Вы находитесь на странице: 1из 20

INRODUCTION

In day to day life the most important Gadget is a smart phone so using a smart phone for our Safety is
efficient and Now - a - days it difficult to go alone outside because of listening or reading about all
those threatening news like kidnapping, chain snatching, robbery, etc. All these threats happen in our
society which makes us feel more unsafe. There are many incidents that have outraged the entire
nation and have awakened us for the Safety issue and many application have been developed for
security of women.
We have developed an app called Police online Application (POLA) which is not only for women but
also for the Safety of each and every citizen of our country using Smartphone’s. The uniqueness of
this app is that it’s for every single person who uses a Smart phone in this era. So basically we have
developed two online applications. One for the user and the other one for the police department. The
name of User App is "Threat" and the app of police department is "POLA". Calling 100 and informing
the police department about the crime or threat is time consuming and due to that the response time to
the threat is increased and there are chances of some serious crime taking place in between that time
span. The app for civilian is ‘THREAT’. We have to install this app in our smart phones and then we
have to register or sign in first, then once it's installed we can use it. After the registration there is a
“GO” button in it, if we press it the location notification will be sent to the police app called POLA.
This App which the police department will use consist of map through which the police will track the
user. Basically when the threat notification will be sent and if the nearby patrolling car of cops accepts
the notification, then they will be able to track the victims location.
For example: if a girl / boy is going somewhere and he/she feel like someone is stocking him/her from
a long time and he/she feels unsafe so instead of getting afraid he/she have to just open the threat app
and press the “GO” button and their location will be sent to the “Police Online Application” and by the
location the police will track him/her. Moreover in our app when the user press the "Go" button the
location of the user is been sent to the nearby police patrolling cars, or we can say in the specific
locality so whichever police car is nearby will open the location notification and will reach the place
of victim/users who needs help.
We have tried to reduce the time taken by the user to dial 100 and then register the complaint so that
they will respond.

1
1.1 Problem Definition

Nowadays crime rates are increasing at high level like kidnapping chain snatching, robbery etc.
The police authorities are informed by dialing 100 and by the time they reach us its usually too late so
to overcome this issue we have developed POLA [Police Online Application].

1.2 Objective

The objective is to reduce the threat and crime rate. This application is to help the police
department and the civilians that will be effective for communicating with the law, enforcement and
police department in a case of serious threat issues caused to the civilians. This application will reduce
the response time taken by the police department to any threat.

2
LITERATURE REVIEW

 Abhaya: An Android App For The Safety Of Women, DOI:


10.1109/INDICON.2015.7443652 Conference: 12th IEEE India International
Conference, Electronics, Energy, Environment, Communication, Computer,
Control, (E3-C3), At Jamia Millia Islamia, New Delhi, INDIA

We have read the paper where they explained that In today's world, people using smart phones have
increased rapidly and hence, a smart phone can be used efficiently for personal security or various
other protection purposes. The heinous incident that outraged the entire nation have waken us to go for
the safety issues and so a host of new apps have been developed to provide security systems to women
via their phones. The Abhaya, an Android Application for the Safety of Women and this app can be
activated this app by a single click, whenever need arises. A single click on this app identifies the
location of place through GPS and sends a message comprising this location URL to the registered
contacts and also call on the first registered contact to help the one in dangerous situations. The unique
feature of this application is to send the message to the registered contacts continuously for every five
minutes until the “stop” button in the application is clicked. Continuous location tracking information
via SMS helps to find the location of the victim quickly and can be rescued safely.

 Vaijayanti Pawar, Prof.N.R.Wankhade, Dipika Nikam, Kanchan Jadhav, Neha


Pathak, “SCIWARS Android App for Women Safety,” Vaijayanti Pawar et al Int.
Journal of Engineering Research and Applications, www.ijera.com, ISSN: 2248-
9622, Vol. 4, Issue 3(Version 1), March 2014, pp.823-826.

In this paper we studied that in continuously upgrading world, women belief in their self-worth. They
have the same participation like men in almost every sector of life. But lives of women have become
so vulnerable these days. Security of their lives is one of the burning questions. Everywhere they have
to face unwanted incidents. Considering all the incidents towards female, this idea of Bluetooth
security device aligned with an android mobile application came in consideration. During crisis,
women just to press button from that security device and an automatic message of the victim's location
information will be sent to selected numbers through the application. An automated message will also

3
be sent to the nearest police station. Moreover a voice call will be sent to the first number of contact
list.

