0% found this document useful (0 votes)
26 views7 pages

Womens Safety Research App Article

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-5 , October 2024, URL: https://www.ijtsrd.com/papers/ijtsrd69422.pdf Paper URL: https://www.ijtsrd.com/computer-science/other/69422/womens-safety-research-app-article/sneha-ashok-kumar-patel

Uploaded by

Editor IJTSRD
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views7 pages

Womens Safety Research App Article

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-5 , October 2024, URL: https://www.ijtsrd.com/papers/ijtsrd69422.pdf Paper URL: https://www.ijtsrd.com/computer-science/other/69422/womens-safety-research-app-article/sneha-ashok-kumar-patel

Uploaded by

Editor IJTSRD
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

International Journal of Trend in Scientific Research and Development (IJTSRD)

Volume 8 Issue 5, Sep-Oct 2024 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470

Women's Safety Research App Article


Sneha Ashok Kumar Patel1, Pari Wakti2, Yash Nakade3, Neha Pathode4, Prof. Rutika Gahlod5
1,2,3,4
School of Science, G. H. Raisoni University, Amravati, Maharashtra, India
5
Assistant Professor, G. H. Raisoni University, Amravati, Maharashtra, India

ABSTRACT How to cite this paper: Sneha Ashok


Women's safety is a major worry in today's society, which calls for Kumar Patel | Pari Wakti | Yash Nakade
creative solutions that use technology to deliver support and aid in a | Neha Pathode | Prof. Rutika Gahlod
timely manner. This project offers a comprehensive women's safety "Women's Safety Research App Article"
Published in
app that is intended to improve women's security by offering a
International
number of functions that facilitate prompt action during emergencies. Journal of Trend in
The app has features like community-based alerts, one-touch Scientific Research
emergency alerts, real-time location monitoring, and connection with and Development
local police enforcement. The app also includes features like (ijtsrd), ISSN:
emergency contacts, safe zone maps, and a quietly operated SOS 2456-6470, IJTSRD69422
button. This software seeks to provide women the freedom to move Volume-8 | Issue-5,
about safely and freely by utilising social networks, GPS, and real- October 2024, pp.600-606, URL:
time data. The creation of this app is an important step towards using www.ijtsrd.com/papers/ijtsrd69422.pdf
technology to address the urgent problem of women's safety in both
rural and urban settings. Copyright © 2024 by author (s) and
International Journal of Trend in
KEYWORDS: women’s safety, sos app feature, GPS tracking for Scientific Research and Development
safety, emergency alert, safety solutions, emergency response Journal. This is an
Open Access article
distributed under the
terms of the Creative Commons
Attribution License (CC BY 4.0)
(http://creativecommons.org/licenses/by/4.0)

I. INTRODUCTION
Women's security has grown to be a significant Women's organisations have contributed to decades
concern in today's globe. Women experience of civil society work that has made gender-based
harassment at work, in educational institutions, and violence a national and international concern.
even at home. Several Going outside of their comfort
zone scares women. Women's freedom is declining in Enforcing laws against domestic violence, sexual
tandem with the rising number of these crimes against assault, and other forms of violence is a challenging
them. Critical circumstances might appear anywhere task, even in countries where there are several laws
and at any time. An Android software that can make protecting female citizens from abuse. Because of
it easier for women in need to receive assistance or this, women experience insecurity and injustice in
leave a situation is helpful in these situations. society, and the vast majority of criminals escape
punishment. To enable all women to live in equality
The primary issue with the police's handling of these
and fairness, we should work together to make the
incidents is that they can't always react quickly to
distress calls. These restrictions consist of not world a safer place for them.
In the current milieu, it is risky for women in
It is challenging for the victim to phone the police
quietly and confidently when they are aware of the particular to travel alone at night because they are
weaker than men. Reducing your chances of
crime's location or are unaware that it is happening at
all. to facilitate the lifting of these restrictions. This becoming a victim of violent crime can be
accomplished in part by recognising and using
article describes the Women's Safety Application, a
resources to help you escape dangerous
dependable smartphone app that gives women a
circumstances. By using a safety app on your phone,
method to contact the police in an emergency. Human
you can reduce your risk and get assistance when you
rights that are fundamental are frequently denied to
need it. This app is different from others in that it may
women who are abused.
be used for safety or preventative measures in

