0% found this document useful (0 votes)
25 views

Minor Project Report PDF

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views

Minor Project Report PDF

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 35

IOT BASED WOMEN SAFETY GADGET

A MINOR PROJECT REPORT

Submitted by

VARSHA PAREKH (16UECS0489)


VIKAS KUMAR (16UECS0496)
ANKIT KUMAR SINGH (16UECS0031)

In partial fulfillment for the award of the degree

Of

BACHELOR OF TECHNOLOGY

Department of Computer Science and Engineering

Vel Tech Rangarajan Dr. Sagunthala R & D Institute of Science and


Technology

Avadi, Chennai-62
2nd May, 2019
BONAFIDE CERTIFICATE

This is to certify that the minor project entitled”IOT BASED WOMEN SAFETY
GADGET” submitted by Varsha Parekh (16UECS0489), Vikas Kumar (16UECS0496) and
Ankit Kumar Singh (16UECS0031) in partial fulfillment for the requirements for the award of
the degree of Bachelor of Technology in Computer Science and Engineering is an authentic work
carried out by them under my supervision and guidance.
To the best of my knowledge, the matter embodied in the project report has not been
submitted to any other University/Institute for the award of any Degree or Diploma.

Signature of Supervisor Signature of Head of the Department

Dr. C. Amuthadevi, Dr.V.Srinivasa Rao M.Tech, Ph.D.,


Asso. Professor, Professor,
Department of CSE, Department of CSE,
Vel Tech Rangarajan Dr. Sagunthala Vel Tech Rangarajan Dr.Sagunthala
R & D Institute of Science and Technology, R&D Institute of Science and Technology,
Avadi, Chennai-600062 Avadi, Chennai-600062.

Submitted for the partial fulfillment for the award of the degree of Bachelor of Technology in
Computer Science and Engineering from Vel Tech Rangarajan Dr. Sagunthala R & D Institute
of Science and Technology (Deemed to be University, u/s 3 of UGC Act, 1956).
II CERTIFICATE OF EVALUATION

COLLEGE NAME : Vel Tech Rangarajan Dr. Sagunthala R & D


Institute of Science and Technology

BRANCH : Computer Science and Engineering

SEMESTER : VI

S. NAME OF THE TITLE OF THE NAME OF THE PROJECT


No. STUDENT PROJECT SUPERVISOR

VARSHA PAREKH
1. VIKAS KUMAR IOT BASED WOMEN
Dr. C. AMUTHADEVI
ANKIT KUMAR SINGH SAFETY GADGET

The report of the Project submitted by the above students in partial fulfilment for the
award of Bachelor of Technology in COMPUTER SCIENCE AND ENGINEERING of Vel
Tech Rangarajan Dr. Sagunthala R & D Institute of Science and Technology for the viva-voce
examination held at Vel Tech Rangarajan Dr. Sagunthala R & D Institute of Science and
Technology on ______________, has been evaluated and confirmed to be the report of the
work done by the above student(s).

INTERNAL EXAMINER EXTERNAL EXAMINER


III ACKNOWLEDGEMENT

We express our deepest gratitude to our respected Founder Chancellor and President
Col. Prof. Dr. R. RANGARAJAN B.E. (EEE), B.E. (MECH), M.S (AUTO). DSc.
Chancellor and Founders President Dr. R. SAKUNTHALA RANGARAJAN M.B.B.S.,
Chairperson Managing Trustee and Vice President.

We are very much grateful to our beloved Vice Chancellor Prof. Dr. V.S.S KUMAR, for
providing us with an environment to complete our project successfully.

We obligated to our beloved Registrar Dr.E.KANNAN M.E., Ph.D., for providing


immense support in all our endeavors.

We are thankful to our esteemed Director Academics Dr. ANNE KOTESWARA RAO,
Ph.D., for providing a wonderful environment to complete our project successfully.

We record indebtedness to our Head of the Department. Dr.V.SRINIVASA RAO,


M.Tech., Ph.D., for immense care and encouragement towards us throughout the course of this
project.

A special thanks to our Project Coordinator Mr. V. PRABHU, M.E., for his valuable
guidance and support throughout the course of the project.

We also take this opportunity to express a deep sense of gratitude to Our Internal Guide
Dr. C. AMUTHADEVI for her cordial support, valuable information and guidance, she helped
us in completing this project through various stages.