 Android App Developed by People Guard LLC, 24 September, 2013,”STREET


SAFE”, https://jezebel.com/5895916/the-street-safety-app-for- proactive-and-
paranoid-woman

We read that in this project presents a versatile security and alarm system which can be used by
individuals, corporations and establishments which require a cheap but reliable security system. The
idea behind this project is to provide its users with a simple, fast and reliable way to get help during
emergency situations. The device can be placed at any remote location which can be easily accessed
by the user. It uses a microcontroller for system control, GSM technology for communication and
sends SMS containing the emergency message and the GPS location of the sender. The project
consists of an 8-bit microcontroller ATmega16, GSM SIM900A module and two Android applications
for user interface with the hardware. One of the applications configures the device. On pressing the
panic button, the emergency contact receives the emergency message along with the GPS location of
the sender. The device can be used anywhere irrespective of the place of deployment provided mobile
network connectivity is available.

4
METHODOLOGY

3.1 Flow Chart

Fig. 3.1 Flow diagram of working of POLA

Figure 3.1 shows the working of POLA that how it will send the threat notification to police
application with the current location of the victim by pressing the go button after the button is pressed
the notification will go to the police application and if he/she accepts the threat then he will be able to
track the victim.

5
3.2 Block Diagram

Fig. 3.2 Block Diagram of POLA

Fig 3.2 shows the block diagram of the application that how it actually works. The app once
started need the GPS permission from the user so that it can fetch the current location of the device
which will be later used for tracking. The application needs to be connected to the internet because it is
necessary to use the GPS. Then once the current location is fetched it will be used by the google maps
API to track the location of the threat.

3.3 Algorithm

The easiest way to explain Dijkstra's algorithm is probably with an example. Take the graph below,
where the numbers given are the weights of each connection. (A weight could be a simple distance or
really any relative cost associated with traversing a particular connection that we're seeking to
minimize.). To start, we assign s, our starting position, the value 0. It takes 0 miles (or whatever) to get
here because it's the beginning position. Next, we look at the neighboring nodes of s, which we can
imagine as a sort of frontier to be explored.

6
In the first iteration, we look to the closest node, which is 1 unit away. We assign a label to the node
with that value, a, and look onward at the next frontier nodes and their respective distances. b is 1
away (2 from the beginning), c is 2 away (3 from the beginning), and we also have d, which is 2 from
the beginning. Since we're after the shortest path from the beginning, we're forced to move to d from s
(2 units), and we assign a value of 2 to d. On the next iteration of the algorithm, from d we look ahead
to c, which is 10 away (12 from s), but we also look again from our outpost at a, where we can still get
to c in 2 (3 from the beginning) and b in 1 (2 from the beginning). We set up our next outpost at b and
assign it a label of 2 (2 moves from the start).

Our explorer stationed at b is in for a disappointment. The only possible move to t is 10 units away (12
from the beginning). And this is more than the 2 units from a to c (3 from the beginning) and the same
as a trip from s to c through d, a possibility we can now safely discard (having arrived at c in only 3
units, rather than the 12 required via d). Now, we're at c and if this seems complicated it's really not.
We're just making cautious, tentative steps from node to node, while being forced by the algorithm to
always consider the shortest path from the start.

1) Create a set sptSet (shortest path tree set) that keeps track of vertices included in shortest path tree,
i.e., whose minimum distance from source is calculated and finalized. Initially, this set is empty.
2) Assign a distance value to all vertices in the input graph. Initialize all distance values as INFINITE.

7
Assign distance value as 0 for the source vertex so that it is picked first.
3) While sptSet doesn’t include all vertices

a) Pick a vertex u which is not there in sptSet and has minimum distance value.
b) Include u to sptSet.

c) Update distance value of all adjacent vertices of u. To update the distance values, iterate through all
adjacent vertices. For every adjacent vertex v, if sum of distance value of u (from source) and weight
of edge u-v, is less than the distance value of v, then update the distance value of v.

