Project Completion Report
Title of the Project
Protection for women by using a portable smart
Security device
Consultant for the Project
Department of Information Technology
Agency Receiving Consultancy
Thrishicaa Softwares, Trichy
December 2021
1
Index
[Link]. Subject Page No.
1 Abstract 3
2 Introduction 4
3 Objective & Proposed System 4
4 Modules 5
5 System design specification 7
6 Software Description 10
7 Output & Screenshots 12
8 Conclusion 16
9 References 16
2
1. Abstract
Safety of Women in India has become a major issue in India now. The crime rates
against women in the country have only risen to a great extent. Women think twice before
stepping out of their homes, especially at the night. This is, unfortunately, the sad reality of our
country that lives in constant fear. Women in India have been given equal rights as men;
however, people do not follow this rule. They contribute to the growth and development of our
country; still, they are living in fear. Women are now on respected positions in the country, but
if we take a look behind the curtains, we see even then they are being exploited. Each day we
read about horrific a crime being committed against women in our country like it’s a norm.
Although the list of crimes is very long, we can take measures to ensure women’s safety in our
country. Firstly, the government must make stringent laws that ensure the punishment of
criminals immediately. Fast track courts must be set so the victim gets justice instantly. This
will serve as a great example for other men to not commit crimes against women. In short,
crimes against women are stopping the growth of our country. We must not put the blame on
women and ask them to be extra careful. Instead, we must ask the men to change their thinking
and work to make the world a safer place for women. Although the list of crimes is very long,
we can take measures to ensure women’s safety in our country. Firstly, the government must
make stringent laws that ensure the punishment of criminals immediately. Developed
application will help to rake quick action against the culprit hence reduce the crime against
women. We are focusing on building an effective, fast and reliant system to make the women
of India feel safe and empowered. Our platform will act as a 24/7 active help and companion
for women so that they don’t ever feel that they are alone in the middle of a crisis situation.
This tool has been designed in a manner that it covers the various situations a woman can be
stuck in like when she is alone or when she is in a crowded place or when she is in a public
transport. By clicking the button an emergency message will be sent to the close contacts.
Through this application, we can easily rectify and safeguard the women from being affected.
3
2. Introduction
Most of the existing systems for women security based mobile applications are concentrated on
post execution implementation like after the person was affected by the unknown person. In the
existing system the affected person was informed to their trusted persons who they are listed in their
mobile contact list. Here no intimation sent to the persons who they are all in contact list before the
harassment was happened.
In the proposed women security system the user can install our application and register with their
information and they provide their current location and set the emergency contact numbers. When the
user feels insecure somewhere they can use the alert and the voice for intimating the emergency
contacts with the help of application. Furthermore, we can automatically connect the emergency
contacts through call and also by automatically sharing the current location of the user.
3. Objective
We are focusing on building an effective, fast and reliant system to make the women of India
feel safe and empowered. Our platform will act as a 24/7 active help and companion for women
so that they don’t ever feel that they are alone in the middle of a crisis situation. This tool has
been designed in a manner that it covers the various situations a woman can be stuck in like when
she is alone or when she is in a crowded place or when she is in a public transport. By clicking
the button an emergency message will be sent to the close contacts. Through this application, we
can easily rectify and safeguard the women from being affected.
Proposed System
In the proposed women security system the user can install our application and register with
their information and they provide their current location and set the emergency contact
numbers.
When the user feels insecure somewhere they can use the alert and the voice for intimating
the emergency contacts with the help of application
Furthermore, we can automatically connect the emergency contacts through call and also by
automatically sharing the current location of the user.
4
4. Modules
Software is divided into separately named and addressable components called modules that are
integrated to satisfy problem requirements. Modularity is the single attribute of software that allows a
program to be intellectually manageable
1. User login Module
2. Information Module
3. User Module
4.1. Module Description
4.1.1 User Login Module
Login module is the interface that is designed for the main user and the contacts mentioned by
the user. User first registers by using the phone number. After registration process user enters the
contact information about her parents, siblings and friends. When the user is in a trouble the current
location and the crime details are sent to these contacts.
Fig 4.1.1: user login module
4.1.2 Information Module
This module is the core module of the application. This has a button called “Emergency
contact”. When the user is in some trouble, she can inform to her close contacts by pressing the
5
“emergency button”. During this period a message and the current location of the user is sent to her
close contacts.
Fig 4.1.2: Information module
4.1.3 User Module
In this module, the user stores the information of the emergency contacts. The user can access
the alert and voice for specifying the contact person that there is an emergency. If there is an
emergency, then the automatic call and current location will be shared through SMS.