We thank our department faculty, supporting staffs, parents, and friends for their help and
guidance to complete this project.
ABSTRACT

The main purpose of this project is to introduce the concept of a women’s safety device
application in India. This device is acted as an emergency device for women who are in potential
danger of being attacked. The woman possessing this device can press the panic button if in
danger then SMS containing the latitude and longitude coordinates will be sent to pre fed mobile
numbers informing them of the danger and the location. The received coordinates can be viewed
on Google maps to determine the location of the woman and appropriate help can be provided.
This concept was devised in the wake of serious crime against women in India and to help curb
those crimes.
Women suffering violation are even denied of the basic human rights. Gender based
violence has become a national as well as international agenda because of decades long struggles
by civil society accompanied by women's movements. Though there are unprecedented numbers
of laws against domestic violence, sexual assault and other forms of violence in each and every
country to protect their female citizens to become a victim of any such violence but they are
facing major challenges in implementing such laws. Thus making the society unjust and insecure
for the women as in majority of cases the violator remains unpunished. All should focus on
ensuring a society which is secure for all the women around the globe so that they can experience
equality and justice. In a sexual act of violence the aggressors are confident of the power they
exercise. The defense strategy used by females needs to be revolutionized by adopting modern
technology and gadgets to protect them from their oppressor. This device will be helpful to all the
women who deserve a safe and secure world.
TABLE OF CONTENTS

CHAPTER TITLE PAGE NO


ABSTRACT iv
LIST OF FIGURES Viii
LIST OF ABBREVIATIONS ix
1 INTRODUCTION
1.1 Aim of the project 1
1.2 Project Domain 1
1.3 Problem Statement 2
2 LITERATURE REVIEW 3
3 PROJECT DESCRIPTION
3.1 Existing System 5
3.2 Proposed System 5
3.3 Feasibility Study 7
3.4 System Specification 8
3.4.1 Hardware Specification 8
3.4.2 Software Specification 9
4 MODULE DESCRIPTION
4.1 General Block Diagram 10
4.2 Design Phase 11
4.2.1 Data flow diagram 11
4.2.2 UML Diagrams 12
4.3 Working Description 16
4.3.1 Connection of Bluetooth & Aurdino 16
4.3.2 Working mode 16
4.3.2.1 Default mode 16
4.3.2.2 Location and message send mode 17

vi
4.3.2.3 Receiving mode 17

5 IMPLEMENTATION
5.1 Input & Output 18
5.2 Limitations 21
6 RESULTS AND DISCUSSIONS
6.1 Efficiency of the proposed System 22
6.2 Comparison of Existing and 22
proposed System
6.3 Advantages of the proposed system 22
7 CONCLUSION AND FUTURE ENHANCEMENTS
7.1 Conclusion 23
7.2 Future Enhancements 23
APPENDICES 24
REFERENCES 43

vii
LIST OF FIGURES

S. NO FIG. NO TITLES PAGE. NO


1 1 Switch 8
2 2 Li-ion Battery 8
3 3 9
Push Button
4 4 9
Bluetooth Module
5 5 10
Android app
6 6 11
7 7 MIT App Inventor 11
8 8 Designer Window 12
9 9 Block Window 13
10 10 Block Diagram 14
11 11 15
Data flow diagram
12 12 15
Use-Case diagram
13 13 16
Class Diagram
14 14 16
15 15 Default mode 17
16 16 Receiving mode 18
17 17 Pressing Panic Button 19
18 18 Output 20

viii
LIST OF ABBREVIATIONS

ABBREVIATIONS EXPLANATION

DFD Data Flow Diagram


UML Unified Modelling Language
MIT Massachusetts Institute Technology
GSM Global System for Mobile
VCC Voltage Collector to Collector
RXD Read Data
TXD Transmit Data