8
TOOLS AND PLATFORM

Software Requirements

 Android Studio version- 3.2


 Firebase
 Google Maps
 Android Naugat7.1 or above

9
Here we’ve compiled this big list of Android development resources and tools.
The sections are as follows:
 Editors and IDEs
 Language Resources
 Libraries
 Plug-in

IDEs can contain a compiler, which translates the language you are coding in to Android’s Java, and a
debugging console, all usable through the same graphical interface.
This is most of the work is done like creating, designing, testing and polishing your mobile app.
As well as “the originals”, that is to say Eclipse, IntelliJIDEA and Android Studio.

Android Studio:

Android Studio is the official integrated development environment (IDE) for Google's Android operating
system, built on JetBrains' IntelliJ IDEA software and designed specifically for Android development. It is
available for download on Windows, macOS and Linux based operating systems. It is a replacement for
the Eclipse Android Development Tools (ADT) as the primary IDE for native Android application
development.

Android Studio was announced on May 16, 2013 at the Google I/O conference. It was in early access preview
stage starting from version 0.1 in May 2013, then entered beta stage starting from version 0.8 which was
released in June 2014. The first stable build was released in December 2014, starting from version 1.0. The
current stable version is 3.3, which was released in January 2019

Android Language Resources


There are number of languages used to develop Android applications, like JAVA, Kotlin, XML.

Java – Java is defined as an object-oriented language similar to C++, but simplified to eliminate
language features that cause common programming errors. The source code files (files with a .java
extension) are compiled into a format called byte code (files with a .class extension), which can then
be executed by a Java interpreter. Compiled Java code can run on most computers because Java
interpreters and runtime environments, known as Java Virtual Machines (VMs), exist for most
operating systems, including UNIX, the Macintosh OS, and Windows. Byte code can also be
converted directly into machine language instructions by a just-in-time compiler (JIT). In 2007, most

10
Java technologies were released under the GNU General Public License. As a general purpose
programming language, Java offers a number of features that make the language well suited for use on
the Web. Small Java applications, called applets, can be downloaded from a web server and run on
your computer by a Java-compatible Web browser.
Applications and websites using Java will not work unless Java is installed on your device. When you
download Java, the software contains the Java Runtime Environment (JRE) which is needed to run in a
Web browser. A component of the JRE, the Java Plug-in software allows Java applets to run inside
various browsers.

XML –

Extensible Markup Language (XML) is used to describe data. The XML standard is a flexible way to
create information formats and electronically share structured data via the public Internet, as well as
via corporate networks.XML code, a formal recommendation from the World Wide Web Consortium
(W3C), is similar to Hypertext Markup Language (HTML). Both XML and HTML contain markup
symbols to describe page or file contents. HTML code describes Web page content (mainly text and
graphic images) only in terms of how it is to be displayed and interacted with.XML data is known as
self-describing or self-defining, meaning that the structure of the data is embedded with the data, thus
when the data arrives there is no need to pre-build the structure to store the data; it is dynamically
understood within the XML. The XML format can be used by any individual or group of individuals
or companies that want to share information in a consistent way. XML is actually a simpler and easier-
to-use subset of the Standard Generalized Markup Language (SGML), which is the standard to create
a document structure. The basic building block of an XML document is an element, defined by tags.
An element has a beginning and an ending tag. All elements in an XML document are contained in an
outermost element known as the root element. XML can also support nested elements, or elements
within elements. This ability allows XML to support hierarchical structures. Element names describe
the content of the element, and the structure describes the relationship between the elements.

Android Libraries
A library, in the software development world, is a collection of data which can do any number of
things: set rules for app behavior, graphic effects, pre-written code, templates, text, communication
protocols and much more. A lot of these libraries are organized by their topic or activity – you can find
libraries for translating objects from one language to another, or for managing the way certain visuals
move and behave on screen. The development community tends to be quite open with a lot of their

11
work, and chances are the library that are required are already made, but a custom library can also be
made according to the requirements.

JSon – JSON (JavaScript Object Notation) is a lightweight data-interchange format. It is easy for
humans to read and write. It is easy for machines to parse and generate. It is based on a subset of the
JavaScript Programming Language, Standard ECMA-262 3rd Edition - December 1999. JSON is a
text format that is completely language independent but uses conventions that are familiar to
programmers of the C-family of languages, including C, C++, C#, Java, JavaScript, Perl, Python, and
many others. These properties make JSON an ideal data-interchange language.

