Вы находитесь на странице: 1из 42

1

CHAPTER 1
INTRODUCTION

1.1 ORGANIZATION PROFILE


Palle Technologies is a leading Web designing company which provides
web solution to the business all across the globe. Palle Technologies
provides an endeavor solution that includes custom Website designing,
Website development, e-commerce, Web-based applications, Flash designs,
online marketing, and Content Management System and delivers products to
clients. Palle Technologies solutions are a creative and innovative in web
development firm and primary focus is to add new features that can lay down
to ensure success for online business.
Palle Technologies is a leading Web designing company which provides
web solution to the business all across the globe. Palle Technologies
provides an endeavor solution that includes custom Website designing,
Website development, e-commerce, Web-based applications, Flash designs,
online marketing, and Content Management System and delivers products to
clients. Palle Technologies solutions are a creative and innovative in web
development firm and primary focus is to add new features that can lay down
to ensure success for online business. IT services in the area of Application
Development, Application Management, Enterprise Business Solution,
Software Testing and System Integration through a global delivery model
that ensures security, cost-effectiveness and quality for clients.

1.2 OBJECTIVE
The objective is to develop an application that will provide help to the
users in case of emergency.
The main problem is in case of emergency to find nearest places like
Hospital, Medical Store, Police station, Fire Station. It is always required to
query the places in the Google maps which is time consuming.
2

 The user to locate the nearest places.


 To send automated message.
 To find way to a preset location.
 To provide common health information.
3

CHAPTER 2
LITERATURE SURVEY

2.1 AN ANDROID APPLICATION FOR WOMEN SAFETY BASED


ON VOICE RECOGNITION
Dongare Uma
This paper proposed a voice catchphrase perceiving application to
perceive the client and initiate the application usefulness notwithstanding
when the portable keypad bolted. The GPS module tracks the longitude and
scope to follow a correct area of a client and sends the pre-put away crisis
message including area to the enrolled contact numbers. The Audio
Recording module begins the chronicle of the discussion for five minutes
and put away as confirmations.
The current women safety applications in market have to push the button
to send message. It is difficult to press button in critical situation when
keypad is locked. This paper deals with recognizing voice converted into text
to send message. Message consists of GPS location information of the user.
Message can be send even if the keypad is locked. Database includes contact
numbers and voice keyword. User register a contact list of people to whom
user want to ask for help and keyword or voice is saved for recognition
purpose Contacts and keywords are saved in database.

2.2 EMERGENCY APPLICATION FOR WOMEN


Mageshkumar.S
This paper proposes a crisis reaction circumstance perceiving application
called as IPROB to give women safety even in the circumstance like fear
based oppressor assaults or catastrophic event, by simply shaking the
versatile over the predefined limit esteem naturally actuate the framework.
They have implemented an emergency reaction scenario identifiable
Application names IPROB with an intension to provide safety for women
even during scenarios like attack of terrorist or any natural disaster, the user
4

can try to save herself by shaking the phone more than the normal threshold
value, this automates and activates the application. it raises an alert and if the
end user fails to reply in a defined time interval then the predefined message
is broadcast to the stored phone numbers. If the receiver at the other end
approves a emergency service like ambulance, fire engine and so on then
they are alerted. If the receiver approves a hear able alert, then it
mechanically alerts and enable the speakerphone of the victim.
The disadvantage of this paper is that the receiver may be at far
distance from the user location hence may not be in a position to rescue the
victim and the other option provided in this paper is calling to the emergency
system like fire or ambulance where there are possibilities of not able to
accommodate such emergency service at a predefined time, by the time the
receiver calls to police or a ambulance violent crime could have been taken
place on the victim.

