Minor Project Report PDF
Minor Project Report PDF
Submitted by
Of
BACHELOR OF TECHNOLOGY
Avadi, Chennai-62
2nd May, 2019
BONAFIDE CERTIFICATE
This is to certify that the minor project entitled”IOT BASED WOMEN SAFETY
GADGET” submitted by Varsha Parekh (16UECS0489), Vikas Kumar (16UECS0496) and
Ankit Kumar Singh (16UECS0031) in partial fulfillment for the requirements for the award of
the degree of Bachelor of Technology in Computer Science and Engineering is an authentic work
carried out by them under my supervision and guidance.
To the best of my knowledge, the matter embodied in the project report has not been
submitted to any other University/Institute for the award of any Degree or Diploma.
Submitted for the partial fulfillment for the award of the degree of Bachelor of Technology in
Computer Science and Engineering from Vel Tech Rangarajan Dr. Sagunthala R & D Institute
of Science and Technology (Deemed to be University, u/s 3 of UGC Act, 1956).
II CERTIFICATE OF EVALUATION
SEMESTER : VI
VARSHA PAREKH
1. VIKAS KUMAR IOT BASED WOMEN
Dr. C. AMUTHADEVI
ANKIT KUMAR SINGH SAFETY GADGET
The report of the Project submitted by the above students in partial fulfilment for the
award of Bachelor of Technology in COMPUTER SCIENCE AND ENGINEERING of Vel
Tech Rangarajan Dr. Sagunthala R & D Institute of Science and Technology for the viva-voce
examination held at Vel Tech Rangarajan Dr. Sagunthala R & D Institute of Science and
Technology on ______________, has been evaluated and confirmed to be the report of the
work done by the above student(s).
We express our deepest gratitude to our respected Founder Chancellor and President
Col. Prof. Dr. R. RANGARAJAN B.E. (EEE), B.E. (MECH), M.S (AUTO). DSc.
Chancellor and Founders President Dr. R. SAKUNTHALA RANGARAJAN M.B.B.S.,
Chairperson Managing Trustee and Vice President.
We are very much grateful to our beloved Vice Chancellor Prof. Dr. V.S.S KUMAR, for
providing us with an environment to complete our project successfully.
We are thankful to our esteemed Director Academics Dr. ANNE KOTESWARA RAO,
Ph.D., for providing a wonderful environment to complete our project successfully.
A special thanks to our Project Coordinator Mr. V. PRABHU, M.E., for his valuable
guidance and support throughout the course of the project.
We also take this opportunity to express a deep sense of gratitude to Our Internal Guide
Dr. C. AMUTHADEVI for her cordial support, valuable information and guidance, she helped
us in completing this project through various stages.
We thank our department faculty, supporting staffs, parents, and friends for their help and
guidance to complete this project.
ABSTRACT
The main purpose of this project is to introduce the concept of a women’s safety device
application in India. This device is acted as an emergency device for women who are in potential
danger of being attacked. The woman possessing this device can press the panic button if in
danger then SMS containing the latitude and longitude coordinates will be sent to pre fed mobile
numbers informing them of the danger and the location. The received coordinates can be viewed
on Google maps to determine the location of the woman and appropriate help can be provided.
This concept was devised in the wake of serious crime against women in India and to help curb
those crimes.
Women suffering violation are even denied of the basic human rights. Gender based
violence has become a national as well as international agenda because of decades long struggles
by civil society accompanied by women's movements. Though there are unprecedented numbers
of laws against domestic violence, sexual assault and other forms of violence in each and every
country to protect their female citizens to become a victim of any such violence but they are
facing major challenges in implementing such laws. Thus making the society unjust and insecure
for the women as in majority of cases the violator remains unpunished. All should focus on
ensuring a society which is secure for all the women around the globe so that they can experience
equality and justice. In a sexual act of violence the aggressors are confident of the power they
exercise. The defense strategy used by females needs to be revolutionized by adopting modern
technology and gadgets to protect them from their oppressor. This device will be helpful to all the
women who deserve a safe and secure world.
