Sei sulla pagina 1di 6

Introduction

1. Introduction of our “FEMME” is a security device specially designed for women in emergency
and in distress. It is simple and easy to use and carry with various functionalities. he numbers of
smart phone users are turning into greater in amount all over the world. A smart phone has
many applications which is useful to people in which our “FEMME” will become one of those. It
is a personal safety product designed to keep you and your friends safe 24/7. It is packed with
features for both everyday safety and real emergencies, making it an ultimate tool for all. his
user-friendly application can be accessed by anyone who has installed it in their smart phones as
well as who has our device. Our intention is to provide you with fastest and simplest way to
contact your nearest help. he basic approach (single click) is to intimidate the instant location
and a distress message to the cops and the preset numbers, so that unfortunate incident can be
averted and to provide real time evidence for the action against the perpetrators of crime
against women1 . his device can also be miniaturized in future and can be embedded in
jewelleries, mobile phones etc., in order to make this device handy2 . his can also help police
department to reduce the crimes, which are against women and the evidence can be used to
trace the crime. “FEMME” is a guide, which aids people to take preventive measures as soon as
possible during: • Being stalked while walking. • Attempted physical or sexual assault. • Unsafe
neighbours. • Domestic violence. • Hidden camera detector

OBJECTIVES

1. To provide safe options and services for women and their children affected by domestic and
family violence.

2. To use knowledge, evidence and innovation to enhance services to women and their children.

3. To engage and retain quality staff.

4. To develop partnerships that contribute towards the elimination of domestic and family
violence.

5. To improve the capacity of the community and community services sector to respond to
domestic and family violence

6. To ensure organisational governance complies with relevant legal and contractual obligations.

Abstract

Now-a-days women harassment is increasing and women and children safety is a big question mark. To
overcome this problem, this paper explores the IOT concepts such as measuring the body temperatures,
heart beat rates/pulse rates by sensors to monitor their conditions and alerts nearby location police
station or relatives. Since, there are some web or mobile applications for women safety and
emergencies, it does not work at all situations. The lady cannot stay on the gadget at all the time.
Instead, she could be monitored by wearing smart watches, etc. It could be accessed by wireless
technologies like GPS, GSM, GPRS, and Wi-Fi and monitored by nearby devices. Keywords: Women
Security IOT; Sensors for security alerts; IOT for women safety; smart phones and IOT;

IV. Conclusion

This research proposes a Low Cost model which is useful for Women. For future work surveillance
feature can be added to avoid intruders for women’s. Women’s or girls can be monitored by capturing
images frequently by using JPEG cameras and at the right time in order to save cops or police station or
friends and family member from men’s or intruders or violence. This type of an idea being the first of its
kind plays a crucial role towards ensuring Women Safety in the fastest way possible automatically.

Acknowledgements
Women empowerment is an important issue in the Social Sciences in present time. Changing role and
status of women in Contemporary Indian society has attracted the attention of social scientists and
policy makers. The 73rd constitutional amendment is an important step in the direction of women
empowerment through reservation of women in Panchayat Raj Institutions. More then one million
women became political women from house hold women after this Amendment. Present Study is
undertaken to understand the women’s role and participation in the three tier/ village Panchayats with
women empowerment perspective in the villages of Ahmedabad District, Gujarat. During the course of
study, I had an opportunity to meet several scholars and professionals in the field. Here I take
opportunity to express my deep feelings and gratitude for all those persons who helped me in making
this endeavor successful. Submission of thesis gives a sense of satisfaction and pleasure of completing
the work inspite of difficulties

Existing system

4. Existing System
In the existing system there is no monitoring system for
girls, it should create many problems for them and the no
safety mechanism to protect the girls from the misbehav-
iour activities. In addition, in the existing system there is
no alert mechanism for the girl’s safety, it should be done by manually only.
Purpose scope applicability
It is an all-in-one system. Hence no need to carry mul-
tiple devices.
• GPS tracking feature tracks the user lively when you
are the move aer triggering the emergency button.
• It records audio, which can be used for further inves-
tigations.
• When the battery is running low, it automatically
sends the location the pre-stored contacts.
• e second distinct feature is, it also detects the hid-
den cameras which help in our privacy.
• is device works without internet connectivity

scope
Wearable devices such as activity trackers are a good. example of the Internet of Things, since they are
part of the network of physical objects or "things" embedded with electronics, software, sensors and
connectivity to enable objects to exchange data with a manufacturer, operator and/or other connected
devices, without requiring human intervention. This project is very useful in future for an women safety.

