Sie sind auf Seite 1von 54

Project II

"Women’s Safety App using Android"


Submitted in partial fulfillment of the requirements for the degree of
Bachelor of Engineering

by

Pasha Anjum Hashmullah Shamiunnisa Roll No.13CO01


Potrick Saamiya Khalil Shaheen Roll No.13CO11
Shaikh Sana Bano Maqbool Ahmed Shahida Roll No.12CO10

Supervisor
Prof. Mukhtar Ansari
Co-Supervisor
Prof. Rehal Qureshi

Department of Computer Engineering,


School of Engineering and Technology
Anjuman-I-Islam’s Kalsekar Technical Campus
Plot No. 2 3, Sector -16, Near Thana Naka, Khanda Gaon,
New Panvel, Navi Mumbai. 410206

Academic Year : 2016-2017


CERTIFICATE

Department of Computer Engineering,


School of Engineering and Technology,
Anjuman-I-Islam’s Kalsekar Technical Campus
Khanda Gaon,New Panvel, Navi Mumbai. 410206

This is to certify that the project entitled "Women’s Safety App using Android" is a bonafide
work of Pasha Anjum Hashmullah Shamiunnisa (Roll No.:13CO01), Potrick Saamiya
Khalil Shaheen (Roll No.:13CO11), Shaikh Sana Maqbool Ahmed Shahida (Roll No.:12CO10)
submitted to the University of Mumbai in partial fulfillment of the requirement for the award of
the degree of Bachelor of Engineering in Department of Computer Engineering.

Prof. Mukhtar Ansari Prof. Javed Sheikh

Supervisor Project Co- Coordinator

Prof. Tabrez Khan Dr. Abdul Razak Honnutagi

Head of Department Director


Project I Approval for Bachelor of Engineering

This project entitled "Women’s Safety App using Android" by Pasha Anjum Hashmullah
Shamiunnisa, Potrick Saamiya Khalil Shaheen, Shaikh Sana Maqbool Ahmed Shahida is
approved for the degree of Bachelor of Engineering in Department of Computer
Engineering.

Examiners

1. ..............................
2. ..............................
Supervisors
1. ..............................
2. ..............................
Chairman
.............................
Declaration

I declare that this written submission represents my ideas in my own words and where others
ideas or words have been included, I have adequately cited and referenced the original sources.
I also declare that I have adhered to all principles of academic honesty and integrity and have
not misrepresented or fabricated or falsified any idea/data/fact/source in my submission. I un-
derstand that any violation of the above will be cause for disciplinary action by the Institute and
can also evoke penal action from the sources which have thus not been properly cited or from
whom proper permission has not been taken when needed.

Pasha Anjum Hashmullah Shamiunnisa


Roll No.: 13CO01

Potrick Saamiya Khalil Shaheen


Roll No.: 13CO11

Shaikh Sana Bano Maqbool Ahmed Shahida


Roll No.: 12CO10
Abstract

Tittle:Women’s Safety App using Android

In today’s world it is very unsafe to travel alone, especially for women. Since lots of unexpected,
and shameful incidents are happening around the globe. Problems may come from anywhere
and anytime, as women are also growing equally like men so for that purpose they have to travel
alone at night where ever they go, they have to travel alone in public transport as well, and for
that reason we need to understand and solve this problem of women so they also should not
feel any fear regarding their safety. This report represents an android application which will
serve the purpose to rescue the women from unsafe conditions. As we all Know that nowadays
every individual carry their own smartphones and the uses of android applications have been
increased rapidly so it is better to have such an android application which will provide a safe
environment in public transport.

Pasha Anjum Hashmullah Shamiunnisa


Roll No:13CO01

Potrick Saamiya Khalil Shaheen


Roll No:13CO11

Shaikh Sana Bano Maqbool Ahmed Shahida


Roll No:12CO10

B.E. (Computer Engineering)


University of Mumbai.

iv
Contents

Project I Approval for Bachelor of Engineering . . . . . . . . . . . . . . . . . . . . ii


Declaration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iii
Table of Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii
List of Figures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viii
list of Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix
Keywords And Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x

1 Project Overview 1
1.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.1.1 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.2 Problem Definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.3 Current Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.4 The Problems with Current System . . . . . . . . . . . . . . . . . . . . . . . . 2
1.4.1 Advantages Over Current System . . . . . . . . . . . . . . . . . . . . 2
1.5 Goals and Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.6 Scope and Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.7 Report Organization: briefly explains all the chapters and their focus . . . . . . 3

