E-Learning Portal
E-Learning Portal
A PROJECT REPORT
Submitted to
Department of Computer Application
Patan Multiple Campus
Patan Dhoka, Lalitpur
Submitted by
Ghanashyam Dhungana
BCA 6th Semester
University SN: 6-2-22-324-2018
Symbol No.: 220119
2078/12/27
SUPERVISOR’S RECOMMENDATION
LETTER OF APPROVAL
This is certify that this project prepared by Ghanashyam Dhungana entitled “Women
Safety Alert System” in the Partial Fulfillment of requirement for the degree of Bachelor
in Computer Application has been evaluated. In our opinion it is satisfactory in the scope
and quality as a project for the required degree.
Human security has become a major issue as the number of crimes over women and girls
increasing day-by-day. This paper suggests a new view to use technology to protect
women. We use an android based smartphone with a unified feature that alerts and
provides location-based Information. This Document based on “Women Safety Alert
Using Haversine formula algorithm “that provides message and call with an emergency
button Trigger. Whenever victim is in Trouble they only have to press the Button. After
that, a message alert is sent to Contact list and a notification or Message to the number
and give a message “Need Your Help”. The project is developing in Android which
Graphical User Interface provides the level of reliability, availability, and compatibility.
All these make Android an appropriate language for this project because the Android
language is based on JAVA language.
i
ACKNOWLEDGEMENT
We would like to express our special thanks of gratitude to our supervisor Mr.
Ramesh Singh Saud who gave us the golden opportunity to do this wonderful project on
the topic of Women Safety Alert System, which also helped us in doing a lot of research
I would like to express our special thanks of gratitude to our Campus Chief Dr. Laxman
Singh Kunwar who gave us permission for doing this Project.
I would like to express my special gratitude and thanks to our BCA Program Coordinator
Mr. Bhoj Raj Joshi for his support and help for our personnel development and mainly
for the completion of this Project.
I am highly indebted to Patan Multiple Campus for their guidance and constant
supervision as well as for providing necessary information regarding the Project and
support in the completion.
We would also like to express my gratitude towards library and member of Patan
Multiple Campus for their kind co-operation and encouragement which help me in
completion of this Project
We would also like to thank our parents and friends who helped us a lot in finalizing this
project within the limited time frame.
In the end, we would also like to thank Tribhuvan University for giving us this
opportunity via the course of Computer Application to help us understand the project
ethics at this early stage and helped us to evaluate my knowledge and expand it a little
more.
Yours sincerely,
Ghanashyam Dhungana
ii
TABLE OF CONTENT
S
ACKNOWLEDGEMENT....................................................................................................i
LIST OF ABBREVIATIONS............................................................................................iv
LIST OF FIGURES............................................................................................................v
LIST OF TABLES.............................................................................................................vi
CHAPTER 1: INTRODUCTION.....................................................................................1
1.1 Introduction...............................................................................................................1
1.3 Objectives..................................................................................................................1
1.4.1 Scope..............................................................................................................................2
1.4.2 Limitations.....................................................................................................................2
iii
3.2.1. Refinement of Classes and Object...............................................................................16
4.1. Implementation........................................................................................................20
4.2. Testing.....................................................................................................................21
5.2. Conclusion...............................................................................................................24
REFERENCES.................................................................................................................26
iv
LIST OF ABBREVIATIONS
FM Frequency Modulation,
UI User Interface
v
LIST OF FIGURES
Figure 3.9: Algorithm Working Process Diagram for Women Safety Alert System.........19
vi
LIST OF TABLES
Table 3.1: Gantt chart Table for Women Safety Alert System..........................................13
Table 4. 2: Test case for User Registration of Women Safety Alert System.....................22
Table 4. 3 : Test case for User Login of Women Safety Alert System..............................23
vii
CHAPTER: 1
INTRODUCTION
1.1 Introduction
Women Safety Alert System is a system that is used to help the women from harassment,
mistreat, violence and so on. There are lots of women who work at night shifts in
corporate and they feel unsafe while returning home as they travel late at night. There are
many crimes that takes places against women like being harassed, violence, domestic
abuse, and rape. The greater part of the human nowadays carries their smartphone with
them, so these applications can be very helpful for them.