TABLE OF CONTENTS
vi
4.3.2.3 Receiving mode 17
5 IMPLEMENTATION
5.1 Input & Output 18
5.2 Limitations 21
6 RESULTS AND DISCUSSIONS
6.1 Efficiency of the proposed System 22
6.2 Comparison of Existing and 22
proposed System
6.3 Advantages of the proposed system 22
7 CONCLUSION AND FUTURE ENHANCEMENTS
7.1 Conclusion 23
7.2 Future Enhancements 23
APPENDICES 24
REFERENCES 43
vii
LIST OF FIGURES
viii
LIST OF ABBREVIATIONS
ABBREVIATIONS EXPLANATION
ix
CHAPTER 1
INTRODUCTION
PROJECT DOMAIN
There are probably living in the worst time our modern society has ever seen in terms of women
security. And aim to make women feel as strong as ever and strong enough to fight the parasites of
our society, strong enough to fight the odds, strong enough to protect themselves against any sexual
assaults. We aim at giving power to those without whom we cease to exist. The idea is to design a
system which shall make every place and every hour safer for women again. A system which shall
re-establish how very gregarious mankind is. This system shall call and send SMS alert to the
nearest police station, close contacts and also alert people in and around the venue of the crime,
everything just at a click of a button. The idea is to make up for the time it takes police to arrive at
the location.
1
1
PROBLEM STATEMENT
Among the worst countries in crime, India has an abhorrent track record in all forms of
sexual exploitation. In homes, on streets, in public transports and even offices. Indian women are in
a constant state of vigilance, like a country on terrorist alert. There have been grotesque cases of
rapes of toddlers, gang rape of eight years old and women trafficking. There have created a nation
where women are learning to cope with existential anxiety and we should be ashamed.
A lot of NGOs, rehabilitation centers and helpline numbers have been made operational in the past
years but they are all cures to the harassment that has already happened and not the ‘preventions’
that is needed.
There are certain pre-existing apps that do send a message to the saved contacts but none of
them is effective and quick enough and according to a survey, the existing technology doesn’t make
most women feel safe. A major change in the basic structure and a few add-ons to these is a
necessity. In a lot of cases, it is observed that women do not file a complaint against the accused
because of various reasons like not knowing the correct authority to report it to or feeling
ashamed/guilty about the incident.
2
CHAPTER-2
LITERATURE SURVEY
This app can be activated by a single click when the user feels she is in danger. This
application com-muniques the user’s location to the registered contacts for every few seconds in the
form of message. Thus, it acts like a sentinel following behind the person till the user feels she is
safe. The key features of this application are along with the user’s location, one of the registered
contacts gets a call. Also, the registered contacts and GPS location are saved from time to time in a
database.
2.1.2 Pros
This app continuously fetch the location for an interval of every 30 sec and send it to
registered contact. So we can easily track the user and it will also send the location in form of URL
or latitude and longitude coordinates of location.
2.1.3 Cons
This app will work at the time of the danger so it is not that feasible for a user to instantly
reaction if he or she is in trouble. The whole process of the system is done only when the device is
connected to proper mobile network, data connection of the device is on and location service in the
device is switched on (GPS).
3
2.2 Abhaya: An android App for the safety of women
Authors: Poonam Bhilare, Akshay Mohite, Dhanashri Kamble
Year of Publication: 2015
2.2.1 Description
This paper presents Abhaya, an Android Application for the Safety of Women and this app
can be activated this app by a single click, whenever need arises. A single click on this app identifies
the location of place through GPS and sends a message comprising this location URL to the
registered contacts and also call on the first registered contact to help the one in dangerous
situations. The unique feature of this application is to send the message to the registered contacts
continuously for every five minutes until the âœstopâ button in the application is clicked.
Continuous location tracking information via SMS helps to find the location of the victim quickly
and can be rescued safely.