@ IJTSRD | Unique Paper ID – IJTSRD69422 | Volume – 8 | Issue – 5 | Sep-Oct 2024 Page 600
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
addition to emergencies or dangerous situations. The conditions for smartphones. It is noted that even in
saying goes, "Prevention is preferable to cure." cases when the victim lacks an internet or GPS
connection, they can still notify the police and certain
contacts by hitting the power button twice, rather than
Since most people now carry cellphones with them clicking the SOS button on the screen. Additionally,
everywhere they go, the goal of this program was to if the user or victim moved, the system would relay
create a safe atmosphere using smartphones. the victim's continuing location after one minute,
Instantaneously, the user sends a message to the giving them a better location. One of the program's
police that includes the user's location and emergency main features, according to reports, is giving the
contacts' contact information that they have already police access to a control panel so they have a system
chosen. This page explains the creation and technical where they can monitor whether or not there are any
execution of the application. cases like this. The victim's position will be
II. REALATED WORK highlighted when they push the power button, making
A. S-ZONE: A WOMEN'S SAFETY AND it simple for responding law enforcement officers to
SECURITY SYSTEM come to their aid and assist the victim.
The authors of the document "S-ZONE: A SYSTEM D. Women's Safety Mobile App
FOR WOMEN SAFETY & SECURITY SYSTEM" The "Women Safety Mobile App," which is GPS-
claim that "identifying and receiving assistance in based, is demonstrated in this paper by the authors.
escaping dangerous situations is the best way to This method initiates when the female user who
reduce the chances of becoming a victim of violent verified her identity on the device scans her
crime (robbery, sexual assault, rape, and domestic fingerprint. After that, the woman must continuously
violence)." This article presents the S-site program, scan her finger print once per minute, or else the
which was created for the Android platform to gadget will send an SMS message with its position to
enhance women's safety through the utilisation of the registered phone and sound a buzzer to notify
cutting-edge mobile technological advancements. everyone close of the emergency. The woman only
This program assists in tracking the root device by needs to cease scanning her fingerprint in the event of
GPS, enabling emergency personnel to immediately an emergency. The system is operated by the device
remove a vulnerable person from dangerous using a microcontroller-based circuit, GPS, and GSM
situations. A one-touch button to send immediate modem. When a lady is unable to activate or click the
alerts to designated contacts or local authorities emergency feature, this system comes in very handy.
B. SHIELD: Use for Individual Safety Her GPS location is included in the SMS alert
The app "SHIELD: Application for Personal message, which can be sent straight to a select group
Security" does exactly what its name implies—it of contacts so they can aid her when necessary.
shields, saves, and guards the user against harm. It III. PROPOSED WORK
instantly notifies all of the registered contacts of the The functions present in the current system, such as
device's location, enabling real-time tracking of the GPS tracking and other features that can be useful in
woman's whereabouts and the provision of aid. The the event of a data connection outage, are combined
system's primary functionality is centred on location with all the unique capabilities of the proposed
tracking. system, including the ability to track location in real
It is totally reliant on GPS location monitoring and time. The lady can also make use of any feature based
real-time updates on the website. Real-time updates in on her assessment of the circumstances.
the user area of SHIELD are determined and posted This project aims to create a portable women's safety
on the website. Depending on the internet connection, software tool that can do the following tasks:
the update shows on the website in 0.5 seconds. Real- A. SOS: SOS sends an alert message to emergency
time location sharing with trusted contacts during registered contact containing the GPS location of
emergencies the user every thirty seconds.
Maps that highlight safe walking routes and areas to B. Siren: A Siren which sounds a loud police siren.
avoid, possibly using crowd-sourced data. This can alert the nearby people of the situation
and in some cases may deter the assailant from
C. The Android App for Women Safety proceeding with his malicious intentions.
As most people carry smartphones with them
everywhere they go these days, the authors of the C. Voice Recording: We have also provided a
paper "Women Safety Android App" explain that Recording function that records the surrounding
their goal in creating this program was to create safe sounds which can be used by the victim incase of
a police investigation as evidence.