This application is very user friendly and can be used with less technical knowledge.
Whenever any user feels unsafe or feels that they may be in a dangerous situation they
just can click a button which notify nearby police or he/she can get help from other users
who are close to that location. To get location users can customize their information e.g.:
that they want to share their information and add contact of users.
This project is about a women safety system. Using this project, when someone is facing
a difficult situation or feels unsafe, the person can call and send a message to the nearby
contacts or police station only by clicking the alert button then the nearby contact receives
the message from the person with his/her geo location and they can provide help to the
users.
Women faced different problems like robbery, rape, harassment, abuse etc. and they
suffer from unusual activities which can occur anytime and anywhere. Women are not
safe or secure these days and nights, In order to provide help and feel safe or secure while
being attacked or in difficult condition this app is going develop which helps to send
notification or message and send the location of users to the nearby contacts.
1.3 Objectives
1
To develop mobile application to implement Women Safety Alert.
To provide users with the fastest way to contact nearest help.
To inform about the rising crime against women.
1.4.1 Scope
This system can be used by any women and this system will help them to send
notification and message to the people who are close to them in dangerous situation like
harassment, rape, robbery and so on. As the mechanical changes or new condition from
user to improve the usefulness of item may requires new form to present. In spite of the
fact that the System is finished and working skillfully, new modules which improve the
system usefulness can be added with no significant changes to the whole system. Among
the different parts few are recognized, which couldn't be remembered for the last
augmentation because of time requirements. In future, the development innovation makes
the system progressively powerful and dependable. As the new modules give the
usefulness which upgrades the security and accommodating in future when any issue
begins in voyaging or any sort of circumstances. As the innovation transforms, it is
conceivable to update the system and can be versatile to desired condition.
Any further changes can be effectively flexible, in the brightness of the fact that it
depends on an object-arranged plan.
Based on future security issues, security can be improved utilizing rising
advancements.
1.4.2 Limitations
There are some criteria that may not be fulfilled by this application implemented. Some
of such limitations of this project are mentioned below:
2
1.5 Development Methodology
For the development of this system, Objected oriented approach is used that includes
object and class diagram, state and sequence diagram, activity diagram, refinement of
classes and object, component diagram and deployment diagram.
Introduction
This chapter deals with the introduction of the system with its objectives and limitations
along with the reason why the system is made.
This chapter summarizes the work that has been carried out in the field of data mining
and also describes the features about some existing applications related to the Women
Safety Alert system.
This chapter focuses on the different requirement of the system, which describes about
the functional, non-functional, feasibility analysis, Object Modelling :Object and Class
Diagram, Dynamic Modelling : State and Sequential Diagram, Process Modelling :
Activity Diagram design of the system with Component Diagram, and Deployment
Diagram, Refinement of Classes and Object, and the implementations of Algorithm with
its details.
This chapter emphasizes tools used in system development, implementing details and
result of test performed.
This chapter highlights brief summary of lesson learnt, outcome and conclusion of the
whole project and explain what have been done and what further improvements could be
done.
3
CHAPTER: 2
Women are being less secure and safe these days and nights. People facing more number
of circumstances like harassing, kidnapping, rape, abuse, etc. The cases of kidnapping the
children increased day by day. Due to these activities people are facing difficulties
working or step their home. The prime review in each human's mind, taking into account
the ever-rising increment of issues on ladies provocation in late past, is just about her
wellbeing and secure. At the point when such event occurs with ladies' they won't feel
shaky or powerless on the off chance that they have a gadget with them. With the
assistance of these gadgets ladies can remain out with no fright whenever. Ladies and
youngster’s well-being is an issue of our general public. The tally of the injured
individual is expanding step by step. Ladies have given contribute towards improvement
of country. Every day ladies are being harassing cases are expanding step by step. From
this we must be concern about the secure of ladies by welfare methods. for example,
different portable applications have been attempted and executed, however the need of
the time is that they need is a gadget that can be conveyed wherever no problem at all.
