0% found this document useful (1 vote)
76 views26 pages

Women Protection System Mobile Application: Mutharasan Ponsamy Seat Number: 3035474 Mrs. Virgin Fernando

This document describes a proposed mobile application called the Women Protection System that aims to enhance the safety of women. The key features of the app allow a user to save emergency contact numbers and send automated messages with their location to those contacts if they press the "start" button. These location messages will continue to be sent every five minutes until the user presses "stop". The objective is to develop this app on the Android platform using Java to take advantage of Android's widespread use and ability to optimize resources on smartphones.

Uploaded by

Krishna Rajan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (1 vote)
76 views26 pages

Women Protection System Mobile Application: Mutharasan Ponsamy Seat Number: 3035474 Mrs. Virgin Fernando

This document describes a proposed mobile application called the Women Protection System that aims to enhance the safety of women. The key features of the app allow a user to save emergency contact numbers and send automated messages with their location to those contacts if they press the "start" button. These location messages will continue to be sent every five minutes until the user presses "stop". The objective is to develop this app on the Android platform using Java to take advantage of Android's widespread use and ability to optimize resources on smartphones.

Uploaded by

Krishna Rajan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 26

1

Women protection system mobile


application
A Project Report
Submitted in partial fulfillment of the
Requirements for the award of the Degree of
BACHELOR OF SCIENCE (INFORMATION TECHNOLOGY)
By
Mutharasan Ponsamy
Seat Number: 3035474
Under the esteemed guidance of
Mrs. Virgin Fernando
DEPARTMENT OF INFORMATIOM TECHNOLOGY
N.R. SWAMY COLLEGE OF COMMERCE AND ECONOMICS &
SMT. THIRUMALAI COLLEGE OF SCIENCE
(Affiliated to University of Mumbai)
MUMBAI-400022
MAHARASHTRA
2018-2019 2
PROFORMA FOR THE APPROVAL PROJECT PROSPOSAL
PNR No. :2016016400998265 Roll No.: 19032
1. Name of the Students :

2. Title of the project :

__________________________________________________________________
3. Name of the Guide :

__________________________________________________________________
4. Teaching Experience of the Guide ______________________________________