@ IJTSRD | Unique Paper ID – IJTSRD69422 | Volume – 8 | Issue – 5 | Sep-Oct 2024 Page 601
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
D. Helpline Numbers: The woman can directly call whereabouts Sharing : Constantly inform loved ones
emergency services through the feature Helpline or friends of your whereabouts.
Numbers in the application.
Voice/SMS/Panic Trigger : Prepare for emergencies
Developing a women safety app requires a with voice-activated triggers.
comprehensive approach that combines technology,
user-centered design, and effective safety features.
Below is a proposed work plan outlining the key
stages of development for a women safety app:
Research and Requirement Gathering –
Identify User Needs: Assist women with their
worries, situations, and feature requests by
conducting focus groups, surveys, and interviews.

Dig. Contact information


Safety and Confidentiality-
Encrypt any sensitive data, such as contact
information and location, to prevent unwanted access.
Permission Management: Give consumers complete
control over their data and make sure the app only
Fig1.Creating a account asks for the minimal amount of permissions, such as
Examine Current Solutions: Determine opportunities, location and contacts.
gaps, and best practices by examining current
Compliance with Data Regulations: For data
women's safety apps. management and user privacy, make sure that data
Work with Safety Professionals: Seek guidance on protection rules like the CCPA or GDPR are
essential characteristics and emergency procedures followed.
from organisations, law enforcement, and specialists IV. PROPOSED RESEARCH MODEL
in women's safety. When a user is having difficulty or needs help, this
Feature Planning- Android application comes in handy. A HELP button
Core Features is visible to the user when opening this application.
SOS Button : An easy-to-access button that allows They can save three phone contacts and a message as
you to transmit emergency notifications to authorities well. All the user has to do is launch the app, select
or pre-selected contacts along with your current the "HELP" option, and ask for assistance if they
location. need it. The message is sent to the contact numbers he
has stored by this program.
There are three main processes that make up the
entire evaluation, each of which is explained
separately. Three main processes comprise the
evaluation of the application's entire implementation.
Entering the contact information in the developed
application is the first important step. These people
could be our friends, family, or the chief police
officer of the city in which we currently reside. The
aforementioned contact information should be entered
Dig. SOS when the app is first loaded on the smartphone.

@ IJTSRD | Unique Paper ID – IJTSRD69422 | Volume – 8 | Issue – 5 | Sep-Oct 2024 Page 602
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
The provided data will be saved by the application. button, and the customized message are shown in
The second important step is to provide the registered Figure.
contacts with GPS information (which can be
Coordinates or a URL that can be used to locate the
person using stock map applications from third-party
apps like Google, Nokia, etc.) in case the person is in
danger or needs to be rescued. This action is taken.
The effort involved in regularly sending the message
with the location URL to the registered contacts
makes up the third main phase. Since the time interval
in this case is set to five minutes, an SMS will be sent
to the registered contacts every five minutes. Thus,
the program can continually track the person's
specific location, which is the main goal of the
suggested method, allowing for the person's rescue.
The total evaluation can be done in three major steps
which are described individually. Evaluation
describes the whole implementation of the application
in three major steps.

Dig. Settings of the device

Dig. Implementation of proposed work.