The plan to build up a keen gadget for ladies is that it's totally agreeable and simple to use
as contrasted and as of now existing ladies secure arrangements, for example, a different
article of clothing, massive belts and portable applications that are simply extremely
theoretical and out of date. In the event that a lady is exposed to assault by an enemy, at
that point a switch must be clicked by her, manually.
There are many similar applications that has been developed or in developing process
available in web where some are free and many need to be procured. Similar applications
are found in Google play store, apple store, Microsoft store and some are third parties’
application or system also.
4
In today’s world, people using smart phones individuals have expanded quickly. Thus, an
advanced mobile phone can be utilized productively for individual secure or different
other declaration purposes. The offensive event that insulted the whole country has
produce us to go for the wellbeing issues as a result a large group of new applications
have been created to give secure system to human by means of their smart phone . This
can be this app can be activated this app by a single click, whenever need arises. A single
snap on this application recognizes the area of spot through GPS and communicates
something specific involving this area URL to the enlisted contacts and furthermore
approach the principal enrolled contact to help the one in perilous circumstances. The
interesting element of this application is to send the message to the enrolled contacts
eternally for like mechanism until the "stop" button in the application is clicked.
Continuous location tracking data by means of SMS assists with finding the location area
of the victim quickly and can be rescued safely. [1]
Expose features a portion of the open doors shown by the rise of the claimed Internet of
Things and the wearable innovation specifically, and urges strategy producers to permit
these advances to create. The Internet of Things and wearable tech challenges existing
social, monetary, and legitimate standards. These innovations raise assortment of
protection and wellbeing concerns. Questions emerge over specialized measures, system
operability, and access to the sufficient range to encourage remote systems
administration. Those issues are not managed here. At that point choice to top-down
guideline is to manage these worries imaginatively as they create utilizing balance of
useful activities, innovative strengthening devices, open and guard dog pressure, industry
best practices and self-regulation, transparency, and focused on requirement of existing
legitimate models (particularly torts) varying. [2]
The android application to give secure at two unique circumstances as follows. The First
module gives secure to Women at Emergency Situations propose a Save Our Souls (SOS)
application to gives the secure on a solitary snap of SOS button for the human going
around evening time or alone. No compelling reason to open the screen, rather by simply
squeezing the force button it legitimately triggers the application to run at the foundation,
to send the crisis message remembering the area for the type of scope and longitude to the
5
enrolled contacts. The following module proposes an android based home secure system
that gives secure of house effects and Senior Citizen in the client nonattendance. Since
the secure of senior resident is constantly a worry with expanding number of theft
episodes. This application educates the client about an endeavor regarding interruption
movement at home through a message and a criticism SMS triggers an alert in the house.
The base necessity is the android portable, an equipment circuit inserted with a switch
furthermore, GSM modem that are associated with the entryway. At the point when an
interloper attempts to open the entryway, the switch triggers a hinder for the
microcontroller to enact the GSM modem to send notice SMS to the store enlisted
number in the modem. At the collectors end the application spring up the menu habitually
for client consideration. In the event that the client neglects to recognize in the
characterized time interim, at that point the programmed positive affirmation message get
send to the remote GSM modem which thus interfere with the microcontroller. [3]
This project presents a ready system for problem recognition utilizing regular industrially
accessible electronic gadgets to both identify the problem and ready specialists.