2 Review Of Literature 4
2.1 Sauver: An Android Application for Women Safety . . . . . . . . . . . . . . . 4
2.1.1 Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
2.1.2 Pros . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
2.1.3 Cons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
2.1.4 How we overcome Those problem in Project . . . . . . . . . . . . . . 5
2.2 A Mobile Based Women Safety Application (I Safe App) . . . . . . . . . . . . 6
2.2.1 Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
2.2.2 Pros . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
2.2.3 Cons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
2.2.4 How we overcome Those problem in Project . . . . . . . . . . . . . . 6
2.3 Abhaya: An android app for the safety of women . . . . . . . . . . . . . . . . 7
2.3.1 Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
2.3.2 Pros . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
2.3.3 Cons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

v
2.3.4 How we overcome Those problem in Project . . . . . . . . . . . . . . 7
2.4 Safetipin- Complete Safety App . . . . . . . . . . . . . . . . . . . . . . . . . 8
2.4.1 Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
2.4.2 Pros . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
2.4.3 Cons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
2.4.4 How we overcome Those problem in Project . . . . . . . . . . . . . . 8
2.5 Women’s Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
2.5.1 Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
2.5.2 Pros . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
2.5.3 Cons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
2.5.4 How we overcome Those problem in Project . . . . . . . . . . . . . . 9
2.6 Technological Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
2.6.1 Java . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
2.6.2 XML . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
2.6.3 Javascript . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
2.6.4 JSON . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
2.6.5 MySQL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
2.6.6 PHP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12

3 Requirement Analysis 13
3.1 Platform Requirement : . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
3.1.1 Supportive Operating Systems : . . . . . . . . . . . . . . . . . . . . . 13
3.2 Software Requirement : . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
3.2.1 Front End Software Requirement . . . . . . . . . . . . . . . . . . . . 13
3.2.2 Back End Software Requirement . . . . . . . . . . . . . . . . . . . . . 14
3.3 Hardware Requirement : . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
3.3.1 Hardware Required for Implementation . . . . . . . . . . . . . . . . . 14
3.3.2 Hardware Requirement for Deployment . . . . . . . . . . . . . . . . . 14
3.4 Feasibility Study . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15

4 System Design and Architecture 16


4.1 Design Approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
4.2 System Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
4.3 Usecase Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
4.4 Class Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
4.5 Data Flow Diagrams . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
4.6 Component Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
4.7 Deployment Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20

5 Methodology 21
5.1 Modular Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
5.1.1 Login or Signup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21

vi
5.1.2 Qr Scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
5.1.3 GPS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
5.1.4 Messaging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
5.2 Activity Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
5.3 Flow-Chart . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23

6 Implementation Details 24
6.1 Assumptions And Dependencies . . . . . . . . . . . . . . . . . . . . . . . . . 24
6.1.1 Assumptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
6.1.2 Dependencies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
6.2 Implementation Methodologies . . . . . . . . . . . . . . . . . . . . . . . . . . 24
6.2.1 Analysis and Description of Project . . . . . . . . . . . . . . . . . . . 25

7 Results and Analysis 27


7.1 Test cases and Result . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
7.1.1 Unit Testing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
7.1.2 Black Box Testing . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29

8 Conclusion and Future Scope 36


8.1 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
8.2 Limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
8.3 Future Enhancement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36

References 38

9 Appendix A 40
9.1 GUI Display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
9.2 QR code . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
9.3 GPS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41

Acknowledgment 42

vii
List of Figures

2.1 Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12

4.1 System Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17


4.2 Use Case Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
4.3 Class Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
4.4 DFD Level 0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
4.5 DFD Level 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
4.6 DFD Level 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
4.7 Component Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
4.8 Deployment Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20

5.1 Activity Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22


5.2 Flow-Chart . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23

7.1 Database Entries(a) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27


7.2 Database Entries(b) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
7.3 Database Entries(c) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
7.4 App Logo . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
7.5 Welcome Screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
7.6 Registration(a) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
7.7 Registration(b) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
7.8 Login . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
7.9 Gps Location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
7.10 Scan QR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
7.11 SMS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
7.12 Rate App . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
7.13 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
7.14 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
7.15 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
7.16 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35

viii
List of Tables

2.1 Literature Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10

ix
Keywords And Glossary

Keywords :
QR code, GPS, Text message.

Glossary :
D

Database : a comprehensive collection of related data organized for convenient access, generally in
a computer.

GPS : Global Positioning System, a global system of navigational satellites developed to provide precise
positional and velocity data and global time synchronization for air, sea, and land travel.an electronic
system that uses these satellites to determine the position of a vehicle, person etc.

QR scan : A QR code consists of black squares arranged in a square grid on a white background,
which can be read by an imaging device such as a camera. The required data is then extracted from
patterns that are present in both horizontal and vertical components of the image.

Text message :The act of composing and sending electronic messages consists of alphabetic and nu-
meric characters.

x
Chapter 1

Project Overview

1.1 Introduction

If we are to fight discrimination and injustice against women we must start from the home, for if a women
cannot be safe in her own house then she cannot be expected to feel safe anywhere. A recent article in
India claimed that India is the fourth most dangerous place for women’s to take public transport and the
second worst for safety while travelling at night.

The awful Delhi bus gang rape in 2012 is just the tip of the iceberg when it comes to the dangers of taking
public transport as a woman. This rape incident occurred on 16th December 2012 at a place Munirka, a
neighborhood in south Delhi which was a fatal assault. A 23 year old woman a physiotherapist was hit
by a gang while she was travelling in a public transport (bus) with a male friend. Another such incident
of TCS software engineer took place at Bhandup where the body has been found after two days near
Kanjurmarg suburb, this incident was parallel just to the one evoked by Nirbhaya case in Delhi. One
more case taken place in Mumbai where woman was travelling to her native place and she got kidnapped
and killed.

