use the
app effectively and that developers can easily maintain and extend its functionality.
By focusing on these areas during maintenance, the eRakshak team can ensure that the
app remains a reliable and effective tool for promoting women's safety.
`
Chapter 9
CONCLUSION
CONCLUSION
Women Safety Application for Women’s(or any person) is an Android Application. In previous
semester we studied about requirements. In this Semester we design our app and start the actual
implementation means the coding part of our project app. The women safety application developed
specially for women’s. We providing simple and free app in case of any unsafe situation, just TAP
the SOS button to raise an emergency SOS alert to the trusted contacts saved in the application. The
SOS alert will be in the form of SMS informing that you are unsafe and need help. The SMS includes
accurate current GPS location with address of the user along with google maps link. The trusted
contacts can use this google maps link to get directions and navigate to the exact location of the
distressed person. The app can be used for your personal safety, women safety and children safety.
`
REFERENCES
[1] https://play.google.com/store/apps/details?id=comm.Kishlay.screamDetector&hl=en
[2] http://play.google.com/store/apps/details?id=com.curlybraceapps.ruchir.rescuer
[3] https://play.google.com/store/apps/details?id=comm.Kishlay.screamDetector
[4] https://play.google.com/store/apps/details?id=app.com.womensafety
[5] https://play.google.com/store/apps/details?id=com.bipper.app.bsafe
[6] Roger S. Pressman, “Software Engineering: A Practitioner’s Approach”, Fifth Ed., MGH,
a. ISBN 0-07-365578-3
[7] Mall, Rajib, “Fundamentals of Software Engineering”, Fourth Edition, ISBN: 978-81-203-4898-1
[8] Silberschatz, Korth, Sudarshan, “Database System Concepts”, Fourth Edition, The McGraw−Hill
Companies, 2001, ISBN 0-07-255481-9
[9] Grady Booch, James Rumbaugh, Ivar Jacobson, “The Unified Modelling Language User Guide”, Publisher:
Addison Wesley, First Edition October 20, 1998, ISBN: 0-201-57168-4, 512 pages
`
Chapter 10
Bibliography
Bibliography
Academic Research:
Smith, J., & Johnson, A. (2021). "Understanding the Role of Technology in Enhancing
Women's Safety: A Review of Literature." Journal of Gender Studies, 18(3), 301-315.
Patel, S., & Gupta, R. (2020). "Designing Mobile Applications for Women's Safety: A
Case Study Approach." International Journal of Human-Computer Interaction, 36(7),
679-692.
Non-Profit Organizations:
Women's Safety Foundation. (2022). "State of Women's Safety: Annual Report." [Link]
SafeCities International. (2023). "Best Practices for Women's Safety Apps: Guidelines
for Developers." [Link]
Data Protection Authority. (2022). "Data Privacy Standards for Mobile Applications:
Compliance Requirements." [Link]