2.2.2 Pros
This app continuously send message for every 5 mins until the user click the stop button. The
message contains the location URL and it also call on the first registered contact.
2.2.3 Cons
The working of this app is quite lengthy, though it provides continuous location of the user
but the continuous access to the Internet is required. Any trouble in network will lead to big problem
since the only way to give the information to our registered number is through Internet and if at all
the Internet accessibility is not possible then it will not help in any way.
4
2.3 A MOBILE BASED WOMEN SAFETY APPLICATION
Authors: Dr. Sridhar Mandapati, Sravya Pamidi, Sriharitha Ambati
Year of Publication: 2015
2.3.1 Description
The personal safety application requires the name and number of the person who is to be
contacted in times of emergency. Users can add multiple people in the emergency contacts list.
These are the people who will receive notifications or SMS in case of an emergency. All it requires
is the user’s action to trigger an SOS button provided and it shoots messages as fast as the device can
manage. Once the SOS button is hit, the people in the emergency contacts will get a message like:
Someone is in an emergency followed by another message, which has the exact or approximate GPS
location of the cell phone. The user can also make audio or video call. This app also provides
necessary first aid measures that should be taken at the time of emergency situations.
2.3.2 Pros
In this app user can add multiple contacts, all we need is just to trigger the SOS button and it
will start shooting emergency messages as fast as device manage.
2.3.3 Cons
Declare an emergency whenever you sense a danger which is not feasible. Continuous
Internet accessibility which always not possible due to network issues.
2.4.2 Pros
This app provide numerous feature such as GPS tracking, important contact numbers,
directions to safe location, pins displaying unsafe and free from danger areas.
2.4.3 Cons
This app will only provide the details of unsafe locations when user access it. It will not give
any sort of help when user is in trouble or danger and he/ she actually needs help.
6
2.5.2 Pros
The key features is that it requires details such as email address and password of both user
and recipient. It records the surrounding voice for about 45 sec.
2.5.3 Cons
This app will need continuous access to Internet for tracking location. If the victim is in
danger it is not possible to touch the button to give alert.
By providing SMS feature without internet and making app more feasible to use.
7
CHAPTER-3
PROJECT DESCRIPTION
In our Country, even though it has super power and an economic development, but still there
are many crimes against women. The atrocities against the women can be brought to an end with the
help of our product "FEMME". This device is a security system, specially designed for women in
distress. Method/Analysis: Using ARM controller for the hardware device is the most efficient and it
consumes less power. Use radio frequency signal detector to detect hidden cameras. Findings: We
analyzed that there are no security device for our total safety. The user has to carry multiple devices.
It is founded an ALL-IN-ONE security device which has all the features in one click.
Applications/Improvements: In this paper we used ARM controller and android application in which
both the device and the smart phone are synchronized using Bluetooth, hence both can be triggered
8
independently. It can be record audio for further investigation and can give an alert call and message
to the pre-set contacts with the instant location every 2 minutes and can be tracked live using our
application. Hidden camera detector is also a distinct feature using which we can ensure our privacy.
Women’s security is a critical issue in today’s world and it’s very much needed for every individual
to be acting over such an issue.
This project describes an “IOT based women security system” that provides the combination
of aurdino device and specialized software to track the vehicles or women location as well as
provide alerts messages and emergency call, with an emergency button
trigger. Now days due to recently happened cases such as rape by drivers or colleagues, burglary
etc., employee security, especially women employee security has become the foremost priority of the
companies. System uses the Global Positioning System technology of the cell phone to find out the
location of vehicle or women. The information of vehicle position or women provided by the device
can be viewed on Google maps using Internet or specialized software. The IT Companies are
looking forward to the security problem and requires a system that will efficiently evaluate the
problem of women employees’ security working in night shifts. This paper focuses on the proposed
model that can be increased self-confidence.