This is the small contribution taken which will provide safety android app for women. Users will allow
to scan the QR code placed inside the vehicle and the number plate of it will be sent in the text message
format to the contacts which user selects. It lets your family and friends know your current via GPS
tracker if your android device is connected to the network.

1.1.1 Motivation

In today’s world, it is not safe for a person to travel alone at night especially for women; it will be unsafe
to travel alone because a woman is not highly strong as men. To provide safety for women the good way
to reduce chances in becoming a victim of violent crime is to identify and call on resources to help you
out of unsafe situations. Having safety app on your phone can diminish our risk and bring assistance
when we require it. Unlike the other applications available, which work only at the time of Emergency
or Danger, this app can be used as a safety or precaution measure. As it is said that precaution is better

1
1.2. Problem Definition

than cure. Our motto in developing this app is to provide a safe environment through smart phone as
today most of the people are carrying smart phones to wherever they go.

1.2 Problem Definition

Using Android we are going to implement QR Scanning and GPS location. Through GPS, the current
address of the user will be fetched and then we are going to scan the QR code to get the vehicle details
by pointing the camera at the code which automatically then converted into text format so that SMS can
be send to any of the contact depending on the user.

1.3 Current Systems

The existing system of others application provides the user alerts to your closed ones or by standers with
your location in a situation of distress or emergency.And will inform and update your closed ones if you
are stuck in an unsafe place.

1.4 The Problems with Current System

The Drawbacks of the existing system is when emergency situation occurs the user cannot set the alert
function when they are in risk situation and immediately they cannot pass their location to friends and
family members to intimate they are in risk. Some of the existing comprises of three coloured buttons
based on the seriousness of a situation. So, you can tap the one you want depending on your situation.
The problem with existing app sends panic alerts to emergency contacts in a problematic situation. It
also records voices and also takes photographs during the panic situation.

1.4.1 Advantages Over Current System

The proposed system has the following advantages compared to other approaches that currently existing
system exist for:

a. Unlike other apps work only at danger, our app can be used as precaution measure.

b. Doesn’t require Internet connection to send message as it is offline message format.

c. Easy to use and friendly interface.

2
Chapter 1. Project Overview

1.5 Goals and Objectives

We are trying to contribute little efforts towards women which will ensure the safety and respect for
women, so that she can also have rights to grow equally like men. Our project is based on such application
which is going to help user by locating the root device through GPS and also be able to scan the QR code,
and message the content in text format to contacts as per user wish.

1.6 Scope and Applications

As the Indian economy and the society embrace new frontiers, the Indian woman of today is more and
more a part of the public places, claiming her rightful place in the society and the commercial world.
Women need to feel safe in public places, and children form another vulnerable category as well, when it
comes to road safety. For future upgrades we will be linking our application with the databases of drivers
details, i.e. if at all the driver is committing any sort of crime and he or she has gone missing so we
would be able to trace him by the information provided in the databases. We will link our app directly
with the drivers details which will contain information like photo, address of driver, contact details, batch
assigned by the RTO and the certiï cationo f vehicledetailsaswell.

1.7 Report Organization: briefly explains all the chapters


and their focus

The remaining part of the project is organized as follows.

Chapter 2 describes the literature review of the existing papers and the description about the applica-
tion.

Chapter 3 introduces the Software and Hardware Requirement of the project.

Consequently, the Project Design of the project is described in the Chapter 4.

Chapter 5 describes the Methodology of the project.

Chapter 6 introduces the system model and basic assumption and dependencies of our work.

Chapter 7 presents the Results and Test cases related work.

Finally, Chapter 8 concludes and describes some future work.

3
Chapter 2

Review Of Literature

2.1 Sauver: An Android Application for Women Safety

2.1.1 Description

This app can be activated by a single click when the user feels she is in danger. This application com-
muniques the user’s location to the registered contacts for every few seconds in the form of message.
Thus, it acts like a sentinel following behind the person till the user feels she is safe. The key features
of this application are along with the user’s location, one of the registered contacts gets a call. Also, the
registered contacts and GPS location are saved from time to time in a database.

2.1.2 Pros

This app continuously fetch the location for an interval of every 30 secs and send it to registered contact.
So we can easily track the user and it will also send the location in form of URL or latitude and longitude
coordinates of location.

2.1.3 Cons

This app will work at the time of the danger so it is not that feasible for a user to instantly react if he or
she is in trouble.The whole process of the system is done only when the device is connected to proper
mobile network, data connection of the device is on and location service in the device is switched on
(GPS).

4
Chapter 2. Review Of Literature

2.1.4 How we overcome Those problem in Project

In future we will try to overcome the problems of previous applications.As the Internet access should be
there in above application which is not possible for all so we will try that our application should work
without the Internet access.

