Professional Documents
Culture Documents
Roject Pproval: D C S S E
Roject Pproval: D C S S E
Roject Pproval: D C S S E
PROJECT APPROVAL
By:
Hira Danish
Somia Anjum
Mahnoor Muzammial
Approval Committee:
___________________________
Name: Ms Ummay Faseeha
Designation: Assistant Professor
___________________________
(Internal Advisor)
___________________________
(Head of the Department)
i
Abstract
ABSTRACT
Providing safe and secure environment to the humanity is one of the biggest challenges.
People are not safe roaming around whether it is day or night especially for girls and
women; they don’t find them safe anywhere. To address the security and safety issues,
an android based security application is proposed for women. The application will be
started with utmost ease by clicking on the tab situated in the alert button which
identifies the location through GPS/GSM network and alert through SMS containing
geographical coordinates to the listed contacts and also auto dial a call to the listed
contact for the help in case of dangerous situation.
Our framework will be founded on a GPS and GSM based "ladies security
framework", which give alarms and messages on tapping the button on the cell
phone. At whatever point, if somebody is in a tough situation they probably won't
have so much time, all that they need to do is tap the portable. Our framework gives
a feasible, financially savvy answer for issue recognition (Khir, 2015) [1].
Presently a days on account of as of late happened cases like assault by drivers or
associates, thievery and so on. Ladies security, particularly ladies security has
become the premier need of the planet. Framework utilizes the Global Positioning
System (GPS) innovation to discover the area of ladies. The data of ladies position
gave by the gadget are frequently seen on Google maps utilizing Internet. The
salient feature of this application is a panel of emergency numbers which responds on
the spot. Live tracking via SMS help to locate a person swiftly and can be rescued
without harm.
ii
Table of Contents
TABLE OF CONTENTS
ABSTRACT ................................................................................................................................................ ii
ACKNOWLEDGMENT............................................................................................................................. viii
iii
Table of Contents
2.6.3 RELIABILITY.......................................................................................................................... 7
iv
Table of Contents
4.3.1 MS WORD............................................................................................................................ 16
CHAPTER 6 METHODOLOGY............................................................................................................... 30
v
Table of Contents
8.1 INTRODUCTION........................................................................................................................... 35
8.2 OBJECTIVES................................................................................................................................ 35
CONCLUSION ..................................................................................................................................... 41
APPENDIX A ........................................................................................................................................... 41
GLOSSARY .......................................................................................................................................... 41
REFERENCES .......................................................................................................................................... 45
vi
Table of Figures
TABLE OF FIGURES
vii
Acknowledgment
ACKNOWLEDGMENT
Firstly we would like to thank Almighty who has given us a wonderful Department who
is always behind us no matter what situation it is. He is the one who is showing us the
right direction to follow noble path of kindness.
We wish to express our sincere thanks to our chairperson (Ms Narmeen Bawany),
internal advisor (Ms Ummay Faseeha) and all Final year project committee teachers,
for their patience, enthusiasm, intuitive comments, invaluable suggestions, helpful
information, practical advice and unceasing ideas which have helped us tremendously
at all times in our project. Their immense knowledge, profound experience and
professional expertise in IT field has enabled us to complete our project successfully.
We are thankful to them for their precious time in guiding us, answering our queries,
correcting and improving the skills in our project. Without their guidance and relentless
help, this project would not have been possible.
viii
Project Overview
1
2. Second module are the registered contacts that can be either police or friends
which gets the alert containing URL of location an emergency SMS and a
call of victim that's sent from the root device.
2
Software Requirement Specification (SRS)
2.1 PURPOSE
While facing a potential dangerous circumstance, for example, seizing, robbing or even
theft, the user has next to no delay to think about the most ideal approach to escape
from the circumstance. However, mentioning for help is the most moment strategy for
the user to consider during the basic circumstance. Considering quick worry of
wellbeing issue, mobile applications execution might be reached out into individual
security procedures.
This proposed system is to acquire positive ramifications to the general public the issue
of mentioning for help during emergency circumstances (Kavita Sharma, 2016) [2].
Victim will encounter a more effective and quicker method for help by utilizing this
application as it executes to least technique for help mentioning by utilizing smart
phones.