The project feasibility study is a document containing a detailed description of the project, followed
by a set of different feasibility areas. These are aspects of the project that will drive the success or
failure of the project. This study will provide the necessary information so that you can decide
whether or not your project will begin or whether it has a shot at success.
Identifying suitable opportunities for investment is an intricate and involved exercise in
developing countries. A variety of constraints, complexities, risks and uncertainties have to be
reckoned with, and their implications on the project implementation and its subsequent success in
the operational phase have to be carefully and thoroughly examined before the resources are
committed. Efforts in identifying these opportunities pursued at different levels. The enterprise
management is expected to take all initiative to convince itself about the prospects of the project that
it wishes to launch.
9
3.4 SYSTEM SPECIFICATION
3.4.1 HARDWARE SPECIFICATION
The following hardware used components are described in details such as-
1) SWITCH
In electrical engineering, a switch is an electrical component that can "make" or "break"
an electrical circuit, interrupting the current or diverting it from one conductor to another. The
mechanism of a switch removes or restores the conducting path in a circuit when it is operated. It
may be operated manually, for example, a light switch or a keyboard button, may be operated by a
moving object such as a door, or may be operated by some sensing element for pressure,
temperature or flow.
Fig 1-Switch
2) BATTERY
A rechargeable battery, storage battery, secondary cell, or accumulator is a type of electrical
battery which can be charged, discharged into a load, and recharged many times, as opposed to a
disposable or primary battery, which is supplied fully charged and discarded after use. It is
composed of one or more electrochemical cells.
11
3.4.2 SOFTWARE SPECIFICATION
ANDROID APP
The designer window is the window that is used to design the graphical interface of the app that is
being created. The blocks window is where we have the programs in the form of blocks. We just
need to drag and drop the blocks in correct order to get based on what we want the app to do.
MIT App Inventor is a platform to create android apps in a very easy manner. The link for the app
inventor is: appinventor.mit.edu.It has two major components-
a) Designer window
b) Blocks window
App Inventor for Android is an open-source web application originally provided by Google, and
now maintained by the Massachusetts Institute of Technology (MIT) It allows newcomers
to computer programming to create software applications for the Android operating system (OS). It
uses a graphical interface, very similar to Scratch and the Star Logo TNG user interface, which
allows users to drag-and-drop visual objects to create an application that can run on Android devices.
In creating App Inventor, Google drew upon significant prior research in educational computing, as
well as work done within Google on online development environments.
MIT App Inventor is an intuitive, visual programming environment that allows everyone – even
children – to build fully functional apps for smartphones and tablets. Those new to MIT App
Inventor can have a simple first app up and running in less than 30 minutes. And what's more, our
12
blocks-based tool facilitates the creation of complex, high-impact apps in significantly less time than
traditional programming environments. The MIT App Inventor project seeks to democratize
software development by empowering all people, especially young people, to move from technology
consumption to technology creation.
DESIGNER WINDOW
13
BLOCK WINDOW
When an event handler fires, It can be imagine that it creates a karaoke-like control dot that flows
through the command stack in its body. The control dot moves from the top of the stack to the
bottom, and when it reaches a command, that command is executed - i.e., the action of that
command is performed. Thinking about control "flowing" through a program will help us understand
its behavior.
App components are organized vertically by default. For example, in the extended version of
the Paint Pot tutorial, the user creates buttons which change the line size or wipe the screen. To
organize Button Wipe, Button Small, and Button Big nicely, drag a Horizontal Arrangement
Component from the Screen Arrangement section of the palette.
14
CHAPTER 4
MODULE DESCRIPTION
Push button is switch which is used for sending message from Smartphone via Bluetooth. Bluetooth
is wirelessly connected to Smartphone and serially connected to Arduino module .Arduino module
acts as microcontroller and Android app is designed in Smartphone to send data to Bluetooth
module. HC05 works in serial communication .When the switch is press for 2 sec android app send
data to Bluetooth .The code fed to Arduino check the receive data and compares. And finally it will
perform the serial communication in between the cell phone & the aurdino, and it will allow to send
SMS and call to the saved contact number.