5
2.2. A Mobile Based Women Safety Application (I Safe App)

2.2 A Mobile Based Women Safety Application (I Safe App)

2.2.1 Description

The personal safety application requires the name and number of the person who is to be contacted in
times of emergency. Users can add multiple people in the emergency contacts list. These are the people
who will receive notifications or SMS in case of an emergency. All it requires is the user’s action to
trigger an SOS button provided and it shoots messages as fast as the device can manage. Once the
SOS button is hit, the people in the emergency contacts will get a message like: I am in an emergency;
followed by another message, which has the exact or approximate GPS location of the cell phone. The
user can also make audio or video call. This app also provides necessary first aid measures that should
be taken at the time of emergency situations.

2.2.2 Pros

In this app user can add multiple contacts, all we need is just to trigger the SOS button and it will start
shooting emergency messages as fast as device manage.

2.2.3 Cons

Declare an emergency whenever you sense a danger which is not feasible. Continuous Internet accessi-
bility which always not possible due to network issues.

2.2.4 How we overcome Those problem in Project

With the help of this application we can take precautions before coming to the danger. Network issues
can be overcome with the help of this app.

6
Chapter 2. Review Of Literature

2.3 Abhaya: An android app for the safety of women

2.3.1 Description

This paper presents Abhaya, an Android Application for the Safety of Women and this app can be
activated this app by a single click, whenever need arises. A single click on this app identifies the location
of place through GPS and sends a message comprising this location URL to the registered contacts and
also call on the first registered contact to help the one in dangerous situations. The unique feature of this
application is to send the message to the registered contacts continuously for every five minutes until the
âœstopâ button in the application is clicked. Continuous location tracking information via SMS helps to
find the location of the victim quickly and can be rescued safely.

2.3.2 Pros

This app continupusly send message for every 5 mins until the user click the stop button. The message
contains the location URL and it also call on the first registered contact.

2.3.3 Cons

The working of this app is quite lengthy, though it provides continuous location of the user but the
continuous access to the Internet is required. Any trouble in network will lead to big problem since the
only way to give the information to our registered number is through Internet and if at all the Internet
accessibility is not possible then it will not help in any way.

2.3.4 How we overcome Those problem in Project

We will try to overcome the drawbacks by using the app without Internet. All the application gives the
location in the form of URL providing current location but our application will provide the vehicle details
as well.

7
2.4. Safetipin- Complete Safety App

2.4 Safetipin- Complete Safety App

2.4.1 Description

The is a privacy security app having the troop of features; GPS tracking, emergency, important contact
numbers, directions to safe locations, pins displaying unsafe and free from danger areas and a Safety
Score. It drives in advance of exemplary women safety apps, and presents a vast range of features, so
that they will help to practically plan and can give a counter attack to those spots in the locality.
When a person is going to move to a new locality that is unknown to him and if he or she want to know
the safe areas, then this app will be much helpful providing the user a map based view of the locality
along with its safety score. Also, the person can select the areas on those he or she excited to go and can
get knowledge about the risks of hassles about the area, so they can finally take safety measures.

2.4.2 Pros

This app provide numerous feature such as GPS tracking, important contact numbers, directions to safe
location, pins displaying unsafe and free from danger areas.

2.4.3 Cons

This app will only provide the details of unsafe locations when user access it. It will not give any sort of
help when user is in trouble or danger and he/ she actually needs help.

2.4.4 How we overcome Those problem in Project

In future we can collaborate our application with this providing extra precautionary measure by providing
details of a specific location , about its safety.

8
Chapter 2. Review Of Literature

2.5 Women’s Security

2.5.1 Description

The app is developed by App Soft India. The key features of the app are: the user has to save some details.
These details include: Email address and password of the user, Email address and mobile number of the
recipient and a text message.
Then, app is loaded as a âœwidgetâ, so that when the user touches the app, it alerts the recipient. Another
key feature of app is that it records the voice of surroundings for about 45 seconds and this recorded voice,
text message containing location co-ordinates of the user is sent to the recipient mobile number.

2.5.2 Pros

The key features is that it requires details such as email address and password of both user and recipient.
It records the surrounding voice for about 45 secs.

2.5.3 Cons

This app will need continuous access to Internet for tracking location. If the victim is in danger it is not
possible to touch the button to give alert.

2.5.4 How we overcome Those problem in Project

By providing SMS feature without internet and making app more feasible to use.

9
2.5. Women’s Security

As a part of literature survey, it is investigated some applications of safety that already exist in market.
The aim is to observe how these applications work and to see how they can be improved and how are
they different.

Apps Name Requires Internet Alert Send SMS Gives Precautions without Internet
Sauver app Yes Yes Yes No No
ISafe app Yes Yes Yes No No
Abhaya app Yes No Yes No No
SafeTpin app Yes No Yes No No
Women’s Security app Yes Yes Yes No No

Table 2.1: Literature Review

10
Chapter 2. Review Of Literature

2.6 Technological Review

2.6.1 Java

Java is a general-purpose computer programming language that is concurrent, class-based, object-oriented,


and specifically designed to have as few implementation dependencies as possible. It is intended to let
application developers "write once, run anywhere" (WORA), meaning that compiled Java code can run
on all platforms that support Java without the need for recompilation. Java applications are typically
compiled to bytecode that can run on any Java virtual machine (JVM) regardless of computer architec-
ture.