Information from the accelerometer is assessed with a few edges based calculations and
position information to decide a Problem. The edge is versatile dependent on client
gave parameters, for example, build, weight, and level of action. The calculation adjusts
to one of kind developments that a telephone encounters rather than comparable systems
which expect clients to mount accelerometers to their chest or trunk. On the off chance
that a Problem is suspected a notice is raised requiring the client's reaction. In the event
that the client doesn't react, the system cautions pre-determined social contacts with an
educational message by means of SMS. In the event that a contact reacts the system
submits a marked warning, consequently interfaces, and empowers the speakerphone. In
the event that a social contact affirms a Problem, a suitable crisis administration is
cautioned. Our system gives a feasible, financially understanding answer for Problem
location utilizing a basic graphical interface while not overpowering the client with
awkward sensors. Problem is exceptionally incredible programming particularly produced
for the wellbeing of young ladies, at whatever point someone is in a tough situation they
don't need to sit and discover contacts or discover approaches to send short message
administration, or message the close to ones. They probably won't have such a lot of time.
All that they need to do is shake the advanced cell over the limit esteem, vivaciously.
Quickly a message alert is sent to the individual's mother, father and whoever they wish
6
to, if their watchmen additionally have an advanced cell. Despite the fact that in the event
that it is in quiet mode. At the point when a message called ALERT is gotten it naturally
changes its profile to general, and gives a voice warning Your Son/Daughter is in trouble
PLZ HELPS… . PLZ HELP…. PLZ HELP…Over and again AS A RING TONE until
they tune in and stop it. [4]
Android is a java-based operating system which runs on the Linux 2.6 kernel. It’s
lightweight and full featured. Android applications are developed using Java and can be
ported to new platform easily thereby having huge number of useful mobile applications.
This paper describes about a Safety Triggering application being developed and its
successful implementation with tested results. The application has target users those
sections of the people who surprisingly fall into a situation where instant communication
of their whereabouts becomes indispensable to be informed to certain authorized persons
at remote end. This application main proposes for women’s safety. When we feel that we
are in emergency situation, for example travelling alone in the Auto/Cab at night time we
can use this application so that on one click we can send our location to our family
members and to any police stations continuously until we stop with password-based
button. [5]
Women security device called as “Suraksha” which is anything but difficult to work the
device. Proposed of this system is if anyone will be in circumstance device can be started
through-voice order, Press a switch key, and shock (for example at the point when the
device is threw with power, a power sensor used to initiate the gadget). In a circumstance
it will send the message including moment area to the police, through the transmitter
module and enrolled numbers by means of a GSM module. At present, the work is under
cycle to implant it in gems, versatile, or different transporters like belt and etc. It can
assume a significant function in the propose ventures where all the police headquarters
are associated and share the criminal records, wrongdoing examining cases, etc. [6]
SCIWARS app (Spy Camera Identification and Women Attack Rescue System) has
proposed of two modules. At the first module is about smart alarms system which
function is to infrared rays which is originated from consistently vision hidden cameras
put in changing rooms hotels room and etc. and furthermore educated the client about the
dangerous spot through message. Presently it's the user's duty whether to enlist a
complaint or not by sending the notice with the area to legal authorities, for example,
7
Police. The second module will get initiated by squeezing any key continually which will
give assistance to the casualty from a physic assault in an unsafe circumstance. It sends
the emergency message containing an area to enroll contacts. It likewise records the voice
and catches the pictures of the encompassing for 45 seconds. This data additionally put
away in a mystery area of portable for future bits of proof. [7]
Has proposed a system which is deeply concern or dependable for women security
device. System will be inserted sensors in the wearable dress of women. The system will
include of sensors inserted in a wearable dress. It comprises of cutting edge sensors, GSM
and ATMEGA8 microcontroller with ARDUINO tools which hold user under awareness
at constantly. The system will work on screens heart beat-rate, temperature, and vibration
in the body through sensors will be give alert or check for the uncomfortable
circumstances. If there will be any circumstance sensor will be activate the GPS module
to follow the area and remote camera to catch the pictures that get send to the control
room of the collector through GSM modules to take fundamental activities. At once
processor initiates the mice unit with amplifier which strengthens the voice of the ladies
to shouts or screams over as far as possible. [8]
Proposed of this system is to track the vehicles by vehicle tracking system which is
dependent on GPS. This system will have a button held under the seat of vehicle seat
utilizing GSM. With the expanding financial development pace of a nation, numerous
organizations are building up their arrangement in the close-by the district of the urban
communities. System will also help or efficient on security of ladies workers inside
private transportation is the organizations' duty. [9]
Proposed of report is to create a new model for concern of women security in the society.