2.3 ANDROID APPLICATION FOR WOMEN SAFETY


Vaijayantipawar
This paper proposes a SCIWARS application (Spy Camera Identification
and Women Attack Rescue System) which comprise of two modules. A first
module go about as a shrewd cautions framework which recognizes the
infrared beams originating from consistently vision concealed cameras put in
evolving rooms-inns room and so on and furthermore educated the client
about perilous place through message.
To develop a system for android uses for keeping track through several
application. The application uses some GPS terminology for location
mapping and tracking the restricted zones, and detecting hidden web
camera’s by using android mobile devices and womens attack handling
system for womens security and protecting against rape and from other
harassment. This module will detects hidden cameras which are hidden in
hotel rooms, changing rooms. Every night-vision cameras emits infrared
rays, so when victim will enters in room if there is any hidden camera, this
5

will happen by catching the infrared rays through her mobile while she
entering in a room.

2.4 MOBILE PHONE EMBEDDED WITH MEDICAL AND


SECURITY APPLICATIONS
Bhaskar Kamal Baishya
This paper proposes an android application to give security at two
distinct circumstances as takes after. The First module give security to
Women at Emergency Situations propose a Save Our Souls (SOS)
application to gives the security on a solitary snap of SOS catch for the
women going around evening time or alone. The second module proposes an
android based home security framework that gives security of house assets
and Senior Citizen in the client nonappearance. Since the security of senior
resident is dependably a worry with expanding number of theft episodes.
To describe about an SOS application that can be developed in android
platform. The uniqueness of this application apart from other SOS
application available is that the user need not spent time navigating inside the
phone menu; unlock the screen, to trigger the service. User instead, can
directly press the power button and thereby, popping up a SOS screen and
user can directly click the SOS button triggering the application in the
background, sending the location (latitude and longitude) to all the
preregistered phone numbers in the application. Many applications available
in the market send a custom message to the number registered but not the
location of the user.

2.5 A MOBILE BASED WOMEN SAFETY APPLICATION


Dr. Sridhar Mandapati
This paper proposes an application, in which a solitary snap of SOS
communicates something specific containing the area and additionally sound
video call to the gatekeeper number. At collector touch the area URL in the
6

message to see it in the Google Map. It likewise gives distinctive enable


instruments to like First-Aid enable, Fake Call To help and video call.
The call sending is done by simply touching the option SOS from main
screen then it retrieves the contacts which are saved in the JSON database
and it performs the action and at the same time it sends the location url of the
person through the message format where she/he used this application when
they are in danger. By just touching the location URL got from the message
then it gets the location where the person is in danger by showing us in blue
colour spot in the Google Map is by zooming the Map guardian can easily
find out the accurate location of the unsafe woman

2.6 ADVANCED SECURITY SYSTEM FOR WOMEN


Thooyavan V
This paper has a mechanized profoundly solid women security gadget
which comprise of the propelled sensors inserted in a wearable dresses. It
comprise of cutting edge sensors, GSM and ATMEGA8 microcontroller
with ARDUINO device which hold client under perception at constantly. It
screens the heart beat-rate, temperature and vibration in body through
sensors to check for uneasy circumstance. In such circumstance it will enact
the GPS module to track the area and remote camera to catch the pictures
that get send to the control room of the recipient through GSM modules to
take vital activities. In the meantime processor initiate the mice unit with
speaker which fortifies the voice of the women to shouts or yell over as far
as possible.
This system is ‘GSM & GPS Based women Security System’. It consists
of GPS device ie. Any Android Phone and an emergency button. GPS device
must to be placed inside the device (Android Phone). The device will
provide the position information such as latitude, longitude of women. An
emergency button is fixed on the device at a particular position. Whenever
women in any kind of trouble she will press the emergency button and an
7

alert will be immediately sent to the nearest police station. Then it is the
responsibility of police squad to handle the situation.