2.6.2 XML

Extensible Markup Language (XML) is a markup language that defines a set of rules for encoding docu-
ments in a format that is both human-readable and machine-readable. Basically , XML is used for layout
designing. All the UI and layout of your app is designed using XML. Unlike Java (which is Back Bone
of your app), XML helps you to design your app , how it will look , how components like buttons ,
textview , etc will be placed and their styling.

2.6.3 Javascript

JavaScript is a lightweight, interpreted programming language. It is designed for creating network-


centric applications. It is complimentary to and integrated with Java. JavaScript is very easy to implement
because it is integrated with HTML. It is open and cross-platform.

2.6.4 JSON

JSON stands for JavaScript Object Notation.It is an independent data exchange format and is the best
alternative for XML. This chapter explains how to parse the JSON file and extract necessary information
from it. Android provides different classes to manipulate JSON data. These classes are JSONArray,
JSONObject, JSONStringer.

2.6.5 MySQL

MySQL is the most popular Open Source Relational SQL database management system. MySQL is
one of the best RDBMS being used for developing web-based software applications. MySQL is a very
powerful program in its own right. It handles a large subset of the functionality of the most expensive
and powerful database packages. MySQL is very friendly to PHP, the most appreciated language for web
development.

11
2.6. Technological Review

2.6.6 PHP

The PHP Hypertext Preprocessor (PHP) is a programming language that allows web developers to create
dynamic content that interacts with databases. PHP is basically used for developing web based software
applications. PHP is a server side scripting language that is embedded in HTML. It is used to manage
dynamic content, databases, session tracking, even build entire e-commerce sites. It is integrated with a
number of popular databases, including MySQL, PostgreSQL, Oracle, Sybase, Informix, and Microsoft
SQL Server.

Figure 2.1: Technology

12
Chapter 3

Requirement Analysis

3.1 Platform Requirement :

3.1.1 Supportive Operating Systems :

The supported Operating Systems for client include:

i. Windows

ii. Linux

Windows and Linux are two of the operating systems that will support comparative applications. Win-
dows is a metafamily of graphical operating systems developed consists of several families of operating
systems. The project is developed on Windows but also compatible with Linux too.

3.2 Software Requirement :

3.2.1 Front End Software Requirement

1. Android studio

In this project we used Android Studio offers even more features that enhance your productivity when
building Android apps, such as

a. A flexible gradle based system.

b. Build variants and multiple apk file generation.

13
3.3. Hardware Requirement :

c. Code templates to help you build common app features.

d. A rich layout editor with support for drag and drop theme editing.

e. Lint tools to catch performance, usability, version compatibility, and other problems.

2. JDK(Java Development Kit) 7

3. JRE(Java Runtime Environment)

4. Windows or Linux Operating system

3.2.2 Back End Software Requirement

1. PHP

2. MySQL

3.3 Hardware Requirement :

3.3.1 Hardware Required for Implementation

1. Device with QR Scanning support

2. Device with GPS support

3. Device with Text messaging support

3.3.2 Hardware Requirement for Deployment

RAM : 4GB minimum or more

Processor : Intel i3 minimum or more

Disk Space : 500 MB for Android Studio , atleast 1GB for Android SDK

14
Chapter 3. Requirement Analysis

3.4 Feasibility Study

With respect to time, gives quick response and does not lag. It doesn’t require any implementation cost,
only for the purpose of sticking QR code required money and it doesn’t cost much.

15
Chapter 4

System Design and Architecture

4.1 Design Approach

Design is the first step in the development phase for any techniques and principles for the purpose of
defining a device, a process or system in sufficient detail to permit its physical realization. Once the soft-
ware requirements have been analyzed and specified the software design involves the technical activities
design, coding, implementation and testing that are required to build and verify the software. The design
activities are of main importance in this phase, because in this activity decision ultimately affecting the
success of the software implementation and its ease of maintenance are made. These decision have the
final bearing upon realibility and maintainability of the system. design is the only way to accurately
transalte the customer requirements into finished software or a system. Design is the place where quali-
tyis fostered in development. software design is a process through which requirements are translated into
a representation of software.

4.2 System Architecture

Every software has a model. Before the implementation of the software, architecture is drawn in the
form of any model or any diagram. So it become quite easier to understand the flow of the software and
it also help in the easier implementation of the software.

The client interacts with the developer team so that client can make them understand that what kind of
software he wants. According to his idea the developer team makes diagram so that it can become easy
for the both of the parties. If any changes are to be made, then the client could also ask the developer to
make the required changes.

