11 IV April 2023
11 IV April 2023
https://doi.org/10.22214/ijraset.2023.50663
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue IV Apr 2023- Available at www.ijraset.com
Abstract: Anytime a need occurs, this Android Application for the Safety of Women and this app can be triggered with a simple
click. A single click on this programme locates the location of the place using GPS, sends a message to the registered contacts
containing the location URL, and calls the first registered contact to assist the user in dangerous situations. This software may
be launched by a special click if the user thinks she is in danger.It is utilised to send messages every few seconds updating the
recorded contacts on the consumer's location. Because of this, it acts as a guard, following the customer until she starts to feel
uneasy. This study suggests a fresh technique for introducing the idea to the recorded contacts progressively up until they press
the "HELP" knob. It is possible to swiftly and possibly cautiously find the victim's neighbourhood using SMS's ongoing location
monitoring information. The goal of this request is to protect women. By addressing the resources that today's world's
daughters' security is threatened by, this is resolved. Our programme makes sure that wives are not buried in the aforementioned
positions through a variety of capabilities provided by our plan.
I. INTRODUCTION
Currently, it is not advised for anyone to walk alone after dark, especially women. This is because women are less aggressive than
men when it comes to protecting themselves from the ruling class. The best strategy to reduce your likelihood of becoming a victim
of a violent crime (such as theft, sex crime, rape, or domestic abuse) is to look for favour and accept money to get you out of unsafe
circumstances.
The best method to reduce your risk of becoming a victim of a violent crime (such as theft, sexual assault, rape, or domestic abuse)
is to recognise and ask your parents and other trusted individuals for assistance when you are in danger. Having these applications
on your phone can help you stay safe when you're in danger right away or become separated from friends after a night out and are
unsure how to go home. No matter if you are in an immediate crisis, caught in it with friends, or freed from it at midnight and are
unable to get home, having these apps on your phone can reduce your risk and support you when you need it. We present Security
Alert in this post as a request for a robot attack policy for smart phones. 65% of fathers in India think their daughters will put up
with a lot to keep the group together, and women consistently perform better than expected.
We all agree that women's safety is crucial, but we also need to recognise that they require proper protection. Women may need
assistance in a crisis since they are not as physically strong as men. Android has become quite popular since it is a widely used
mobile OS that runs on the Linux kernel and is free to use. It was specifically developed by the Google team, and Java was used to
manage its functionality.
The advanced security software is created on an android platform, utilising the hardware resources of an android phone as well as
the proper memory management of a custom virtual machine. Each app is developed with equal access to a phone's capabilities in
order to give users access to as many apps and services as feasible.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 2384
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue IV Apr 2023- Available at www.ijraset.com
Figure : ER Diagram
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 2385
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue IV Apr 2023- Available at www.ijraset.com
VII. METHODOLOGY
The structure comprises sections that show a quick-reacting cost insurance framework for people, especially for women, using
which a woman in need can acquire help only by setting a watchword and speaking the catchphrase when the application becomes
active. Self-defense techniques for women's security resemble a sophisticated application for women. It can aid women in making
advancements.
Algorithm:
1) Step 1: START
2) Step 2:User Registration
Then fill all required fields
a) Personal Details
b) Contact Details
c) Voice and Keyword setup
3) Step 3: Log In
If (New User)
Then go to Step 2
Enter user name and password
If (Field is empty)
Then throw warning
If (Field is not valid)
Then throw warning
If (matches)
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 2386
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue IV Apr 2023- Available at www.ijraset.com
VIII. RESULTS
1) Login & Registration page
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 2387
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue IV Apr 2023- Available at www.ijraset.com
2) Voice to text
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 2388
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue IV Apr 2023- Available at www.ijraset.com
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 2389
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue IV Apr 2023- Available at www.ijraset.com
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 2390
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue IV Apr 2023- Available at www.ijraset.com
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 2391
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue IV Apr 2023- Available at www.ijraset.com
X. ANALYSIS MODEL
We are using the waterfall model in our project.
1) Compiling and Analyzing Needs: During this waterfall stage, we identify the precise needs, such as those for the required
hardware and software, databases, and interfaces, that are essential to the success of our project.
2) System build: During this phase, we build a system that is simple to use and comprehend for the end user. Several UML
diagrams and data flow diagrams are built in order to understand the system flow, system modules, and sequence of execution
3) Implementation: During the implementation stage of the project, we successfully implemented all of the necessary modules at
each module level to produce the required results. With input from the system design, the system is first constructed as a
collection of short programmes , or units, before being merged in the following stage.The process of creating and assessing
each unit's functioning is known as unit testing.
4) Testing: To determine whether the project module is delivering the anticipated outcomes within the estimated timeframe, the
numerous test cases are executed. following the integration into a system of each of the 21 components tested throughout the
implementation phase. After integration, the entire system is checked for flaws and defects.