V. PERFORMANACE EVOLUTION
Screenshots of the main device and the contact's
device captured at different times are included with
the testing findings of the aforementioned three parts.
In this context, the term "root device" refers to the
user's device, which is the one over which the rescue
program is launched. The device to which the user
sends location data on a regular basis is referred to as
the contact's device. Before installing the app on the
phone, make sure to tick the box labeled "allow
nonmarket apps to be worked over the device" in the
settings, as illustrated in the following figure. shows
the device's settings so that the app can only be
installed on the device by checking the corresponding
icon. The Security Alert app icon can be set anywhere
on the phone's home screen, allowing us to quickly
access the app when we're in danger. Upon initial
installation of the application on the mobile device,
the interface depicted in figure 7 will manifest. The
settings icon and the HELP button are shown in
Figure 7. Figure 8 will show up when you click on the
settings icon. The blocks in the contact list, the save Dig. Layout of the second page for details

@ IJTSRD | Unique Paper ID – IJTSRD69422 | Volume – 8 | Issue – 5 | Sep-Oct 2024 Page 603
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470

Dig. Layout of the second page for details Dig. Details entered in the application
After entering the custom message and the contact
details, the application screen appears as depicted in
the figure . After completion of writing the custom
message and registering the contact details in the
application, the save button must be clicked by the
finger else the message and the contacts will not be
saved.
After pressing the settings symbol, the application
screen appears as depicted in the figure . Figure
depicts the custom message and the contact list blocks
and save button.
Help button must be clicked to start the application
immediately. There is no obligation of entering the
message and the contact details each and every time
when we open the application. Once entered and
saved they will be registered in application till we
change them.
Message received by the contact device immediately
after starting the application. When we click help
button of the application, it starts and the GPS starts
running over the device and immediately the user’s
location will be sent as shown in figure 10.

Dig. Layout of the app immediately after


installation.

@ IJTSRD | Unique Paper ID – IJTSRD69422 | Volume – 8 | Issue – 5 | Sep-Oct 2024 Page 604
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470

Dig.0.1Receving message
Message received by another contact device
immediately after pressing the Help button in the
application.
After completion of saving the contact details, save
button must be clicked to exit from the application

Dig. Location
Screen shown after clicking URL in the message
received by the contact device. Figure depicts the
Google Maps application which appears just after
clicking the URL in the received message. The blue
block “directions” in the application shows the exact
location of the user.
to send SMS to register user. For future development,
this application can be integrated with the law
enforcement database (e.g., city police control room
database) instead of experimental database used here
in the project. Also, some further upgrade can be
done when the mobile network is not available for the
root device and also if the root device is switched off.
Thus, this app can help in a big way to rescue the
women or men from unsafe conditions.
VI. CONCLUSION AND FUTURE WORK
Dig.0.2 Message received This paper describes the application, Security Alert
that is designed in android platform for safety of
Message received by one of the contacts after five women with the aid of recent improvements in mobile
minutes span of time. Figure depicts the message technology. In this project to use which is useful for
received by one of the contact devices after five the user when he is in some problem or needs any
minutes of the start of the application. This mode of help. When the user opens this application, he can see
tracking the user i.e., getting user’s location at a HELP button. Also, he can store a message and 3
periodic intervals for every five minutes will be contact numbers. When the user is in some difficulty
helpful when the user is moving i.e., if she is caught or needs any help button. So, when the user opens this
by the kidnapper and if they are taking her, we can application can see a HELP button. Click that button
rescue her by knowing the location in this manner. to send SMS to register user. For future development,
After receiving the message from the user, the URL this application can be integrated with the law
in the message has to be clicked in order to know the enforcement database (e.g., city police control room
exact location of the user. database) instead of experimental database used here