Fig 4.1.3: user module
6
4.2 System Design Specification
4.2.1 Architecture Diagram
Fig 4.2.1: System Architecture
4.2.2 Dataflow Diagram
LEVEL 0
Fig 4.2.2: Data flow diagram Level 0
7
LEVEL 1
Fig 4.2.3: Data flow diagram Level 1
4.3 UML diagrams
4.3.1 Usecase diagram
Fig 4.3.1: Use case diagram
8
4.3.2 Class diagram
Fig 4.3.2: Class diagram
4.3.3 Sequence diagram
Fig 4.3.3: Sequence diagram
9
4.3.4 Activity diagram
Fig 4.3.4: Activity diagram
5. Software Description
5.1. Feasibility Study
A feasibility study is carried out to select the best system that meets performance requirements. The
main aim of the feasibility study activity is to determine whether it would be financially and
technically feasible to develop the product. The feasibility study activity involves the analysis of the
problem and collection of all relevant information relating to the product such as the different data
items which would be input to the system, the processing required to be carried out on these data, the
output data required to be produced by the system as well as various constraints on the behaviour of
the system.
5.2. Technical Feasibility
This is concerned with specifying equipment and software that will successfully satisfy the user
requirement. The technical needs of the system may vary considerably, but might include:
10
• The facility to produce outputs in a given time.
• Response time under certain conditions.
• Ability to process a certain volume of transaction at a particular speed.
• Facility to communicate data to distant locations.
In examining technical feasibility, configuration of the system is given more importance than the
actual make of hardware. The configuration should give the complete picture about the system’s
requirements: How many workstations are required, how these units are interconnected so that they
could operate and communicate smoothly? And what speeds of input and output should be achieved at
particular quality of printing.
Economic Feasibility
Economic analysis is the most frequently used technique for evaluating the effectiveness of a
proposed system. More commonly known as Cost / Benefit analysis, the procedure is to determine the
benefits and savings that are expected from a proposed system and compare them with costs. If
benefits outweigh costs, a decision is taken to design and implement the system. Otherwise, further
justification or alternative in the proposed system will have to be made if it is to have a chance of
being approved. This is an outgoing effort that improves in accuracy at each phase of the system life
cycle.
Operational Feasibility
This is mainly related to human organizational and political aspects. The points to be considered
are:
• What changes will be brought with the system?
• What organizational structure are disturbed?
• What new skills will be required? Do the existing staff members have these skills? If not, can they be
trained in due course of time?
This feasibility study is carried out by a small group of people who are familiar with information
system technique and are skilled in system analysis and design process. Proposed projects are
11
beneficial only if they can be turned into information system that will meet the operating requirements
of the organization. This test of feasibility asks if the system will work when it is developed and
installed.
6. Output & Screen Shots
Fig 6.1: Login page
Fig 6.2: Register page
12
Fig 6.3: Home page
Fig 6.3: Home page
13
Fig 6.4: Include voice
Fig 6.5: Success page
14
Fig 6.6.1: Sample output
Fig 6.6.2: Sample output
15
7. Conclusion
Women security application helps the women to immediately intimate about any harassment
against them to the contact person and to their close contacts. Proper intimation helps to take necessary
action. All the processes using this application simplify the entire case registration process. With the
help of this application immediate SMS and the location will shared to the contact persons through the
application. In the proposed women security system the user can install our application and register
with their information and they provide their current location and set the emergency contact numbers.
When the user feels insecure somewhere they can use the alert and the voice for intimating the
emergency contacts with the help of application. Furthermore, we can automatically connect the
emergency contacts through call and also by automatically sharing the current location of the user
8. References
G.C. Harikiran, [Link], [Link], “Smart Security solution for women based on Internet
of Things(IOT)”, International Conference on Electrical, Electronics and Optimization
Techniques, Chennai, India, 2016, DOI: 10.1109/ICCEOT.2016.775565, 3551-3554.
[Link], M. FathimaFathila, [Link], Kalaiselvi V.K.G, “A Smart Watch for Women
Security based on IoT Concept,” 2nd International Conference on Computing and
Communications Technologies(ICCCT),pp. 23-24 Feb 2017, Chennai, India.
S. A. Bankar, KedarBasatwar, PritiDivekar, ParbaniSinha, Harsh Gupta, “Foot Device for
Women Security”, 2nd International Conference on Intelligent Computing and Control System,
2018, DOI: 10.1109/ICCONS.2018.8662947, 345-347 .
16