ix
CHAPTER 1
INTRODUCTION

1.1 AIM OF THE PROJECT


Women in India a better half of Indian society. It is found that in many headlines reporting cases
of sexual assault, molestation, sexual harassment, rapes, trafficking, ill treatment of women in
houses, violence against women in remote areas etc. As responsible and good citizens, It has a most
fundamental duty to contribute towards bringing an order to make sure that respect and dignity for
women so that she can also enjoy her human fundamental rights and rights with sense of pride,
freedom and confidence.
News stories of women from all over India being beaten, killed are discover across us day after
day and all are aware of it. Because of crime women safety has become doubtful topic. Although the
lack of effective police services, lack of properly working helpline number are available, many of
already developed apps and devices via smart phones for women security currently available beside
these crimes happens.
So, this project contribution to provide a security by using android applications .Attacks on
women are at an all-time high and even highly safe cities aren't safe anymore. At any such
unfortunate time, smart phone can be its best friend and protector. Loaded with security apps for
women and smart phone can help it by sending emergency alerts to chosen people and also let
people know about whereabouts if anything goes wrong. It can be provided with some of the best
applications that helps it to send out an alert message and emergency call.

PROJECT DOMAIN

There are probably living in the worst time our modern society has ever seen in terms of women
security. And aim to make women feel as strong as ever and strong enough to fight the parasites of
our society, strong enough to fight the odds, strong enough to protect themselves against any sexual
assaults. We aim at giving power to those without whom we cease to exist. The idea is to design a
system which shall make every place and every hour safer for women again. A system which shall
re-establish how very gregarious mankind is. This system shall call and send SMS alert to the
nearest police station, close contacts and also alert people in and around the venue of the crime,
everything just at a click of a button. The idea is to make up for the time it takes police to arrive at
the location.
1
1
PROBLEM STATEMENT

Among the worst countries in crime, India has an abhorrent track record in all forms of
sexual exploitation. In homes, on streets, in public transports and even offices. Indian women are in
a constant state of vigilance, like a country on terrorist alert. There have been grotesque cases of
rapes of toddlers, gang rape of eight years old and women trafficking. There have created a nation
where women are learning to cope with existential anxiety and we should be ashamed.
A lot of NGOs, rehabilitation centers and helpline numbers have been made operational in the past
years but they are all cures to the harassment that has already happened and not the ‘preventions’
that is needed.
There are certain pre-existing apps that do send a message to the saved contacts but none of
them is effective and quick enough and according to a survey, the existing technology doesn’t make
most women feel safe. A major change in the basic structure and a few add-ons to these is a
necessity. In a lot of cases, it is observed that women do not file a complaint against the accused
because of various reasons like not knowing the correct authority to report it to or feeling
ashamed/guilty about the incident.

2
CHAPTER-2
LITERATURE SURVEY

2.1 SMART GIRLS SECURITY SYSTEM.


Authors: Basavaraj Coagula, Archana Naik.
Year of Publication: 2014
2.1.1 Description

This app can be activated by a single click when the user feels she is in danger. This
application com-muniques the user’s location to the registered contacts for every few seconds in the
form of message. Thus, it acts like a sentinel following behind the person till the user feels she is
safe. The key features of this application are along with the user’s location, one of the registered
contacts gets a call. Also, the registered contacts and GPS location are saved from time to time in a
database.

2.1.2 Pros
This app continuously fetch the location for an interval of every 30 sec and send it to
registered contact. So we can easily track the user and it will also send the location in form of URL
or latitude and longitude coordinates of location.

2.1.3 Cons

This app will work at the time of the danger so it is not that feasible for a user to instantly
reaction if he or she is in trouble. The whole process of the system is done only when the device is
connected to proper mobile network, data connection of the device is on and location service in the
device is switched on (GPS).

2.1.4 How we overcome those problem in Project


In future we will try to overcome the problems of previous applications. As the Internet
access should be there in above application which is not possible for all so we will try that our
application should work without the Internet access.

3
2.2 Abhaya: An android App for the safety of women
Authors: Poonam Bhilare, Akshay Mohite, Dhanashri Kamble
Year of Publication: 2015
2.2.1 Description
This paper presents Abhaya, an Android Application for the Safety of Women and this app
can be activated this app by a single click, whenever need arises. A single click on this app identifies
the location of place through GPS and sends a message comprising this location URL to the
registered contacts and also call on the first registered contact to help the one in dangerous
situations. The unique feature of this application is to send the message to the registered contacts
continuously for every five minutes until the âœstopâ button in the application is clicked.
Continuous location tracking information via SMS helps to find the location of the victim quickly
and can be rescued safely.

2.2.2 Pros
This app continuously send message for every 5 mins until the user click the stop button. The
message contains the location URL and it also call on the first registered contact.