According to that report NCRB-social-government associations 35% of Women
everywhere on over the world are challenging a great deal of unreliable physical
harassment openly places, for example, railroad transport stands, pathways, etc. In this
report Sharma have gone through different women security app and its systems. He
(author) has checked on different existing system on women security. The authors have
felt a requirement for cutting edge ladies security systems to give wellbeing measures in
broad daylight puts just as voyaging alone through open vehicles (school transports,
organization vehicles, etc.). [10]
8
Propose an advanced vehicle tracking system that tracks vehicles based on GPS. It also
provides security with an emergency button under the vehicle seat with GSM. As the
country's economic growth rate rises, many companies are increasing into areas close to
cities the safety of female employees in private transportation is the responsibility of the
company. In dangerous situations, employees must press the emergency call button to
activate the Teltonika FM1100 device. At the same time, it activates an Android device
used to capture images inside the car and a GPS system that tracks the position of the car
in the form of latitude and longitude. A warning message indicating the location is sent
via GSM SIM to a special team at the company and a nearby police station. In that case, it
is the responsibility of the police and operations team to handle the situation. You can
further enhance the security of your system by defining a vehicle Area Zone that acts as a
virtual barrier using Geo Fencing software that uses GPS and Google Earth.
Administrators use software-provided tools to identify where vehicles enter and exit
custom geo-fence areas and set geographic boundaries to help limit drivers from leaving
sensitive areas. Administrators can also view reports on vehicle position, speed, ignition
status, and driving reports and instruct the driver via the vehicle's hands-free device. [11]
Propose vision into the opportunities and challenges involved in delivering health- related
behavioral interventions through smartphone apps. The findings suggested a number of
valued features and characteristics that app developers may wish to consider when
creating health behavior apps. Findings also highlighted several major challenges that
appeared the need to further consideration and research to ensure the development of
effective and well-accepted behavior change apps. [13]
9
CHAPTER: 3
The requirements are to be collected before starting projects’ development life cycle. To
design and develop system, functional as well as non-functional requirement of the
system has been studied.
10
i. Functional Requirement
Different functional requirement of the system have been identified and are listed as
below:
For Admin:
The system should allow admin to register and login to the system.
The system should allow them to manage information of users.
The system should notify them about information of the Police, Family, and
Friends of users.
The system should allow them to view alert message and location of the users.
For User:
USECASE DIAGRAM
In Women Safety Alert System, the use case diagram consists of a user and admin where
user is allowed to create an account. Users are allowed to add contact of family, friends
and police. Users can make a panic call and send message through tapping the button on
screen. They are also allowed to view alert messages made by other users whom they
have added on the system. The alert message consists of location, latitude and longitude
of the user who is in danger.
Likewise, admin is allowed to register and login to the system. Admin is allowed to
manage information of the users, police station and family and friends of users and also
they can view the message and location of the users.
11
Figure 3. 2: Use Case Diagram of Women Safety Alert System
Different non-functional requirement have been studied and identified and are listed
as below:
Security: -The system is secure from outside attacks as authorized user and
User are allowed to access the data. They can log into the system and have
access to the Women Safety alert system but access to have various
subsystems is protected by the user login screen that requires a username and
password. This system uses at least 8-character passwords for security.
Different validation process is used.
12
Performance: - The performance of the system is fast and accurate as in this
system database is normalized so it provide fast operations.
The feasibility study concluded that the project is able to be implemented successfully as
it was carefully planned.
Table 3.1: Gantt chart Table for Women Safety Alert System
13
Getting Started 2 weeks
System Design & Architecture 2 week
Implementation 7 weeks
Deployment 4 weeks
Documentation 12 weeks
The figure below is the class diagram for women safety alert system. In women safety
alert system. There are three tables each of them has their own fields as user has email,
name mobile and password where email, mobile and password are made unique, likewise
contact has name and mobile where mobile has made unique and admin has id, name,
location, phone number, mobile number, latitude and longitude where phone number and
mobile number are made unique. In this system, user add contacts of their family, friends
and police station and so on and admin manage the information of the users.