JSON is built on two structures:

 A collection of name/value pairs. In various languages, this is realized as an object, record,


struct, dictionary, hash table, keyed list, or associative array.
 An ordered list of values. In most languages, this is realized as an array, vector, list, or
sequence.

These are universal data structures. Virtually all modern programming languages support them in one
form or another. It makes sense that a data format that is interchangeable with programming languages
also be based on these structures.

Firebase:

Firebase is a BaaS, i.e., Backend as a Service. We can call it a real-time database which is the best
feature of it. By using the API given by Firebase, the web developers and mobile developers can build
high-quality apps.

Real-time data is the way of the future. Nothing compares to it. Most databases require to make HTTP
calls to get and sync the data and they give data only when it is asked. While connecting the app to
Firebase, it is not connecting through normal HTTP it is connecting it through a WebSocket which are
much faster than HTTP. All of the data syncs automatically through that single WebSocket as fast as
client’s network can carry it. Firebase sends new data as soon as it’s updated. When client saves a
change to the data, all connected clients receive the updated data almost instantly.

12
DESIGN AND IMPLEMENTATION

Fig: 5.1 Registration Page

Fig: 5.1 showsthe registration page where both POLA and threat users will register by entering
their username, email and password. The registration will be a onetime process once the user is
registered he/she does not need to sign in again and again until the app data is cleared.

13
Fig: 5.2 Threat Notification Sent

Fig: 5.2 show the threat has been sent to the POLA application that means the current location of the
device is captured and sent to the POLA application for tracking.

14
Fig: 5.3 Notifications Received

Fig: 5.3 Shows that the threat has been received by the POLA notification and when the
police officer clicks this notification he will be redirected to the POLA application from where he can
track the location of the victim

15
.

Fig: 5.4 POLA MAP

Figure 5.4 shows the POLA map where the blue marker is the location of the police car and
the red marker shows the threat location. Now to track green button is given at bottom pressing that
will redirect the user to Google from where the location will be tracked.

16
Fig: 5.5 Google MAP

The fig: 5.5 shows the tracking direction to the victim as our app redirected the POLA to google maps
so the rest of the tracking will be handled by google maps.

17
RESULT AND CONCLUSION

6.1 RESULT

The user will register in the client app providing his name, email id. Where ever he/she feels threat he
will go to the app and press a threat button and as soon as the button is pressed a notification will go to
all nearby police cars. Then whichever car accepts the threat current location of the victim will be
provided to them in maps so that they can reach to him/her in time.
The POLA Applications runs online with inbuilt map support for accessing the location of the
victim and forwarding it to the police cars nearby through notification based on the application which
will be available with the police officials.

6.2 CONCLUSION

This application will help the police to track the victim and get their location. This will help to get the
exact location where the incident is happening and let the police department solve the threat easily and
quickly.
The problem of the location will also be solved so as to make easy for police to reach the crime or
threat scene.

18
FUTURE SCOPE

In future we can also implement AI in POLA application to find out which area is more prone
to threat and where more police patrolling cars should be present at what time to prevent the threat
before even happening we can also maintain all the records about the type of crimes happened in
particular area and how quickly were they resolved so that we can also keep track on the work of
police department.

19
REFERENCES

[1] Abhaya: An Android App For The Safety Of Women, DOI: 10.1109/INDICON.2015.7443652
Conference: 12th IEEE India International Conference, Electronics, Energy, Environment,
Communication, Computer, Control, (E3-C3), At Jamia Millia Islamia, New Delhi, INDIA
[2] Vaijayanti Pawar, Prof.N.R.Wankhade, Dipika Nikam, Kanchan Jadhav, Neha Pathak,
“SCIWARS An droid App for Women Safety,” Vaijayanti Pawar et al Int. Jo urnal of
Engineering Research and Applications, www.ijera.com, ISSN: 2248-9622, Vol. 4, Issue
3(Version 1), March 2014, pp.823-826.
[3] Android App Developed by People Guard LLC, 24 September, 2013,”STREET SAFE”,
https://jezebel.com/5895916/the-street-safety-app-for- proactive-and-paranoid-woman

20

Вам также может понравиться