@ IJTSRD | Unique Paper ID – IJTSRD69422 | Volume – 8 | Issue – 5 | Sep-Oct 2024 Page 605
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
in the project. Also, some further upgrade can be [9] Usha Kosarkar, Gopal Sakarkar, Shilpa Gedam
done when the mobile network is not available for the (2022), “An Analytical Perspective on Various
root device and also if the root device is switched off. Deep Learning Techniques for Deepfake
Thus, this app can help in a big way to rescue the Detection”, 1st International Conference on
women or men from unsafe conditions. Artificial Intelligence and Big Data Analytics
(ICAIBDA), 10th & 11th June 2022, 2456-3463,
ACKOWNLEDGEMENT
Apart from the efforts of us, the success of this paper Volume 7, PP. 25-30,
https://doi.org/10.46335/IJIES.2022.7.8.5
depends largely on the encouragement and guidelines
of many others. We take this opportunity to express [10] Usha Kosarkar, Gopal Sakarkar, Shilpa Gedam
my gratitude to CMR Technical Campus College (2022), “Revealing and Classification of
Management for motivating us and for providing us Deepfakes Videos Images using a Customize
all the facilities required for this work. We are deeply Convolution Neural Network Model”,
indebted to Chairman Shri Ch. Gopal Reddy, Smt. International Conference on Machine Learning
Ch. and Data Engineering (ICMLDE), 7th & 8th
Vasantha Latha, Director Dr. A. Raji Reddy, HOD September 2022, 2636-2652, Volume 218, PP.
2636-2652,
CSE Dr. K. Srujan Raju, PRC Coordinator Dr.
https://doi.org/10.1016/j.procs.2023.01.237
Suwarna Gothane, Project Guide Dr. K. Srinivas
CMRTC who always have a been a constant source of [11] Usha Kosarkar, Gopal Sakarkar (2023),
inspiration for us. “Unmasking Deep Fakes: Advancements,
Challenges, and Ethical Considerations”, 4th
VII. REFERENCES
International Conference on Electrical and
[1] Android Developers, Location APIs. URL:
Electronics Engineering (ICEEE),19th & 20th
http://developer.android.com/google/playservic
August 2023, 978-981-99-8661-3, Volume
e s/locat ion.html
1115, PP. 249-262, https://doi.org/10.1007/978-
[2] "WOMEN’S SECURITY", Android App 981-99-8661-3_19
developed by App Soft India, December 17,
2013. https://play. google. com/store /apps/ [12] Usha Kosarkar, Gopal Sakarkar, Shilpa Gedam
details? id= com. Zayaninfotech. security& (2021), “Deepfakes, a threat to society”,
hl=en International Journal of Scientific Research in
Science and Technology (IJSRST), 13th October
[3] "POLIE NEARBY", Android app developed by 2021, 2395-602X, Volume 9, Issue 6, PP.
Big Systems in 2013. https:// play. google. 1132-1140, https://ijsrst.com/IJSRST219682
com/ store/apps /details? id=com. smoketech.
PoliceNearby& hl=en [13] Usha Kosarkar, Prachi Sasankar(2021), “ A
study for Face Recognition using techniques
[4] "SCREAM ALARM", Android app developed PCA and KNN”, Journal of Computer
by GoPalAppMaker in November,2013 https: Engineering (IOSR-JCE), 2278-0661,PP 2-5,
//playgoogle.com/store/apps/details?id=gopal.
appmaker. android. com&hl =en [14] Usha Kosarkar, Gopal Sakarkar (2024),
“Design an efficient VARMA LSTM GRU
[5] Saranya, J.; Selvakumar, J., “Implementation of model for identification of deep-fake images
children tracking system on android mobile via dynamic window-based spatio-temporal
terminals," 2013 IEEE International Conference analysis”, Journal of Multimedia Tools and
on Communications and Signal Processing Applications, 1380-7501,
(ICCSP), vol., no., pp.961,965, 3-5 April 2013. https://doi.org/10.1007/s11042-024-19220-w
[6] Android Studio Development Essentials Book [15] Usha Kosarkar, Dipali Bhende, “Employing
by Neil Smith Artificial Intelligence Techniques in Mental
[7] An Introduction to Database Systems Book by Health Diagnostic Expert System”,
Christopher J. Date firebase.google.com International Journal of Computer Engineering
developer.android.com for SDK (IOSR-JCE),2278-0661, PP-40-45,
https://www.iosrjournals.org/iosr-
[8] B. Chougula, “Smart girls security system," jce/papers/conf.15013/Volume%202/9.%2040-
International Journal of Application or 45.pdf?id=7557
Innovation in Engineering & Manag ement,
Volume 3, Issue 4, April 2014.

@ IJTSRD | Unique Paper ID – IJTSRD69422 | Volume – 8 | Issue – 5 | Sep-Oct 2024 Page 606

You might also like