2.2.3 Cons

The working of this app is quite lengthy, though it provides continuous location of the user
but the continuous access to the Internet is required. Any trouble in network will lead to big problem
since the only way to give the information to our registered number is through Internet and if at all
the Internet accessibility is not possible then it will not help in any way.

2.2.4 How we overcome those problem in Project


This will try to overcome the drawbacks by using the app without Internet. All the
application gives the location in the form of URL providing current location but our application will
provide the vehicle details as well.

4
2.3 A MOBILE BASED WOMEN SAFETY APPLICATION
Authors: Dr. Sridhar Mandapati, Sravya Pamidi, Sriharitha Ambati
Year of Publication: 2015
2.3.1 Description
The personal safety application requires the name and number of the person who is to be
contacted in times of emergency. Users can add multiple people in the emergency contacts list.
These are the people who will receive notifications or SMS in case of an emergency. All it requires
is the user’s action to trigger an SOS button provided and it shoots messages as fast as the device can
manage. Once the SOS button is hit, the people in the emergency contacts will get a message like:
Someone is in an emergency followed by another message, which has the exact or approximate GPS
location of the cell phone. The user can also make audio or video call. This app also provides
necessary first aid measures that should be taken at the time of emergency situations.

2.3.2 Pros
In this app user can add multiple contacts, all we need is just to trigger the SOS button and it
will start shooting emergency messages as fast as device manage.

2.3.3 Cons
Declare an emergency whenever you sense a danger which is not feasible. Continuous
Internet accessibility which always not possible due to network issues.

2.3.4 How we overcome those problem in Project


With the help of this application we can take precautions before coming to the danger.
Network issues can be overcome with the help of this app.

2.4 Safetipin Complete Safety App


Authors: Manasa K.C, Subba Lakshmi SV, Sneha G
Year of Publication: 2016
2.4.1 Description
The is a privacy security app having the troop of features; GPS tracking, emergency,
important contact numbers, directions to safe locations, pins displaying unsafe and free from danger
5
areas and a Safety Score. It drives in advance of exemplary women safety apps, and presents a vast
range of features, so that they will help to practically plan and can give a counter attack to those
spots in the locality. When a person is going to move to a new locality that is unknown to him and if
he or she want to know the safe areas, then this app will be much helpful providing the user a map
based view of the locality along with its safety score. Also, the person can select the areas on those
he or she excited to go and can get knowledge about the risks of hassles about the area, so they can
finally take safety measures.

2.4.2 Pros
This app provide numerous feature such as GPS tracking, important contact numbers,
directions to safe location, pins displaying unsafe and free from danger areas.

2.4.3 Cons
This app will only provide the details of unsafe locations when user access it. It will not give
any sort of help when user is in trouble or danger and he/ she actually needs help.

2.4.4 How we overcome those problem in Project


In future we can collaborate our application with this providing extra precautionary measure
by providing details of a specific location, about its safety.

2.5 SMART SECURITY DEVICE FOR WOMEN SAFETY


Authors: Sowmya SM, Shilpashreeyadav GC
Year of publication: 2017
2.5.1 Description
The app is developed by App Soft India. The key features of the app are: the user has to save
some details. These details include: Email address and password of the user, Email address and
mobile number of the recipient and a text message. Then, app is loaded as an âœwidgetâ, so that
when the user touches the app, it alerts the recipient. Another key feature of app is that it records the
voice of surroundings for about 45 seconds and this recorded voice, text message containing location
co-ordinates of the user is sent to the recipient mobile number.

6
2.5.2 Pros
The key features is that it requires details such as email address and password of both user
and recipient. It records the surrounding voice for about 45 sec.

2.5.3 Cons

This app will need continuous access to Internet for tracking location. If the victim is in
danger it is not possible to touch the button to give alert.

2.5.4 How we overcome those problem in Project

By providing SMS feature without internet and making app more feasible to use.

7
CHAPTER-3
PROJECT DESCRIPTION

3.1 EXISTING SYSTEM


To develop a system for android users for keeping track through several applications. This
application uses GPS for identifying the location of the person in trouble and the system can be
divided into two modules:
1. First module can be the victim’s phone i.e. the root device which uses 3G/2G data connection for
tracking the location of the victim through GPS.
2. Second module can be the mobile phone of registered contacts either police or friends or
family members which receives the message containing URL of location of victim that is sent
from the root device.
3. As a part of literature survey, It is investigated some applications that offer the same or similar
services for android and other platforms. The aim is to see how these applications work and to
see how they can be improved. Today the cases of atrocities on women are growing.
4. Most of the existing system or devices consisting of the GSM technology, which leads to
increasing the cost of that proposal.
5. In the existing system, for processing the system or the devices need the data connection in the
victim for detecting the location of that victim.