14
Figure 3.4: Class Diagram of Women Safety Alert System
The sequence diagram used in this system helps to understand the existing and the
requirements of the new features and applications.
Sequence Diagram
For Admin
The admin needs to register with all their details then they need to login to the system
after login, they redirect to dashboard page. They can manage information of the users,
view the user’s message and their location.
For Users
The user needs to register with all their details then they need to login to the system after
login they have to add emergency contact of nearby person. And whenever they have
problem, they need to press alert button and emergency message will send to the contacts
with their live location and they get help on time.
15
Figure 3.5: Sequence Diagram for Users of Women Safety Alert System
Activity Diagram
Activity diagram consists of the workflow of the system. The activity of the system
begins from creating a user and verifying a new user or not. After verifying that the user
can add contacts, tap the panic button and notify friends, view alert messages and see
the location of the user in panic.
16
Figure 3.6: Activity Diagram for Women Safety Alert System
To realize the different functional requirement of the system in graphical form, different
design diagram of the system has been prepared which are as follows:
17
3.2.2. Component Diagram
To visualize the physical components of the system and their dependency relationship,
component diagram has been prepared.
Here admin can add the police station and view the information of the users. It can view
the alert message and the location send by the users. Likewise, user can add contacts of
their close ones which are stored in the database named contacts and can view list of
contact and can send the message by clicking alert button.
For Admin
For Users
18
3.2.3. Deployment Diagram
The deployment diagram has been made to show the execution architecture of the system
which includes nodes such as hardware and software components, and the middleware for
the system execution.
The Haversine formula is the formula that calculates the shortest distance between
two points using their latitudes and longitudes measured along the surface.
In this system, Haversine formula is used to calculate the shortest distance between
users and police station or contacts of users.
The haversine of the central angle (which is d/r) is calculated by the following
formula:
(d/r) = haversine(Φ2- Φ1) + cos(Φ1)cos(Φ2)haversine( λ2- λ1)
Where,
r = radius,
19
d = distance between two points,
Figure 3.9: Algorithm Working Process Diagram for women safety alert system
20
CHAPTER: 4
4.1. Implementation
Following are the tools and framework used for the accomplishment of this project:
Android studio
Android Studio is an official IDE (Integrated Development Environment) for
Android application development that is used to create an app for the Android
Platform. It is based on the IntelliJ IDEA, a Java integrated development
environment for software, and incorporates its code editing and developer tools.
Java
In Women Safety Alert System, java programming language is used for back end
development of the project.
SQLite
SQLite is use for storing all the information required to the database in women
safety alert system. It is used for performing CRUD operation such as create,
delete and update data from the database as requested by the user.
HTML
In Women Safety Alert System, html is used for creating different webpage and
sites. It is used to create and structure sections, headings, links, paragraphs using
various tags and elements. We also define headers, paragraphs, links, and images
of Women Safety Alert System by using html.
CSS
In Women Safety Alert System, css is used for designing different tags of html. It
is also used to design different component by the help of class and id. Different
css are used such as inline css, internal css, and external css to design this system.
It is used for defining the styles for web pages. By using css, we can control the
text color, font style, the spacing between paragraphs, sizing of columns, layout
designs, and many more.
21
JavaScript
In Women Safety Alert System, JavaScript is used for client-side validation and to
make dynamic, interactive and responsive web pages. It is used to add dynamic
behavior to the webpage and add special effects to the webpage.
PHP
In Women Safety Alert System, PHP is used for the backend purpose and for
making dynamic web pages. It is used for server side scripting purpose to add
connectivity to the database and also used to encrypt the data, validate the user
data, confirm user to go to certain pages, login pages. It also includes add, update
and delete the data from the database.
MYSQL
MySQL is use for storing all the information required to the database in Women
Safety Alert System. It is used for performing CRUD operation such as create,
delete and update data from the database as requested by the user.