5. Is this your first submission? yes No

Signature of the student Signature of the Guide


Date:_______________
Date:______________
Signature of the Coordinator
Date:__________________ 3
Women protection system mobile
application
A Project Report
Submitted in partial fulfillment of the
Requirements for the award of the Degree of
BACHELOR OF SCIENCE (INFORMATION TECHNOLOGY)
By
Mutharasan Ponsamy
Seat Number: 3035474
Under the esteemed guidance of
Mrs. Virgin Fernando
DEPARTMENT OF INFORMATIOM TECHNOLOGY
N.R. SWAMY COLLEGE OF COMMERCE AND ECONOMICS &
SMT. THIRUMALAI COLLEGE OF SCIENCE
(Affiliated to University of Mumbai)
MUMBAI-400022
MAHARASHTRA
2018-2019
N.R. SWAMY COLLEGE OF COMMERCE AND ECONOMICS &
SMT. THIRUMALAI COLLEGE OF SCIENCE
(Affiliated to University of Mumbai)
MUMBAI-MAHARASHTRA-400022
DEPARTMENT OF INFORMATION TECHNOLOGY 4
CERTIFICATE
This is to certify that the project entitled, "Women Protection System Application", is bonafide
work of Mutharasan Ponsamy bearing Seat No : (19032) Submitted in partial fulfillment of the
requirements for the award of degree of BACHELOR OF SCIENCE in INFORMATION
TECHNOLOGY from University of Mumbai.
Internal Guide Coordinator
External Examiner
Date: College Seal 5
ABSTRACT
The proposed project has new creative features additionally added to the existing apps features
since the protection apps in play store plays the same role of sending alert messages to trusted
contacts and nearest police station in some of the well-known apps which is an main role of the
self/women security apps.
The additional features to be added in the proposed project is to provide an proper customized
user interface for good user interaction and feedback of user and to provide paid features with the
freemium apps to encourage usage of application these comes under cost and presentation of an
application developed and self-cyber security guides like spyware adware to protect them from
illegal hacks and attacks as well as proper cab guidance. 6
ACKNOWLEDGEMENT
We sincerely wish to thank our project guide Mrs. VIRGIN FERNANDO for her ever
encouraging and inspiring guidance helped us to make my project a success. My project guide
made me endure with her expert guidance, kind advice and timely motivation which helped us to
determine about our project.
I also express my deepest thanks to our Head of our IT Department Mrs. RANI helped us by
making available the computer facilities for my project in the laboratory and thus contributing
towards its success. Without his kind and keen co-operation, mine project would have been
stifled to standstill.
I also give special thanks to class in charge Mrs. SUCHITA who greatly influenced my mind
during design of system and made me think deeper into it. As an outcome of this support, I able
to produce the best result of it. 7
DECLARATION
Content
I hereby declare that the project entitled, “Women Protection System Application” done at
place where the project is done, has not been in any case duplicated to submit to any other
university for the award of any degree. To the best of my knowledge other than me, no one has
submitted to any other university.
The project is done in partial fulfillment of the requirements for the award of degree of
BACHELOR OF SCIENCE (INFORMATION TECHNOLOGY) to be submitted as final
semester project as part of our curriculum.
Name and Signature of the Student 8
TABLES OF CONTENTS
1.1 Background ..................................................................................... Error! Bookmark not defined.
1.2 Objectives ....................................................................................... Error! Bookmark not defined.
1.3Purpose and Scope ................................................................................. Error! Bookmark not
defined.
1.3.1Purpose ........................................................................................... Error! Bookmark not defined.
1.3.2Scope............................................................................................... Error! Bookmark not defined.
Chapter2:SYSTEM ANALYSIS .................................................................... Error! Bookmark not
defined.
2.1Existing System ..................................................................................... Error! Bookmark not
defined.
2.2Proposed System .................................................................................... Error! Bookmark not
defined.
2.3Requirement Analysis ............................................................................ Error! Bookmark not
defined.
2.4Hardware Requirements ........................................................................ Error! Bookmark not
defined.
2.5Software Requirments ........................................................................... Error! Bookmark not
defined.
2.6Justification of Selection of Technology ............................................... Error! Bookmark not
defined.
Chapter3:SYSTEM DESIGN ......................................................................... Error! Bookmark not
defined.
3.1Module design ....................................................................................... Error! Bookmark not
defined.
3.2Data dictionary ....................................................................................... Error! Bookmark not
defined.
3.3ER diagram ............................................................................................ Error! Bookmark not
defined.
3.4DFD diagram ......................................................................................... Error! Bookmark not
defined.
3.5UML Diagrams ...................................................................................... Error! Bookmark not
defined.
3.5.1Class Diagrams ............................................................................... Error! Bookmark not defined.
3.5.3Activity Diagrams ........................................................................... Error! Bookmark not
defined.
3.5.4State Chart Diagrams ...................................................................... Error! Bookmark not defined.
3.5.5Sequence Diagrams ........................................................................ Error! Bookmark not defined.
3.5.2Use Case Diagrams ......................................................................... Error! Bookmark not defined.
9
Chapter 1
INTRODUCTION
1.1 Background
Women are accomplished at mobilizing diverse groups for frequent causes. They often work
across racial, sacred, opinionated, and intellectual divides to encourage tranquillity. We are aware
of importance of women's security, but we must recognize that they should be well secured. A
Woman is not much powerful when compared to men physically, in a crisis situation and needs a
helping hand to relieve them. The best way to minimize chances in becoming a victim of violent
crime (robbery, sexual assault, rape, domestic violence) is to identify and call on resources to
help you out of unsafe situations. Whether you are in instant trouble or got separated from friends
during night and do not know how to get home, having these apps on your phone can diminish
your risk and bring assistance when you require it. In the light of recent outrage in Delhi which
shook the nation and woke us to the safety issues for our daughters, public are gearing upbeat in
different ways to fight back.
A swarm of new apps have been developed to provide security systems to women on their
phones. Here, we introduce an android app that ensures the safety of women. It reduces the risk
and helps us in need by identifying the location of person who is in danger. The key features of
our app that makes it different from other apps designed till now are as follows:
I I. Initially, we have to enter the four contact numbers of police, family members and
friends in to the application say and click on “save” button.
II II. While travelling, run the application and whenever need arises, click “start” button.
III III. As soon as “start” button pressed, it firsts make a call to the first saved registered
contact number and also sends the message containing location URL of the victim to all the
contact numbers.
IV IV. Unique feature of this app is message with location URL is sent continuously to the
registered contact numbers for every five minutes until “stop” button is clicked. So, continuous
location tracking of victim is possible with this application.
10
1.2 Objective
Android is the most widely used mobile OS motorised by Linux kernel. This is the first
complimentary platform which is robust and is expected to gain much popularity. It was
developed by Google team and allows writing managed code in the Java language. The current
system is developed on the basis of android platform. Android utilizes a custom virtual machine
that was designed to optimize memory and hardware resources in a smart phone. Android does
not differentiate between the phone’s core applications and third-party applications. Any
application that is built will definitely have equal access to a phone’s capabilities providing users
with a broad spectrum of applications and services
1. To provide safe options and services for women and their children affected by domestic and
family violence.
2. To use knowledge, evidence and innovation to enhance services to women and their children.
3. To develop partnerships that contributes towards the elimination of domestic and family
violence.