3.2 PROPOSED SYSTEM

In our Country, even though it has super power and an economic development, but still there
are many crimes against women. The atrocities against the women can be brought to an end with the
help of our product "FEMME". This device is a security system, specially designed for women in
distress. Method/Analysis: Using ARM controller for the hardware device is the most efficient and it
consumes less power. Use radio frequency signal detector to detect hidden cameras. Findings: We
analyzed that there are no security device for our total safety. The user has to carry multiple devices.
It is founded an ALL-IN-ONE security device which has all the features in one click.
Applications/Improvements: In this paper we used ARM controller and android application in which
both the device and the smart phone are synchronized using Bluetooth, hence both can be triggered
8
independently. It can be record audio for further investigation and can give an alert call and message
to the pre-set contacts with the instant location every 2 minutes and can be tracked live using our
application. Hidden camera detector is also a distinct feature using which we can ensure our privacy.
Women’s security is a critical issue in today’s world and it’s very much needed for every individual
to be acting over such an issue.
This project describes an “IOT based women security system” that provides the combination
of aurdino device and specialized software to track the vehicles or women location as well as
provide alerts messages and emergency call, with an emergency button
trigger. Now days due to recently happened cases such as rape by drivers or colleagues, burglary
etc., employee security, especially women employee security has become the foremost priority of the
companies. System uses the Global Positioning System technology of the cell phone to find out the
location of vehicle or women. The information of vehicle position or women provided by the device
can be viewed on Google maps using Internet or specialized software. The IT Companies are
looking forward to the security problem and requires a system that will efficiently evaluate the
problem of women employees’ security working in night shifts. This paper focuses on the proposed
model that can be increased self-confidence.

3.3 FEASIBILITY STUDY

The project feasibility study is a document containing a detailed description of the project, followed
by a set of different feasibility areas. These are aspects of the project that will drive the success or
failure of the project. This study will provide the necessary information so that you can decide
whether or not your project will begin or whether it has a shot at success.
Identifying suitable opportunities for investment is an intricate and involved exercise in
developing countries. A variety of constraints, complexities, risks and uncertainties have to be
reckoned with, and their implications on the project implementation and its subsequent success in
the operational phase have to be carefully and thoroughly examined before the resources are
committed. Efforts in identifying these opportunities pursued at different levels. The enterprise
management is expected to take all initiative to convince itself about the prospects of the project that
it wishes to launch.

9
3.4 SYSTEM SPECIFICATION
3.4.1 HARDWARE SPECIFICATION
The following hardware used components are described in details such as-
1) SWITCH
In electrical engineering, a switch is an electrical component that can "make" or "break"
an electrical circuit, interrupting the current or diverting it from one conductor to another. The
mechanism of a switch removes or restores the conducting path in a circuit when it is operated. It
may be operated manually, for example, a light switch or a keyboard button, may be operated by a
moving object such as a door, or may be operated by some sensing element for pressure,
temperature or flow.

Fig 1-Switch

2) BATTERY
A rechargeable battery, storage battery, secondary cell, or accumulator is a type of electrical
battery which can be charged, discharged into a load, and recharged many times, as opposed to a
disposable or primary battery, which is supplied fully charged and discarded after use. It is
composed of one or more electrochemical cells.

Fig 2-Li-ion Battery


10
3) PUSHDOWN BUTTON
A push-button (also spelled pushbutton) or simply button is a simple switch mechanism for
controlling some aspect of a machine or a process. Buttons are typically made out of hard material,
usually plastic or metal. The surface is usually flat or shaped to accommodate the human finger or
hand, so as to be easily depressed or pushed. Buttons are most often biased switches, although
many un-biased buttons (due to their physical nature) still require a spring to return to their un
pushed state.