The explanation of the above architecture is as follows:

System architecture of proposed method consists of mainly two tasks. In below architecture, we have a
user with his/her smartphone by which user set GPS on, then the current location of user fetches. The
next module is QR scanning where user can simply scan the QR code which will be placed inside the

16
Chapter 4. System Design and Architecture

vehicle from that scanning the vehicle details will be extracted. These all processing does not required
any Internet connection. After this, now user will send an offline message to any of the contact in his/her
list.

Figure 4.1: System Architecture

4.3 Usecase Diagram

Figure 4.2: Use Case Diagram

17
4.4. Class Diagram

4.4 Class Diagram

Figure 4.3: Class Diagram

4.5 Data Flow Diagrams

Figure 4.4: DFD Level 0

18
Chapter 4. System Design and Architecture

Figure 4.5: DFD Level 1

Figure 4.6: DFD Level 2

19
4.6. Component Diagram

4.6 Component Diagram

Figure 4.7: Component Diagram

4.7 Deployment Diagram

Figure 4.8: Deployment Diagram

20
Chapter 5

Methodology

5.1 Modular Description

A module description provides detailed information about the module and its supported components,
which is accessible in different manners.

5.1.1 Login or Signup

This is where users can Login or Signup. Here user can enter his/her Name, Email, Address, Username
Password, Contact number . If user is already registered he/she can directly Login by entering username
and password.

5.1.2 Qr Scanning

If contains QR code placed inside the vehicle we can simply scan that QR code. To scan QR code simply
open the app, point the camera at the code, the app will automatically recognize the code your camera is
pointing at. The code just contains the vehicle number of the plate.

5.1.3 GPS

Through GPS, the current address of the user will be fetched if connected to network.

21
5.2. Activity Diagram

5.1.4 Messaging

Once QR code is scanned and the current location is fetched then the content of both will be converted
into text format so that message can be send to any of the contacts depending on the user.

5.2 Activity Diagram

Figure 5.1: Activity Diagram

22
Chapter 5. Methodology

5.3 Flow-Chart

Figure 5.2: Flow-Chart

23
Chapter 6

Implementation Details

6.1 Assumptions And Dependencies

6.1.1 Assumptions

Following are the assumptions which were taken into consideration:

i. Every vehicle must have QR code which stores some data, mainly vehicleâTM s number and driver’s
other details. The QR code must stick somewhere near the user’s location so that it can be easily acces-
sible to the user.

ii. The local database is assumed to be scalable and robust so that it can store multiple data and maintain
consistency.

iii. The user interface should be simple and clean that allows soothing effect to user.

6.1.2 Dependencies

The dependencies are as follows: For Backend processing, MySQL and PHP is being used. The back-
bone structure of the system is developed by making MySQl and PHP. MySQL is one of the best RDBMS
being used for developing web-based software applications. MySQL is very friendly to PHP, the most
appreciated language for web development. PHP is a server side scripting language.

6.2 Implementation Methodologies

Different modules to be used in our project:

24
Chapter 6. Implementation Details

1. Creating a GUI.

2. Taking input from user.

3. Performing the required function.

4. Display the output.

6.2.1 Analysis and Description of Project

Creating a GUI:

First a user friendly GUI is created, so that it is easier for the user to perform necessary operations. The
GUI is created on android studio.

Taking input from user:

The input is given by the user. The inputs are taken through the GUI placed on screen. Icons and bars
are given as input. After taking input from user the further actions, such as login, signup are performed
as per the need of the user.

Performing the required functions:

All the things that user need to perform are provided in the GUI, the user just have to click them according
to his/ her requirements. After taking the input the required things are performed like, getting the current
address, fetching the data from QR code, sending the text message etc. All the functions have been
already discussed in the previous chapter.

Display the output:

The output will be displayed in the text format i.e. current location and content of qr code which user
can send to contact. And the confirmation message is also displayed on the screen after the message has
been send successfully.

XML Layout File

<?xml version="1.0" encoding="utf-8"?>


<manifest xmlns:android="http://schemas.android.com/apk/res/android"
package="com.example.womensafety">

<uses-permission android:name="android.permission.CAMERA"/>
<uses-permission android:name="android.permission.ACCESSCOARSELOCATION" />
<uses-permission android:name="android.permission.INTERNET" />
<uses-permission android:name="android.permission.READCONTACTS" />
<uses-permission android:name="android.permission.WRITECONTACTS" />

25
6.2. Implementation Methodologies

<uses-permission android:name="android.permission.SENDSMS" />


<uses-permission android:name="android.permission.ACCESSFINELOCATION"/>

<application
android:allowBackup="true"
android:icon="@mipmap/iclauncher"
android:label="@string/appname"
android:roundIcon="@mipmap/iclauncherround"
android:supportsRtl="true"
android:theme="@style/AppTheme">
<activity
android:name=".SplashScreen"
android:label="@string/appname"
android:theme="@style/AppTheme.NoActionBar">
<intent-filter>
<action android:name="android.intent.action.MAIN" />