A mobile app or mobile application is a computer program designed to run on a mobile device
such as a phone/tablet or watch.
Mobile applications often stand in contrast to desktop applications which run on desktop
computers, and with web applications which run in mobile web browsers rather than directly on
the mobile device
As nowadays mobile is an handy device with each an every individual especially womens ,girls
,teenagers which is mostly used by the current generation for entertainment or spending time on
social media just by sharing the warning messages and other entertaining stuffs which uses much
of our storage space and data usage per day for self entertainment ,we store ample types of
applications like instagram,watsapp, facebook etc we must also store an security category types
application which is an essential and must use apps which are available in the playstore since it
provides the safety measures for the insecure victims in the danger situations by just triggering
the push buttons which passes the acknowledgement to the trusted contacts and 11
the nearest police station with the alert messages and the proper and accurate GPS location
details.
1.3 purpose and scope
1.3.1 purpose
1.3.2 scope
1.3.3 applicability
1.4 achievements
1.5 organisation report
Chatpter 2
Survey of technologies
Chapter 3
SYSTEM ANALYSIS
3.1 problem definition
3.2 EXIXTING SYSTEM
VithU App:This is an emergency app initiated by a popular Indian crime television series
“Gumrah” aired on Channel [V]. In this app when the power button of the Smartphone is pressed
twice consecutively, it will begin sending out alert messages with a link to the location of the user
every two minutes to the contacts fed into the app.
Life360 Family Locator AppLife360 is a multipurpose app to stay in touch with your family
members and friends and keep a handle on their location. The app lets you create circles, add
people to them and see their locations on a confidential map. This way you’ll be able to 12
always keep track of your family members and confirm that they’re safe and sound. You can
share your location with them, or send an alert to your circle members. You can even chat with
your circle members for free. As a bonus, you can also use this app to recover your lost or stolen
phone.
I’m Shakti AppThe I’m Shakti (IMS) app is one that aims to help keep you in control of your
“Shakti” (power in Sanskrit). To reach your emergency contact, press the power button 5 times
(in 2 seconds) to trigger the app. A preset emergency SMS will be sent along with your GPS
location.
3.2.1 LIMITATIONS OF EXISTING SYSTEM
1) Most of the apps are functional only when mobile carrier network is there. And if there is no
network the apps are completely useless

2) Whenever a person is attacked, he or she doesn’t have enough time to act. Sometimes fear
doesn’t allow to take them the required action instantly. In instant attacks, there is no time to use
the apps.

3) Again the security apps can be used when the battery is charged, and most of the times people
don’t pay any attention to it.
13
4) The security apps can send the signal only when women use the apps. After attack, it might not
be possible for anyone to keep using the mobile apps

5) Bad user interface of the application is provided by the developer since the main motive is to
send only alert

6) The majority of the application is only for sending alert at the time of victim is attacked or in
danger

7) The alert or safety measures is not possible to act if the handset is lost or any functionality
physical repair

8) There is no safety guide to use handset with proper privacy encryption to protect data, since
protecting women is not only protecting women from any physical approach

9) Since majority of the apps in the playstore is free version the apps get diverted to unwanted
adds which interrupts the performance of app as well as device