MS Office
This is used for writing and editing the documentation of women safety alert
system
Draw.io
This is used to generate diagrams for system analysis and design of women safety
alert system. Diagrams were created using this tool in order to save time since all
components are available with drag and drop functions.
User Module
22
User Contact View List
User can view all the list of contact. It includes all the details of the contact like
name, contact number, email and password.
Admin Module
In admin module, admin can first register into the system by entering all the
details required for registration and then they can log into the system by entering
their username and password. After login success, they can go to dashboard page
where they can view alert message and location of users and also manage the
information of the users, police station and contacts of users.
Login Module
In login module, we have implemented user login and admin login. User can enter
into the system using their valid email and password likewise admin can also login to
the system using their valid username and password.
Register Module
In register module, we have implemented the User modules and admin modules
where user can register into the system by entering all the details such as name,
contact, email and password required to register. And then can log in to system with
their valid email and password. Likewise, admin can register into system by entering
all the details required for registration.
4.2. Testing
System testing is done by giving different training and testing datasets. This test is done
to evaluate whether the system is providing accurate summary or not. During the phase of
the development of the system, our system is tested time and again. The series of testing
conducted are as follow:
23
4.2.1. Test Cases for Unit Testing
In unit testing, we designed the entire system in modularized pattern and each module is
tested. Until we get the accurate output from the individual module, we work on the same
module. The input forms is tested so that they do not accept invalid input.
User Registration
Table 4. 2: Test case for User Registration of Women Safety Alert System.
User Login
24
Table 4. 3 : Test case for User Login of Women Safety Alert System.
CHAPTER: 5
Every project makes us to learn and gain the knowledge in different aspects. In the
following project, I have learned lots of problem-solving skills and learn things like
25
finding the solution on our own, proper use of guidelines, communication and writing
skills and management of team.
5.2. Conclusion
This project mostly focuses on providing security to users which include location-based
services. Human security is a critical and social issue in today’s world. The crime (abuse,
robbery, sexual assault, rape, domestic violence) against the women can be now brought
to an end with the help of real system implementation of the proposed model. This app is
user-friendly for humans. Whenever humans are in danger position he/she uses this app
and alert their contacts by sending their location to nearby person. By simple touch, it
sends the location to their contact and an alert message “need your help” to saved contact.
In the future this app will be helpful for all humans. The future plans for this app are as
follows:
26
REFERENCES
27
GSM Based Vehicle Tracking, 1- jan- 2015.
[10] A. P. a. D. Sharma, "Women Secuirty".
[11] A. Paradkar, "Safety System for Women Security," International Journal of
Computer Applications (0975 – 8887), vol. 130 – No.11, p. 33, November-2015.
[12] C. a. S. M. Mason.
[13] "Qualcomm Wireless ReachTM, Vital Wave, and GSMA. Transforming Women‟s
Livelihoods Through Mobile Broadban".
[14] k-nearest-neighbor-algorithm-for-machine-learning.
[15] E Balagurusomy, “Fundamentals of Computer”, Tata McGraw Hill Education PVT.
Ltd.
[16] Thomas A. Powell, “Web Design: The Complete Reference 2ED”,, Tata McGraw-
Hill.
[17] L. B. Jeffery Whitten, “Systems analysis and design methods”, McGraw Hill India.
[18] R. . Lafore, "Data Structures and Algorithms", Sams Publishing.
[19] Ian Sommervilla, “ Software Engineering” ,, 9th Addison – wesley , 2010.
[20] D. s. McFraland., “JavaScript and Jquery : The missing mannual”,, 2nd Edition
pogue press, 2011..
[21] A. Abraham Silberscatz, “ Database system concept”,, 6th edition, McGraw Hill..
[22] R. Robert Vieria, “ Micrsoft SQL server 2008 Programming”,, Wiley India.
[23] M. B. Hearn Donald, “ Computer Graphics”, 2E Prentice Hall of India private
Limited, New Delhi..
28
29