<category android:name="android.intent.category.LAUNCHER" />


</intent-filter>
</activity>
<activity android:name=".SendSms" />
<activity
android:name=".MainActivity"
android:theme="@style/AppTheme.NoActionBar" />
<activity android:name=".Login" />
<activity android:name=".Signup"></activity>
</application>
</manifest>

26
Chapter 7

Results and Analysis

7.1 Test cases and Result

7.1.1 Unit Testing

We begin with login part in which we have throughly checked all the input boxes and verified that each
value is successfully entered into database and also cross checked that login is done successfully. Below
shows the database

Figure 7.1: Database Entries(a)

27
7.1. Test cases and Result

Figure 7.2: Database Entries(b)

Figure 7.3: Database Entries(c)

28
Chapter 7. Results and Analysis

7.1.2 Black Box Testing

Black Box Testing, also known as Behavioral Testing, is a software testing method in which the internal
structure/ design/ implementation of the item being tested is not known to the tester. These tests can be
functional or non-functional, though usually functional. This method is named so because the software
program, in the eyes of the tester, is like a black box; inside which one cannot see. This method attempts
to find errors in the following categories
1. Incorrect or missing functions

2. Interface errors

3. Errors in data structures or external database access

4. Behavior or performance errors

5. Initialization and termination errors

The testing of Android Mobile application is generally done inside the development tools. Initially
emulators are used for this and final testing is done with hardware devices. However, for this application
the development and testing is extended out on the specific hardware model. It is essential to have android
device embedded in the hardware model.

Figure 7.4: App Logo

29
7.1. Test cases and Result

Figure 7.5: Welcome Screen

Figure 7.6: Registration(a)

30
Chapter 7. Results and Analysis

Figure 7.7: Registration(b)

Figure 7.8: Login

31
7.1. Test cases and Result

Figure 7.9: Gps Location

Figure 7.10: Scan QR

32
Chapter 7. Results and Analysis

Figure 7.11: SMS

Figure 7.12: Rate App

33
7.1. Test cases and Result

Figure 7.13

Figure 7.14

34
Chapter 7. Results and Analysis

Figure 7.15

Figure 7.16

35
Chapter 8

Conclusion and Future Scope

8.1 Conclusion

Unfortunately the safety of women is in doubt and security is not concerned. Many headlines still
coming across against women indicates that increasing trends of such sexual assault, rapes still happening
in today’s generation. Around 80 percent of women are losing confidence and have fear towards the
realization of freedom. So we are trying to contribute little efforts towards women which will ensure the
safety and respect for women so that she can also have rights to grow equally like men.

This mobile application is very much helpful for anyone.This application will help user by scanning the
QR code which will be nothing but scan and extract the vehicle details and through GPS the current
address will be fetched and send it to any contact depending on user. Here the user can take precautions
before coming to the actual danger.

8.2 Limitations

1. You can’t send messages to any of the contacts if there is no balance.

2. If your mobile is not connected to network , the current location will not be fetch.

8.3 Future Enhancement

As the technology emerges, it is possible to upgrade the system and can be adaptable to desired environ-
ment. Because it is based on object oriented design, any further changes can be easily adaptable. For
future upgrades we will be linking our application with the databases of drivers details, i.e. if at all the
driver is committing any sort of crime and he or she has gone missing so we would be able to trace him
by the information provided in the databases. We will link our app directly with the drivers details which

36
Chapter 8. Conclusion and Future Scope

will contain information like photo, address of driver, contact details, batch assigned by the RTO and the
certification of vehicle details as well.

37
References

[1] C. Yi and Y. Tian Text string detection from natural scenes by structure-based partition and grouping
IEEE Conf. Computer. Vis. Pattern Recognition., Jun. 2012, pp. 1083â“1090.

[2] C. Yi and Y. Tian Localizing text in scene images by boundary clustering, stroke segmentation, and
string fragment classiï cationIEEETrans.ImageProcess., vol.21, no.9, Sep.2012, pp.4256ı4268, .L.NeumannandJ.M
timescenetextlocalizationandrecognition, inProc.IEEECon f .Computer.Vis.PatternRecognitionJun.2012, pp.3538ı3

[3][4] Digital image processing Rafael C Gonzalez

[5] INTERNATIONAL JOURNAL OF TECHNOLOGY ENHANCEMENTS AND EMERGING ENGI-


NEERING RESEARCH, VOL 3, ISSUE 05 122 ISSN 2347-4289 Copyright Â
c 2015 IJTEEE. Sauver:
An Android Application For Women Safety.

[6] IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume
17, Issue 1, Ver. I (Jan â“ Feb. 2015), PP 29-34 www.iosrjournals.org DOI: 10.9790/0661-17112934
www.iosrjournals.org 29 | Page A Mobile Based Women Safety Application (I Safe Apps)978-1-4673-
6540-6/15.

[7] VaijayantiPawar et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN:
2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.823-826 www.ijera.com 823|P a g e SCIWARS
Android App for Women Safety.

[8] Abhaya: an android app for safety of women.