15
4.2 DESIGN PHASE
4.2.1 DATA FLOW DIAGRAM
START
PRESS THE
PUSH
BUTTON
BLUETOOTH
SUPPLYING
NANO AURDINO ACTIVATED
POWER TO
AURDINO
CELL PHONE
BLUETOOTH &
ANDROID APP
ACTIVATED
STOP THE
Fig -10 Data flow diagram PROCESS
16
4.2.2 UML DIAGRAMS
1) USE-CASE DIAGRAM
A use case is a methodology used in system analysis to identify, clarify, and organize system
requirements. In this context, the term "system" refers to something being developed or operated,
such as a mail-order product sales and service Web site. Use case diagrams are employed
in UML (Unified Modeling Language), a standard notation for the modeling of real-world objects
and systems. System objectives can include planning overall requirements, validating
a hardware design, testing and debugging a software product under development, creating an online
help reference, or performing a consumer-service-oriented task. For example, use cases in a product
sales environment would include item ordering, catalog updating, payment processing, and customer
relations. A use case diagram contains four components.
The boundary, which defines the system of interest in relation to the world around it.
The actors, usually individuals involved with the system defined according to their roles.
17
The use cases, which the specific roles are played by the actors within and around the system.
The relationships between and among the actors and the use cases.
2) CLASS DIAGRAM
The class diagram is the main building block of object-oriented modeling. It is used for
general conceptual modeling of the structure of the application, and for detailed modeling translating
the models into programming code. Class diagrams can also be used for data modeling. The classes
in a class diagram represent both the main elements, interactions in the application, and the classes to
be programmed. In the diagram, classes are represented with boxes that contain three compartments.
The top compartment contains the name of the class. It is printed in bold and centered, and
the first letter is capitalized.
The middle compartment contains the attributes of the class. They are left-aligned and the
first letter is lowercase.
The bottom compartment contains the operations the class can execute. They are also left-
aligned and the first letter is lowercase.
18
4.3 WORKING DESCRIPTION
The Bluetooth module communicates with the arduino Nano via a serial communication, it has
four that will be using.VCC is used to power the module, it need to be connected to the arduino 5v
pin. GND is the ground pin, it need to be connected the Arduino ground pin. TXD is used to send the
data from the Bluetooth module to the arduino. It need to be connected to the serial received pin
RTXD of the arduino.
We will not be using RXD is used to receive data from the Arduino, it need to be connected to the
TXD pin of the Arduino. STATE and KEY of Bluetooth module connected to pin In the Bluetooth
module the TX line is rated as 3.3V. This means that even though we can power the module with 5v
from the arduino, the communication lines from and to the module are supposed to be at 3.3volts.
Sending data from the Bluetooth module via the TX of module will not be an issue, as per Arduino
RX line will interpret the 3.3V signal from the Bluetooth module correctly. Receiving data from the
Arduino is where we need to do more work. The RX line of the Arduino Nano is running at 5volts,
so we will be sending a higher voltage on the Bluetooth modules RX line Did not want to risk the
burning the Bluetooth module, through the 5v supply of RX lines, for that purposed used two
resistors to create a voltage.
The woman possessing this device will press the panic button if in danger.
An SMS containing the latitude and longitude coordinates will be sent to pre fed mobile
numbers informing them of the danger and the location.
The received coordinates can be viewed on Google maps to determine the location of the
woman and appropriate help can be provided
19
4.3.2.1 DEFAULT MODE
Updating of specific contacts, Adding of alert message and connecting of app with the gadget
takes place
As this mode is activated by the push button, it takes 7 seconds to obtain the coordinates
and messages are sent to the trusted contacts within intervals of 4 seconds. The message
contains a hyperlink which directs the recipient directly to Google maps where the location of
origination of the distress message will be displayed.