3
Software Requirement Specification (SRS)
A user can register their contacts by accessing the contacts in the phone.
CURRENT MAP
A user will be having a map in which she can get the way to the nearest police
station.
EMERGENCY ALERT
A user will be having a panel in which she can call the given emergency
numbers on tap for the rescue operations.
ALERT NOTIFICATIONS
4
Software Requirement Specification (SRS)
compared to men in a society. They can’t even walk alone through a busy street or
through a park freely without any care because of security issues and the increasing
numbers of crimes reporting, they always are in need of man who protect them.
5
Software Requirement Specification (SRS)
2. 4 SYSTEM FEATURES
2.4.1 REGISTER CONTACTS
A user can register their contacts by accessing the contacts in the phone.
6
Software Requirement Specification (SRS)
2.6.2 USABILITY
The interface of mobile application must be accessible for every user rather than
intimidating and frustrating; it must be easy to use. As we have design it very simple
keeping the design principles in mind.
2.6.3 RELIABILITY
Smarillance must be reliable under load. It should not stop working when used in
real environment.
2.6.4 LEARNABILITY
The system will be easy to learn for user by its consistent and simple user interface.
2.6.5 MAINTAINABILITY
The data used at the back of the system must be maintained and updated time to time.
7
Software Requirement Specification (SRS)
2.7.2 EXTENSIBILITY
Smarillance will be extensible so that the changes should be made without causing any
side effects and disturbance in its smooth working.
2.7.3 TESTABILITY
Smarillance have a modularize structure so that testing and debugging could easily be
done to monitor system behavior at different conditions.
2.7.4 INTEGRITY
The system integrity or security must be followed. Smarillance would be free from any
sort of viruses, privacy and data loss threats.
2.7.5 INTEROPERABILITY
Smarillance will be interoperable. Its modules should communicate well for data sharing
If needed.
8
System Analysis and Design
In the following relational diagram, we have three related entities, User, person
and Admin. To understand the relationship better we define the each entity.
User and person these two entity has one to many relationship as one person can
track many users.
Admin entity has one to many relationship because Person, and user has one admin
to manage all the activities of user and person.
Admin and person these two entity has one to many relationship as admin can send
many notification alerts to the user.
9
System Analysis and Design
In the above 1st use case diagram there is a user who can register, login and
can register the contact .After this she can send alert and can find herself too
police station. The second actor named person can interact with remaining
use cases .An emergency manage receiver can receive emergency call and
track the location.
Now in the above diagram there is only Admin. An admin can add user,
remove user and can send notification to the user.
10
System Analysis and Design
11
System Analysis and Design
12
System Analysis and Design
In the following Entity Relationship diagram, we have three related entities, User,
Person and Admin. To understand the relationship better we define the each entity.
User and person these two entity has one to many relationship as one user can track
many person.
User and route these two entity has one to many relationship as one user mange
many routes.
Admin entity has one to many relationship because Person and user has one admin
to manage all the activities of user and person.
Admin and person these two entity has one to many relationship as admin can send
many notification to the user.
13
System Analysis and Design
Level-1 DFD explains that the user will first register the contact and on emergency
situation the user will send alert consisting of emergency message, current location
and call. So that the person can manage and rescue the user. We are also having the
current location and the help panel in our system.
Admin can delete and the user and can also send the alert to users.
14
Tools and Technologies
4.1.2 FIREBASE
Firebase is a mobile and web application stage that give engineers plenty of
administrations to help in growing excellent applications. The Firebase Real-time is
cloud-facilitated NoSQL information base that lets designer to store and matchup
between the users progressively. Mobile apps need a backend. They store settings &
data and generate statistics. Our whole Admin panel is being developed on the firebase
which will monitor the activity and keep the credentials private of every user.
4.1.6 JAVASCRIPT/ES6
JavaScript is used for dynamic web content and making website responsive.
4.1.7 XAMMP
XAMPP is a product distribution which gives the Apache web worker, MySQL data
set, PHP and Perl (as order line executables and Apache modules) across the board
bundle. It is accessible for Windows, MAC and Linux frameworks. XAMPP is utilized
to run the pages of site. It is utilized to run the site on server.