2.7 SMART GIRLS SECURITY SYSTEM


Prof. Basavaraj Chougula
This paper proposed a convenient gadget as a belt which is naturally
actuated base on the weight distinction traverses the limit in dangerous
circumstance. A GPS module track the area and sends the crisis messages to
three crisis contacts like clockwork with refreshed area through GSM. The
framework additionally actuates the shouting alert that uses a siren, to get out
for help and furthermore creates an electric stun to hurt the aggressor for
self-protection which may help the casualty to get away. The gadget
essentially comprises of smaller scale controller on the at Mega328 board
which customized utilizing the ARDUINO programming dialect.
To design a portable device which resembles a normal belt. It consists of
Arduino Board, GSM/GPS modules, screaming alarm and pressure sensors.
When the threshold of the pressure sensor crosses, the device will get
activated automatically. Immediately the location of the victim will be
tracked with the help of GPS and emergency messages will be sent to three
contacts and one to police control room every two minutes with updated
location. The screaming alarm unit will be activated and will send out sirens
to call out for help. The system is also capable to generate an electric shock
to harm the attacker which may help the victim to escape.

2.8 A WOMEN SAFETY DEVICE


Nishant Bhardwaj
This paper proposes the women security gadget called as "Suraksha"
which is a simple to work gadget. This gadget can be initiated through-voice
order, Press a switch key and stun (i.e. at the point when the gadget is tossed
with constrain, a power sensor used to actuate the gadget). In crisis
circumstance it will send the message including moment area to the police,
8

through the transmitter module and enlisted numbers by means of a GSM


module. As of now the work is under procedure to implant it in adornments,
portable or other transporter like belt and so on. It can assume a noteworthy
part in the propose ventures where all the police headquarters are associated
and share the criminal records, wrongdoing examining cases and so on.
To suggests a new perspective to use technology to protect women. The
system resembles a normal belt which when activated, tracks the location of
the victim using GPS (Global Positioning System) and sends emergency
messages using GSM (Global System for Mobile communication), to three
emergency contacts and the police control room. The system also
incorporates a screaming alarm that uses real time clock, to call out for help
and also generates an electric shock to injure the attacker for self defence.
The main advantage of this system is that the user does not require a
Smartphone unlike other applications that have been developed earlier.

2.9 AN INTELLIGENT SECURITY SYSTEM FOR VIOLENCE


AGAINST WOMEN IN PUBLIC PLACES
Remya George et.al
This paper proposes the propelled programmed method to foresee the
risky circumstance in view of the female feeling as dread, outrage and so on.
The framework takes after the means offered beneath to decide the
disordered circumstance under the reconnaissance locale to recognize the
brutality circumstance.
The screaming alarm unit will be activated and will send out sirens to
call out for help. The system is also capable to generate an electric shock to
harm the attacker which may help the victim. The system architecture is
classified into vehicle unit, emergency button, company unit, android device
and technical unit. Vehicle unit consist the vehicle, Teltonika FM 1100
device and one android device for each vehicle. The company vehicle picks
up the employees and drops the employees. Emergency button is a part of
vehicle unit. The data received from the device is interpreted, processed and
9

used by the technical system. The co-ordinates and the vehicle location is
displayed using the Google maps interface. The system is divided into
several parts. The vehicle unit, company unit, Teltonika GPS tracking device
are the key features of the system.

2.10 WOMEN EMPLOYEE SECURITY SYSTEM USING GPS AND


GSM BASED VEHICLE TRAKING
Poonam Bhilare
This paper proposes a stretched out vehicle following framework to
track the vehicle in light of GPS with that it likewise gives the safety through
a crisis catch kept under the vehicle situate utilizing GSM. As the expanding
financial development rate of a nation, numerous organizations are setting up
their setup in the adjacent district of the urban areas. Since, the security of
women representatives' inside the private transportation is the organizations'
duty.
The system architecture is classified into vehicle unit, emergency
button, company unit, android device and technical unit. Vehicle unit consist
the vehicle, Teltonika FM 1100 device and one android device for each
vehicle. The company vehicle picks up the employees and drops the
employees. Emergency button is a part of vehicle unit. The data received
from the device is interpreted, processed and used by the technical system.
The co-ordinates and the vehicle location is displayed using the Google maps
interface. The system is divided into several parts. The vehicle unit, company
unit, Teltonika GPS tracking device are the key features of the system.
10

CHAPTER 3
SYSTEM ANALYSIS

3.1 EXISTING SYSTEM


The applications like Google Maps, Zomato, Nirbhaya etc where
the users search for nearest places and send automated messages to the
people care about them.