3.3 planning and scheduling


3.4 PROPOSED SYSTEM
The propsed project has new creative features additionally added to the exisiting apps features
since the protection apps in playstore plays the same role of sending alert messages to trusted
contacts and nearest police station in some of the well known apps which is an main role of the
self/women security apps.
The additional features to be added in the proposed project is to provide an proper customized
user interface for good user interaction and feedback of user and to provide paid features with the
freemium apps to encourage usage of application these comes under cost and presentation of an
application developed.
The feature adding or screening to be an different than the other existing projects in the playstore
is to generate alert messages without usage of internet connectivity which will obviously reduce
the battery usage and connectivity issue since is using the GSM module for 14
connection establishment. The best and must needed feature is self-cyber security option which
will reduce the cyber-crime like hacking mms scandals, blocking untrusted sites usage and by
privacy protection since all these functions needed to be enabled by different apps the mobile
storage is in high usage and more over this app also provides family circle gps location live which
is also an protection option for students, working youngsters etc
The above mentioned features were additional features and the main function of the app is
Android app constantly monitors the connection between mobile and connectivity. When mobile
received signal after trigger function app will fetch the current gps location and emergency
message to predefined numbers using sms method. When connection is broken then app will
generate alert command and send last recorded gps location to predefined numbers.
If unintentional person want to switch off mobile to remove the communication medium, app will
display any wrong message,
Example. “Do you really want to switch off your phone?”
The right answer for this is no to switch off phone, which is only known to user of that phone but
as obvious answer is yes, that unintentional person will say yes. Because of this before switching
off, mobile will send current location via sms without knowing to that unintentional user saying
“I am in danger please follow my gps location”.
3.4.1 FEATURES
1. Less chances of creating fake app since registration will validated by authorized identify proof.
2. Family circle live gps location view.
3. Adware, spyware, malicious block option for self-cyber security precaution .
4. Cab option with good review cab drivers for safe travel.
5. Safety measures in case of mobile battery low or any type of physical damage repair.
6. No frequent add popups.
7. Smart gestures to trigger the alert messages.
8. Safe direction guide while travel.
9. Acknowledgement before entering or travelling into an out of service zone to keep in live
interaction.
15
10. Nearest police station alert for quick safety measures. 3.4.2 ADVANTAGES OF
PROPOSED SYSTEM



Location-based tasks for any circle member








3.5
REQUIRMENTS ANALYSIS

3.6 requirment specification


3.6.1 SOFTWARE REQUIRMENTS
The front end software requirments
• • Android studio

In this project we used Android studio offers even more features that enhance your productivity
when building Android apps such as
• a) A flexible gradle based system
• b) Build variants and multiple apk file generation
16
• c) Code templates to help you build common app features
• d) JDK kit
• e) JRE(java runtime environment)
• f) Windows or Linux operating system

The back end software requirments


• • PHP

• • MYSQL 3.6.2 HARDWARE REQUIRMENTS


• • Device with GPS support


• • Device with texting support

3.6.3 HARDWARE REQUIRMENT FOR DEPLOYEMENT


• • RAM : 4 GB or more
• • PROCESSOR : INTEL i3 processor

• • Diskspace : 500 GB 3.7 PLATFORM JUSTIFICATIONS


The supported Operating system for client include


• • LINUX
• • WINDOWS

Windows and Linux are two of the operating systems that will support comparative
applications.Windows is a meta family of geographical operating systems developed consists of
several families of operating systems.The project is developed on windows but also compatible
with linux too. 17
Chapter 4
SYSTEM DESIGN
4.1 MODULE DIVISION
User data storing module
• • Login:

The user needs to enter the login credentials into the web interface
• • Add/modify :

The user can add or modify the details like contact, email etc of the trusted
persons(friends/parents)
• • Adding/modifying an wrong display message:

Example: if the mobile is tried to switch off intentionally by any stranger


The message will be displayed (do you really want to switch off device the answer will be” no
“but this will be only familiar to the user the stranger will press “yes “ the rest alert will be
forwarded automatically to trusted persons)
• • View trusted persons list:

Views the list of added trusted persons


• • Forgot password:This is an recovery option by an developer to user incase if the user
forgets the login credentials
18
4.2 data dictionary
4.3 E-R DIAGRAM 19
4.4 dfd diagrams
DATA FLOW DIAGRAM
LEVEL0:
LEVEL1: 20
LEVEL2:
TRIGGER ACTION
SET GPS LOCATION
USER
SEND ALERT SMS
4.5 UML DIAGRAMS
4.5.2 USE CASE: 21
3.5.1 CLASS DIAGRAM 22 23
/////3.3.4 COMPONENT DIAGRAM
/////3.4.5 DEPLOYEMENT DIAGRAM 24
4.5.3 ACTIVITY DIAGRAM 25

///////4. FLOWCHART 26

You might also like