A Mobile Based Women Safety Application (I Safe Apps)
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 1
Abstract
Abstract: Many unfortunate incidents have been taking place in woman’s case. Problems may come from anydirection such as women walking on the road after the work, going to super market or many other reasons forwhich they go alone. People at home are not sure of their return safely. Another factor is woman die withoutknowing the reason as they attend excursions and industrial trips conducted by the organizations. It happensdue to attacks on woman but not suicides. In 2013 there happened an incident which is a gag rape in New Delhiin the case of 23 year old woman in bus at 9:30 PM. Another incident that has taken place at Mumbai in thecase of woman who is leaving her native place after Christmas holidays has been kidnapped and killed. Theseare some of the problems that have taken place in the day to day life of women. In order to overcome suchproblems faced by women the I Safety (women security apps) mobile based application is not only necessary touse but also plays a pivotal role with android software.
Authors and Affiliations
Dr. Sridhar Mandapati , Sravya Pamidi , Sriharitha Ambati
A Novel Methodology of Fuzzy Logic Controller for ADynamically Interconnected Electric Power System
Abstract: This paper presents a novel methodology for designing a fuzzy controller for a dynamicallyinterconnected electric power system. One controller with constant gains for different operating points may notbe...
Web Usability Recommendation Model: An Approach to Enhance Web Usability
Abstract: The success of any business mainly e- business is mostly depends on its website. To attract and sustain web users is one of the biggest challenges for any e-business. Web Usability plays key role to retain web...
Penetration Testing for Android Smartphones
One major challenge faced by Android users today is the security of the operating system especially during setup. The use of smartphones for communication, social networking, mobile banking and payment systems ha...
Corporate Policy Governance in Secure MD5 DataChanges and Multi Hand Administration
Abstract: Policy based management is an administrative approach that simplify the management of a givenendeavor by establishing policies to deal with situation that are likely to occur. Most of the social network andmobi...
Privacy-Preserving Public Auditing For Secure Cloud Storage
Abstract: By using Cloud storage, users can access applications, services, software whenever they requires over the internet. Users can put their data remotely to cloud storage and get benefit of on-demand services...