15
Tools and Technologies
4.2.2 PHOTOSHOP
We used PHOTOSHOP for making the poster of ours. We create our project logo
through Photoshop and making pamphlet for publicity of our project which defines the
purpose of our system and where mention the features and functionalities of our project.
And design a business card for users so they can contact us through email and phone
number.
4.2.3 JQUERY
JQuery is used for website to make it more interactive and attractive. It is also used to
add effects and animation in the website.
16
Tools and Technologies
17
User Interface Design
This is the Dashboard that how many users have used the application.
18
User Interface Design
19
User Interface Design
This is the user report that shows how many users are registered in the application.
20
User Interface Design
21
User Interface Design
Login page
22
User Interface Design
23
User Interface Design
Alert would be send on hitting this This is the help panel where the user
alert can call
24
User Interface Design
This is the current location of the user, This is the alert which we get by the
she can get to the nearest police station. admin.
25
User Interface Design
26
User Interface Design
27
User Interface Design
28
User Interface Design
29
Methodology
Chapter 6 METHODOLOGY
As from the start when we select the approach scrum Smarillance was in a
working state so it reduces the risk of failure which help us to improve the
product with certain increment and timely changes
30
Methodology
31
Implementation
Chapter 7 IMPLEMENTATION
32
Implementation
33
Implementation
7.6 DEPLOYMENT
Provide the Android Application on play store and Host Web services for Customized
Application on request on Google.
34
Testing
Chapter 8 TESTING
8.1 INTRODUCTION
Smarillance application is tested to ensure that its quality under test is in line with the
requirement of the target market i.e. ladies. Software testing is carried out in a
systematic manner with the intent of finding defects in a system. It is required for
evaluating the system. To evaluate each aspect different types of testing are conducted.
8.2 OBJECTIVES
The objective of the testing is finding as many software defects as possible; that can
be occur when user use Smarillance and ensure that the Application is bug free before
a user uses it. Create the hypothesis and test case to make sure that each scenario is
defect free.
35
Testing
36
Testing
37
Testing
38
Testing
39
Testing
It shows the message alert has been It shows on opening the URL of the
received by the registered current location of the user can get
and can be safely rescued. For this
purpose Google Map is used for the
Figure 5.5.3User Alert exact direction
It shows the URL of the current
It shows on opening the URL of the location of the user and she can be
current location of the user can get safely rescued. For this purpose
and can be safely rescued. For this Google Map is used.
purpose Google Map is used for the
exact direction
CONCLUSION
This is the "Android Application for ladies security framework" which is helpful
application, essentially for young lady's safety. At the point when we feel that we are
in critical situation, for example traveling alone in the Auto/Cab at night we can use
this application, so that on a click we can send our area to our loved ones and to any
authority [5] (Dey, 2017). This application has a future scope as well as it can be
integrated with the regional cops. It can also be developed on the IOS and windows
platform. Thus, the application will be really helpful for every women who is present
anywhere.
APPENDIX A
GLOSSARY
Actor: A user interacting with the system.
Admin: A person who manages the web application.
Authorize: To allow or give official permission to someone to do something or
allow user to perform their task.
Help: The user can send emergency call to the authorities on one tap.
Notification: The action of notifying someone or something. In system term,
the system notify registered contacts.
One to one alert: A process of sending and receiving messages.
Track: The registered contacts will track the user.
Vulnerable area: An area which will be highlighted by the admin.
41
Appendix A
TURNITIN REPORT
42
Appendix A
43
Appendix A
44
References
REFERENCES
Dey, T. (2017). Advanced women security app: We’RSafe. Howrah: IIETA.
Harikiran, G. C. (2016). Security solution for women based on internet of things.
Chennai,India: IEEE.
Kavita Sharma, A. M. ( 2016). Android Application for women security. Indore,India:
International Journal of Advanced Research in Computer Engineering & Technology
(IJARCET).
Khir, M. S. (2015). Emergency Push Notification Mobile Application. PERAK: utpedia.
Yarabothu, R. S. (2015). Abhaya, An Android App for the safety of women. Vadlamudi:
Research gate.
45