Fig 3-Push Button

4) BLUETOOTH MODULE (HC-05)


The Bluetooth module HC-05 is a MASTER/SLAVE module. By default the factory setting is slave.
The Role of the module (Master or Slave) can be configured only by AT commands. The slave
modules cannot initiate a connection to another Bluetooth device, but can accept connections.
Master module can initiate a connection to other devices. The user can use it simply for a serial port
replacement to establish connection between MCU and GPS, PC to your embedded project.

Fig 4-Bluetooth Module

11
3.4.2 SOFTWARE SPECIFICATION

ANDROID APP

The designer window is the window that is used to design the graphical interface of the app that is
being created. The blocks window is where we have the programs in the form of blocks. We just
need to drag and drop the blocks in correct order to get based on what we want the app to do.

Fig 5-Android App

MIT App Inventor is a platform to create android apps in a very easy manner. The link for the app
inventor is: appinventor.mit.edu.It has two major components-
a) Designer window
b) Blocks window
App Inventor for Android is an open-source web application originally provided by Google, and
now maintained by the Massachusetts Institute of Technology (MIT) It allows newcomers
to computer programming to create software applications for the Android operating system (OS). It
uses a graphical interface, very similar to Scratch and the Star Logo TNG user interface, which
allows users to drag-and-drop visual objects to create an application that can run on Android devices.
In creating App Inventor, Google drew upon significant prior research in educational computing, as
well as work done within Google on online development environments.
MIT App Inventor is an intuitive, visual programming environment that allows everyone – even
children – to build fully functional apps for smartphones and tablets. Those new to MIT App
Inventor can have a simple first app up and running in less than 30 minutes. And what's more, our
12
blocks-based tool facilitates the creation of complex, high-impact apps in significantly less time than
traditional programming environments. The MIT App Inventor project seeks to democratize
software development by empowering all people, especially young people, to move from technology
consumption to technology creation.

Fig 6-MIT App Inventor

DESIGNER WINDOW

Fig 7-Designer window

13
BLOCK WINDOW

Fig 8-Block Window

When an event handler fires, It can be imagine that it creates a karaoke-like control dot that flows
through the command stack in its body. The control dot moves from the top of the stack to the
bottom, and when it reaches a command, that command is executed - i.e., the action of that
command is performed. Thinking about control "flowing" through a program will help us understand
its behavior.
App components are organized vertically by default. For example, in the extended version of
the Paint Pot tutorial, the user creates buttons which change the line size or wipe the screen. To
organize Button Wipe, Button Small, and Button Big nicely, drag a Horizontal Arrangement
Component from the Screen Arrangement section of the palette.

14
CHAPTER 4
MODULE DESCRIPTION

4.1 GENERAL BLOCK DIAGRAM

Fig 9-Block Diagram

Push button is switch which is used for sending message from Smartphone via Bluetooth. Bluetooth
is wirelessly connected to Smartphone and serially connected to Arduino module .Arduino module
acts as microcontroller and Android app is designed in Smartphone to send data to Bluetooth
module. HC05 works in serial communication .When the switch is press for 2 sec android app send
data to Bluetooth .The code fed to Arduino check the receive data and compares. And finally it will
perform the serial communication in between the cell phone & the aurdino, and it will allow to send
SMS and call to the saved contact number.

15
4.2 DESIGN PHASE
4.2.1 DATA FLOW DIAGRAM

START

PRESS THE
PUSH
BUTTON

BLUETOOTH
SUPPLYING
NANO AURDINO ACTIVATED
POWER TO
AURDINO

CELL PHONE
BLUETOOTH &
ANDROID APP
ACTIVATED

SENDING OF SMS ANOTHER CELL PHONE


AND EMERGENCY WILL RECEIVE THE SMS &
CALL CALL AND LOCATION FIND
BY USING GOOGLE MAP

STOP THE
Fig -10 Data flow diagram PROCESS

16
4.2.2 UML DIAGRAMS

1) USE-CASE DIAGRAM

User of the Helper or police


Gadget man

Fig-11 Use-Case diagram

A use case is a methodology used in system analysis to identify, clarify, and organize system
requirements. In this context, the term "system" refers to something being developed or operated,
such as a mail-order product sales and service Web site. Use case diagrams are employed
in UML (Unified Modeling Language), a standard notation for the modeling of real-world objects
and systems. System objectives can include planning overall requirements, validating
a hardware design, testing and debugging a software product under development, creating an online
help reference, or performing a consumer-service-oriented task. For example, use cases in a product
sales environment would include item ordering, catalog updating, payment processing, and customer
relations. A use case diagram contains four components.

