Application for Women Safety
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 3
Abstract
Abstract: This project presents an alert system for Women safety detection using common commerciallyavailable electronic devices to both detect the problem and alert authorities. We use an Android based smartphone with an integrated features that alert and provide location based information to alert authorities. Datafrom the application is evaluated with several threshold based AES algorithms and position data to determine aproblem.Our system provides a realizable, cost effective solution to problem detection using a simple graphical interfacewhile not overwhelming the user with uncomfortable sensors. Problem is very powerful software especiallydeveloped for the safety of girls, whenever some body is in trouble they don’t have to sit and find contacts orfind ways to send short message service, or message the near ones. They might not have so much time.. All thatthey have to do is shake the smart phone above the threshold value, vigorously. Immediately a message alert issent to the person’s mom, dad and whoever they wish to, if their guardians also have a smart phone. Eventhough if it is in silent mode. When a message called alert is received it automatically changes its profile togeneral, and gives a message notification YOUR DAUGHTER IS IN TROUBLE PLZ HELPS…. PLZ HELP….PLZ HELP…. REPEATEDLY AS A message until they seen and stop it..Now a day security of women is becoming very poor and the need for this kind of this application is steadilyincreasing work wise, we will develop a routine schedule based mechanism to monitor the women’s securityusing GPS (Global Positioning System), GPRS (General Packet Radio Service), etc.…
Authors and Affiliations
S. Sangeetha , P. Radhika PG Scholar,
Mining Frequent Patterns on Object-Relational Data
Abstract : Data mining is viewed as an essential part of the process towards knowledge discovery. Through data mining process different kinds of patterns that is frequent pattern and others, are discovered, evaluated and...
Wireless Controlling Of Remote Electrical Device Using Android Smartphone
Abstract: Controlling the home appliances and electronics gadgets wirelessly through SmartPhone technology can be more easy. That is, through this paper, we target to control a light emitting device (LED) from any...
Survey on Security Vulnerabilities in Cloud Computing Environment
Abstract: Cloud Computing holds the potential to eliminate the requirements for setting up of high-cost computing infrastructure for IT-based solutions and services that the industry uses. Cloud services are becoming an...
I-ViDE: An Improved Vision-Based Approach for Deep Web Data Extraction
Abstract: Deep Web contents are accessed by queries submitted to Web databases and the returned data records are enwrapped in dynamically generated Web pages (they will be called deep Web pages in this paper). Extr...
Implementation of Various Cryptosystem Using Chaos
Cryptography is the science of secret codes, enabling the confidentiality of communication through an insecure channel to make the system more complex and robust Chaos is applied in the various cryptographic a...