Applicability
These are applications written in Java. Some of basic applications include a calendar, email client, SMS
program, maps, making phone calls, accessing the Web browser, accessing your contacts list and others.
If you are an average user, this is the layer you will us most, rest all layers are used by Google
programmers, developers and hardware manufacturers.

Organization of report
The remaining project is as follows

Chapter 2 is about the technology used for this

Chapter 3 introduce the software hardware requirements of the project

Consequently the project design of project is described in chapter 4

chapter 2

chapter 3
requirements nd analysis

Software faults that lead to failures differ from hardware as they are not random or the result of wear
out. They are embedded into the code either through coding errors or because of
errors/omissions/ambiguities in software requirements. In safety-critical software, which is rigorously
tested, faults are mostly due to requirement issues, and much less frequent due to coding errors.
Therefore, V&V of software requirements is at least as crucial as V&V for hardware, if not more so.

Most failures are the result of the code that has not being designed to deal with certain (mostly rare)
events: conditions and inputs. Moreover, it is in the requirements that mitigations for failures are
listed. For serious failures, multiple (redundant) mitigation strategies are required. A safety-informed
requirements V&V focuses on these types of omissions.

In order to perform a requirements review that can focus on safety-aspects of the code ALD uses the
following design products:

• System architecture
• Complete system requirements documents
• System hazard analysis and/or Fault Tree Analysis

Problem definition

The drawbacks of all these applications are able to intimate their beloved once but arethat
loved once are able to protect them from that harassment? Probably, they need toask help from
some protecting force like police, etc.; in addition, their functioning isrestricted to a particular
city or town, so our application is the only solution for thisdrawback

Requirement specification

For Requirement specification for the Information System, we created a questioner to collect the
preferences and requirement from the target users. A sample size of 25 was used, and they gave us 25
different response views. We asked them direct questions and open ended questions to know their
requirements, preferences and suggestions.

Planning nd scheduling

Based on survey responses, there are several important trends to consider for
the deployment of mobile/Internet-based interventions or communication
methods with displaced women and girls. Most often shared or borrowed
phones are owned by parents or intimate partners. If service providers are
considering ICT channels for engagement with female beneficiaries, this has a
significant impact on the types of services that can be safely offered and safe
communication methods via mobile or the Internet. For example, in considering
phone-based services, service providers can and should ask women and girls
about the way that they would like to receive the service. The service provider
should ask the women and/or girls about the time that she would like to have a
call, e.g., if she prefers to call rather than receiving a call or if she would prefer
to send a missed call to the service provider when she feels safe. Further,
applications that facilitate a user accessing online GBV counseling need to be
weighed against the likelihood of an intimate partner accessing this
information, which could result in an increased risk of harm

Software requirements

1.android studio

In this project we use android studio offers even more feature that enhance your
productivity when building android apps, such as

a. Flexible gradle based system.


b. Build variable and multiple apk file generation
c. Code template to help you build command app feature.
d. A rich layout editor with support for drag and drop theme editing
e. Lint tool to catch performance, usability, version , comp ability , and
other problem.

2. JDK(java development kit)7


3. JRE (java runtime environment)
4. Windows or linux operating system

Back end software requirement

1. PHP
2. MySQL

Hardware requirement:
1. Device with QR scanning support
2. Device with gps support
3. Device with text messaging support

Hardware support for deployment

RAM: 4GB minimum or more

Processor: intel i3 minimum or more

Disc space: 500MB for Android studio , Atleast 1gb for android SDK

Potrebbero piacerti anche