 The boundary, which defines the system of interest in relation to the world around it.

 The actors, usually individuals involved with the system defined according to their roles.

17
 The use cases, which the specific roles are played by the actors within and around the system.

 The relationships between and among the actors and the use cases.
2) CLASS DIAGRAM

Fig -13 class diagram

The class diagram is the main building block of object-oriented modeling. It is used for
general conceptual modeling of the structure of the application, and for detailed modeling translating
the models into programming code. Class diagrams can also be used for data modeling. The classes
in a class diagram represent both the main elements, interactions in the application, and the classes to
be programmed. In the diagram, classes are represented with boxes that contain three compartments.

 The top compartment contains the name of the class. It is printed in bold and centered, and
the first letter is capitalized.

 The middle compartment contains the attributes of the class. They are left-aligned and the
first letter is lowercase.

 The bottom compartment contains the operations the class can execute. They are also left-
aligned and the first letter is lowercase.
18
4.3 WORKING DESCRIPTION

4.3.1 CONNECTION BETWEEN BLUETOOT MODULE AND AURDINO NANO

The Bluetooth module communicates with the arduino Nano via a serial communication, it has
four that will be using.VCC is used to power the module, it need to be connected to the arduino 5v
pin. GND is the ground pin, it need to be connected the Arduino ground pin. TXD is used to send the
data from the Bluetooth module to the arduino. It need to be connected to the serial received pin
RTXD of the arduino.

We will not be using RXD is used to receive data from the Arduino, it need to be connected to the
TXD pin of the Arduino. STATE and KEY of Bluetooth module connected to pin In the Bluetooth
module the TX line is rated as 3.3V. This means that even though we can power the module with 5v
from the arduino, the communication lines from and to the module are supposed to be at 3.3volts.

Sending data from the Bluetooth module via the TX of module will not be an issue, as per Arduino
RX line will interpret the 3.3V signal from the Bluetooth module correctly. Receiving data from the
Arduino is where we need to do more work. The RX line of the Arduino Nano is running at 5volts,
so we will be sending a higher voltage on the Bluetooth modules RX line Did not want to risk the
burning the Bluetooth module, through the 5v supply of RX lines, for that purposed used two
resistors to create a voltage.

4.3.2 WORKING MODE

 The woman possessing this device will press the panic button if in danger.

 The device is activated by the woman in distress by pressing a panic button.

 The panic button activates the app

 An SMS containing the latitude and longitude coordinates will be sent to pre fed mobile
numbers informing them of the danger and the location.

 The received coordinates can be viewed on Google maps to determine the location of the
woman and appropriate help can be provided

19
4.3.2.1 DEFAULT MODE

Updating of specific contacts, Adding of alert message and connecting of app with the gadget
takes place

Fig-12 Default mode

4.3.2.2 LOCATION AND MESSAGE SEND MODE

As this mode is activated by the push button, it takes 7 seconds to obtain the coordinates
and messages are sent to the trusted contacts within intervals of 4 seconds. The message
contains a hyperlink which directs the recipient directly to Google maps where the location of
origination of the distress message will be displayed.

20
4.3.2.3 RECEIVING MODE

When this mode is activated by pressing the push button, a call to one trusted contact is activated
within 4 seconds of activation. Thus the success of this mode depends on the availability of the
predefined trusted contact.

Fig 13-Receiving mode

21
CHAPTER-5
IMPLEMENTATION

5.1 INPUT AND OUTPUT

1) INPUT
Push button is switch which is used for sending message from Smartphone via Bluetooth. It is a
simple switch mechanism for controlling some aspect of a machine or a process. Buttons are
typically made out of hard material, usually plastic or metal. The surface is usually flat or shaped
to accommodate the human finger or hand, so as to be easily depressed or pushed. Buttons are
most often biased switches, although many un-biased buttons (due to their physical nature) still
require a spring to return to their un-pushed state. Terms for the "pushing" of a button
include pressing, depressing, mashing, slapping, hitting, and punching.