5) System deployment: Following functional and non-functional testing, the product is either put into use by clients by being
installed there or produced a product that can be purchased
6) Maintenance: Various problems might arise in a client environment. Patches are published to address certain problems.
Additionally, improved versions of the product are issued. To bring about these changes in the surroundings of the consumer,
maintenance is performed. The progression is viewed as falling smoothly through the phases like a waterfall as they are all
connected to one another. The next phase cannot begin until the preceding phase's established set of objectives have been met
and it has been approved, thus the term "waterfall model." Phases do not cross over in this model.
XII. IMPLEMENTATION
If a person needs support or has problems, they can use this Android app. When a user opens the app, a HELP button is present.
Additionally, they may save a message and three phone numbers. If a user wants help or has problems using the app, they merely
need to launch it and click the "HELP" button. This programme uses his saved phone numbers to send the message.The total review
can be finished in three primary steps, each of which is covered in detail. The evaluation of the complete application implementation
includes three major phases. The first important step is creating the application and adding the contact details. These relationships
include those we have with our family, friends, and the police chief of the city where we currently live. When installing the
programme for the first time on a smart phone, the aforementioned contact details should be provided. The programme will save the
information you supply. When a person is in danger or has to be rescued, the second crucial step is to send GPS information to the
contacts who have been registered. GPS data can be shown as Coordinates or a URL that directs the user to their location on any
stock map application found in software from companies like Google, Nokia, etc. This action is only taken when the rescue button
on the application is pressed.The entire process of this step may be finished when the smartphone is connected to the proper mobile
network and location service is enabled (GPS). The effort made to consistently send the message with the location URL to the
registered contacts is the third crucial step. Since the time interval in this instance has been set to five minutes, an SMS is sent to the
registered contacts every five minutes.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 2392
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue IV Apr 2023- Available at www.ijraset.com
XIII. CONCLUSION
This research paper discusses the Android app Security Alert that was developed for women's security with the use of recent
breakthroughs in mobile technology. You can use anything in this project that the user could find useful if they encounter problems
or need help. When a user opens this programme, the HELP button is present. He can also store three phone contacts and a
message. Press the button if the user requires help or is having problems. As a result, when the user runs this programme, a HELP
button is present. Clicking the button will send an SMS to register a user. This application can eventually be merged with the law
enforcement database (such as the database used in city police control rooms) rather than the experimental database that was used
for this project.
Several further modifications can still be made even if the root device is off or not accessible over a mobile network. Therefore, this
software could be of great help in rescuing women or men from perilous circumstances.
XIV. ACKNOWLEDGMENT
Our appreciation goes out to the entire Dhole Patil College of Engineering in Pune, as well as a special thank you to Prof. Sonal
Chanderi, who served as our project mentor and gave her all to assist us finish this incredible project. And a heartfelt thank you to
all the authors whose works we looked at for this project. We would not have been able to do our assignment without all of these
materials.
REFERENCES
[1] Bhanushali, P., Mange, R., Paras, D., & Bhole, C.(2018), Women Safety Android App.
[2] Yarrabothu, R. S., & Thota, B. (2015, December). Abhaya: An Android App for the safety of women, In 2015 Annual IEEE India Conference (INDICON) (pp.
1-4), IEEE.
[3] N. Ramesh Kannan , S. Sujitha, S. Ganapathy Subramanian, “Women Safety Mobile App,” International Journal on Cybernetics & Informatics (IJCI) Vol. 10,
No.1/2, May 2021.
[4] I go safely app," [Online]. Available: http://www.igosafely.com/. [Accessed 25 august 2019].
[5] "Shake to Alert," [Online].Available: https://www.shake2alert.co.za/. [Accessed 25 august 2019]. “Women safety applications," [Online]. Available:
enggjournal.com. [Accessed 30 august 2019].. Android Developers, Location APIs. URL: http://developer.android.com/google/playservices/location.h tml
[6] "WOMEN’S SECURITY", Android App developed by App Soft India, December 17, 2019. https://play. google. com/store /apps/ details? id= com.
Zayaninfotech. security& hl=en
[7] " POLIE NEARBY", Android app developed by Big Systems in 2018. https:// play. google. com/ store/apps /details? id=com. smoketech. PoliceNearby& hl=e
[8] " SCREAM ALARM", Android app developed by GoPalAppMaker in November,2013 https: //play.google.com/store/apps /details?id=gopal. appmaker.
android. com&hl =en
[9] Harini, R., & Hemashree, P. (2019), Android App for Women Security System
[10] Mane, I. A., Babar, J. R., Patil, S. S., Pol, S. D., & Shetty, N. R. (2016). Stay safe application, In International Research Journal of Engineering and Technology
(IRJET), SJ Avenue (Vol. 3, No. 5, pp. 2157-2160).
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 2393