[9] Report of the Fourth World Conference on Women. New York, United Nations, 1995 (A/CONF.177/20/Rev.1)

[10] Doulamis, A.; Pelekis, N.; Theodoridis, Y., âœEasyTracker: An Android Application for Capturing
Mobility Behavior,â 2012 16th Panhellenic Conference on Informatics (PCI), vol., no., pp.357,362, 5-7
Oct. 2012.

[11] Doulamis, A.; Pelekis, N.; Theodoridis, Y., âœEasyTracker: An Android Application for Capturing
Mobility Behavior,â 2012 16th Panhellenic Conference on Informatics (PCI), vol., no., pp.357, 362, 5-7
Oct. 2012.

[12] âWOMENâTM S SECURITYâ, Android App developed by AppSoftIndia, December 17, 2013. https://play.google.
id=com. zayaninfotech.securityhl=en

38
Chapter 8. Conclusion and Future Scope

[13] âœLife 360 â“ Family Locatorâ Android App Developed ByLife360, 20February2014,

[14] Bramarambika Thota, Udaya Kanchana Kumar .P, Sauver: An Android Application For Women
Safe-ty, MTech, Dept. Of ECE ,Vignan University , Guntur , India , M.sc , Computer Science , TJPS
Co-lege,Guntur,India ,IJTEEE ,ISSN:2347-4289.VOL 3,ISSUE 05.

[15] S.Sangeetha1,P.Radhika PG scholar, Application For Women Safety,Department Of MCA, Pani-


malar Engineering College,IOSR,ISSN:2278-0661,pISSN:2278-8727, Volume 17,ISSUE 3, Ver.IV(May-
Jun.2015),pp01-04.

39
Chapter 9

Appendix A

9.1 GUI Display

For GUI user need Android Development in order to run. By using Android Development it will allow
the user to run application in Front End. Android can be installed on both Linux as well as Windows
operating system. After installation has been completed, the user interface will display in front end so
that application can be executed. The GUI developed for the application will be displayed when the user
executes the program.

9.2 QR code

QR code (abbreviated from Quick Response Code) is the trademark for a type of matrix barcode (or
two-dimensional barcode) first designed for the automotive industry in Japan. A barcode is a machine-
readable optical label that contains information about the item to which it is attached. A QR code
uses four standardized encoding modes (numeric, alphanumeric, byte/binary, and kanji) to efficiently
store data; extensions may also be used. The QR code system became popular outside the automotive
industry due to its fast readability and greater storage capacity compared to standard UPC barcodes.
Applications include product tracking, item identification, time tracking, document management, and
general marketing.

A QR code consists of black squares arranged in a square grid on a white background, which can be read
by an imaging device such as a camera, and processed using Reedâ“Solomon error correction until the
image can be appropriately interpreted. The required data is then extracted from patterns that are present
in both horizontal and vertical components of the image.

QR codes are now used in a much broader context, including both commercial tracking applications
and convenience-oriented applications aimed at mobile-phone users (termed mobile tagging). QR codes
may be used to display text to the user, to add a vCard contact to the user’s device, to open a Uniform
Resource Identifier (URI), or to compose an email or text message. Users can generate and print their
own QR codes for others to scan and use via downloadable or online applications.

40
Chapter 9. Appendix A

9.3 GPS

The Global Positioning System (GPS), originally Navstar GPS, is a space-based radionavigation system.
It is a global navigation satellite system that provides geolocation and time information to a GPS receiver
anywhere on or near the Earth where there is an unobstructed line of sight to four or more GPS satel-
lites. The GPS system does not require the user to transmit any data, and it operates independently of
any telephonic or internet reception, though these technologies can enhance the usefulness of the GPS
positioning information.

41
ACKNOWLEDGMENT

I would like to take the opportunity to express my sincere thanks to my guide Prof. Mukhtar Ansari,
Assistant Professor, Department of Computer Engineering, AIKTC, School of Engineering, Panvel for
his invaluable support and guidance throughout my project research work. Without his kind guidance &
support this was not possible.

I am grateful to him/her for his timely feedback which helped me track and schedule the process effec-
tively. His/her time, ideas and encouragement that he gave is help me to complete my project efficiently.

I would also like to thank Dr. Abdul Razak Honnutagi, AIKTC, Panvel, for his encouragement and for
providing an outstanding academic environment, also for providing the adequate facilities.

I am thankful to Prof. Tabrez Khan, HOD, Department of Computer Engineering, AIKTC, School
of Engineering, Panvel and all my B.E. teachers for providing advice and valuable guidance.

I also extend my sincere thanks to all the faculty members and the non-teaching staff and friends for
their cooperation.

Last but not the least, I am thankful to all my family members whose constant support and encour-
agement in every aspect helped me to complete my project.

Pasha Anjum Hashmullah Shamiunnisa


Roll No: 13CO01

Potrick Saamiya Khalil Shaheen


Roll No. 13CO11

42
Chapter 9. Appendix A

Shaikh Sana Bano Maqbool Ahmed Shahida


Roll No. 12CO10
(Department of Computer Engineering)
University of Mumbai.

43

Das könnte Ihnen auch gefallen