Fig -14 pressing panic button

22
2) OUTPUT

Bluetooth is wirelessly connected to Smartphone and serially connected to Arduino module Arduino
module is act as microcontroller Android app is designed in Smartphone to sending data to
Bluetooth module.HC05 works in serial communication When the switch is press for 2 sec android
app send data to Bluetooth The code fed to Arduino check the receive data and send the SMS and
call to the saved contact.

Fig -15 Output

5.2 LIMITATIONS

1) Battery Use –This problem occurs on your cell phones. Your cell phone’s battery will be rapidly
decreasing rapidly when you leave your phone’s Bluetooth enabled for number of hours. The best
way to overcome this is disable the Bluetooth immediately after completing your task. It takes only a
few seconds to enable and disable it.
2) In this project for women security we use Bluetooth based devices such as Bluetooth ring and
smart phone here blue tooth range is 32.8ft so, according to that range if smart phone is moved from
out of that range then disable Bluetooth connection. Due to which women security process is
incomplete.
3) If we want to activate that women security app then press the switch of Bluetooth ring
continuously three times. If between that process delays is occurred then that process is not success.

23
CHAPTER-6
RESULT AND DISCUSSTION

6.1 EFFICIENCY OF THE PROPOSED SYSTEM


In some parts women still continue to face discrimination and other social challenges and are often
victims of abuse and violent crimes. Due to these reasons it has become very important for females
to stay alert and tackle all such situations

In this project we use Bluetooth. Bluetooth doesn't require you to think about setting up a connection
or to push any buttons. Bluetooth uses low power signals. As a result, the technology requires little
energy and will therefore use less battery or electrical power. Obviously, this is a great benefit for
mobile devices because Bluetooth won't drain the life of your device's battery.

It is more reliable for women security. Its cost is moderate. All they need is a device that can be
carried around easily and women whenever the woman feels unsafe. i.e. small in size. Faster
Response time from emergency agency. Avoids the women rape. Provides very accurate data via
GPS system.

6.2 COMPARISON OF EXISTING AND PROPOSED SYSTEM

It is an all-in-one system. Hence no need to carry multiple devices. GPS tracking feature tracks the
user lively when you are the move after triggering the emergency button. It can be recorded audio in
future, which can be used for further investigations. When the battery is running low, it
automatically sends the SMS and call to saved contacts.

6.3 ADVANTAGES OF THE PROPOSED SYSTEM


1. Since we are not going to use the GSM technology, so it leads to decrease in the cost of this
proposal.
2. Ability to avoid threats
3. Reduced risk of being victimized
4. Improving overall personal safety
5. A decreased feeling of vulnerability and Ability to recognize threats
24
CHAPTER 7
CONCLUSION AND FUTURE ENHANCEMENTS

7.1 CONCLUSION
As one of the solutions to this sexual harassment, this proposed system is being developed using the
Bluetooth technology. The proposed design is used to solve the critical situation with technologically
sound equipment’s and ideas by the women. This system can give the self-confidence to the women
to face the incident which is against her safety and security. This paper attempts to deal with a
community concern that has been destroying the lives of uncountable individuals and their families.
A device like this improves the level of safety of women and girls. As technology is advancing, there
are better means of getting on hand information about unsafe women. The unit testing and
integration that were performed clearly indicate that the system provides security to all the women
across the globe without any major complications. Since this device is smaller in size, all the women
can carry it without much effort. The main purpose of the proposed system is to save the women
before any intolerable incidental occurs, and this is achieved through this work.

7.2 FUTURE ENHANCEMENT


1. Let the police, family and friends know that you are in danger and where you are? Declare an
emergency whenever you sense danger, when you can disengage the emergency.
2. Provides necessary first aid measures that should be taken at the time of some dangerous
situations.
3. Let to the police control room know your path to the destination.
4. It has become very important for females to stay alert and tackle all such situations efficiently
when they are alone.
5. It is high time that we equip ourselves to deal with such daunting situations. Neither women nor
their families need to worry about the time or places when they go out. All they need is a device that
can be carried around easily and women whenever the woman feels unsafe.

25
REFERENCE

1) www.appinventor.mit.edu
2) www.github.com
3) https://www.geeksforgeeks.org
4) https://en.wikipedia.org
5) https://www.youtube.comwatch?v=FSqYyjZtH4g
6) https://core-electronics.com
7) https://www.electronic device.com
8) www.mobile application by using android
9) https://Literature survey on women safety device
10) www.mitappinventor.com

26

You might also like