20
4.3.2.3 RECEIVING MODE
When this mode is activated by pressing the push button, a call to one trusted contact is activated
within 4 seconds of activation. Thus the success of this mode depends on the availability of the
predefined trusted contact.
21
CHAPTER-5
IMPLEMENTATION
1) INPUT
Push button is switch which is used for sending message from Smartphone via Bluetooth. It is a
simple switch mechanism for controlling some aspect of a machine or a process. Buttons are
typically made out of hard material, usually plastic or metal. The surface is usually flat or shaped
to accommodate the human finger or hand, so as to be easily depressed or pushed. Buttons are
most often biased switches, although many un-biased buttons (due to their physical nature) still
require a spring to return to their un-pushed state. Terms for the "pushing" of a button
include pressing, depressing, mashing, slapping, hitting, and punching.
22
2) OUTPUT
Bluetooth is wirelessly connected to Smartphone and serially connected to Arduino module Arduino
module is act as microcontroller Android app is designed in Smartphone to sending data to
Bluetooth module.HC05 works in serial communication When the switch is press for 2 sec android
app send data to Bluetooth The code fed to Arduino check the receive data and send the SMS and
call to the saved contact.
5.2 LIMITATIONS
1) Battery Use –This problem occurs on your cell phones. Your cell phone’s battery will be rapidly
decreasing rapidly when you leave your phone’s Bluetooth enabled for number of hours. The best
way to overcome this is disable the Bluetooth immediately after completing your task. It takes only a
few seconds to enable and disable it.
2) In this project for women security we use Bluetooth based devices such as Bluetooth ring and
smart phone here blue tooth range is 32.8ft so, according to that range if smart phone is moved from
out of that range then disable Bluetooth connection. Due to which women security process is
incomplete.
3) If we want to activate that women security app then press the switch of Bluetooth ring
continuously three times. If between that process delays is occurred then that process is not success.
23
CHAPTER-6
RESULT AND DISCUSSTION
In this project we use Bluetooth. Bluetooth doesn't require you to think about setting up a connection
or to push any buttons. Bluetooth uses low power signals. As a result, the technology requires little
energy and will therefore use less battery or electrical power. Obviously, this is a great benefit for
mobile devices because Bluetooth won't drain the life of your device's battery.
It is more reliable for women security. Its cost is moderate. All they need is a device that can be
carried around easily and women whenever the woman feels unsafe. i.e. small in size. Faster
Response time from emergency agency. Avoids the women rape. Provides very accurate data via
GPS system.
It is an all-in-one system. Hence no need to carry multiple devices. GPS tracking feature tracks the
user lively when you are the move after triggering the emergency button. It can be recorded audio in
future, which can be used for further investigations. When the battery is running low, it
automatically sends the SMS and call to saved contacts.
7.1 CONCLUSION
As one of the solutions to this sexual harassment, this proposed system is being developed using the
Bluetooth technology. The proposed design is used to solve the critical situation with technologically
sound equipment’s and ideas by the women. This system can give the self-confidence to the women
to face the incident which is against her safety and security. This paper attempts to deal with a
community concern that has been destroying the lives of uncountable individuals and their families.
A device like this improves the level of safety of women and girls. As technology is advancing, there
are better means of getting on hand information about unsafe women. The unit testing and
integration that were performed clearly indicate that the system provides security to all the women
across the globe without any major complications. Since this device is smaller in size, all the women
can carry it without much effort. The main purpose of the proposed system is to save the women
before any intolerable incidental occurs, and this is achieved through this work.
25
REFERENCE
1) www.appinventor.mit.edu
2) www.github.com
3) https://www.geeksforgeeks.org
4) https://en.wikipedia.org
5) https://www.youtube.comwatch?v=FSqYyjZtH4g
6) https://core-electronics.com
7) https://www.electronic device.com
8) www.mobile application by using android
9) https://Literature survey on women safety device
10) www.mitappinventor.com
26