Google Maps
Formerly Google Local is a web mapping service application and
technology provided by Google, that powers many map-based services,
including the Google Maps website, Google Ride Finder, Google
Transit, and maps embedded on third-party websites via the Google
Maps API. It offers street maps, a route planner for traveling by foot, car,
bike (beta), or with public transportation and a locator for urban businesses
in numerous countries around the world.

Zomato
Restaurant Finder application give restaurant recommendations
around and lets look at menus, pictures and maps for 95,000 restaurants in
India, United Kingdom, UAE, Philippines, South Africa, Sri Lanka and
Qatar.Zomato.com for Android also lets check ratings and reviews of all
restaurants in city. Zomato on Android device is location aware - it
recommends the best restaurants around current location.

3.1.1 Drawbacks
The drawbacks of the existing system are:
 Google Maps is a web mapping service application.
 Google Maps satellite images are not updated in real time.
 Zomato is only Restaurant Finder application.
 Zomato is best restaurants around your current location.
11

 Nirbhaya is children or women using a “Single” click Distress


signal.

3.2 PROPOSED SYSTEM


The main problem is in case of emergency to find nearest places
like Hospital, Medical Store, Police station, Fire Station. It is always
required to query the places in the Google maps which is time consuming. In
this proposed system overcome these problems by providing service at
anytime.

3.2.1 Advantages
 To be able to find the nearest Hospitals.
 To be able to find the nearest Pharmacy.
 To be able to find the nearest Police Station.
 To be able to find the nearest Fire Station.
 To be able to send automated message with current location
 Insert three phone numbers by just shaking the android
handheld device.
 To be able to find way to a location which visited earlier.
 To be able to read few health related tips.
 To be able to get first aid information for common injuries.

3.3 MOBILE PHONE


3.3.1 Hardware
 Any phone Supporting Android SDK 2.1 or later.

3.3.2 Software
 Emulator (in the development stage)
 Eclipse Juno
 Android Development Toolkit 17.0.1
12

The mobile object contains encapsulated data and procedures


grouped together to represent an entity. The ‘object interface’ defines how
the objects interacted with other objects. An object oriented program is
described by the interaction of these objects. Object oriented design is the
discipline of defining the objects and their interactions to solve a problem
that was identified and documented during object oriented analysis.
One of the principle advantages of object oriented programming
techniques over procedural programming techniques is that they enable
programmers to create modules that do not need to be changed when a new
type of object is added. A programmer can simply create a new object that
inherits many of its features from existing objects. This makes object-
oriented programs easier to modify.
The Mobile as in “filename.apk”, Android package, is the packing
file format for the Android operating system. The Graphical User Interface is
a type of user interface which allows people to interact with electronic
devices such as computers, hand-held devices such as MP3 players, Portable
Media Players or Gaming Devices, Household applications and office
equipment with images rather than text commands.
13

CHAPTER 4
SYSTEM SPECIFICATION

4.1 HARDWARE SPECIFICATION


 Processor Speed : 2.3 GHz
 RAM : 1 GB
 Hard Disk Capacity : 80 GB
 Mother Board : Intel Dual Core
 Device : Smart Phone
 Keyboard : Standard 104 Keys
 Mouse : Logitech

4.2 SOFTWARE SPECIFICATION


 Operating System : Windows 7
 Front End : Eclipse Indigo(Version 3.7)
 Back End : SQLite
 Target Environment : Android SDK 2.2
14

CHAPTER 5
SOFTWARE DESCRIPTION

5.1 FRONT END


Java
Java is a computer programming language that is concurrent,
class-based, object-oriented, and specifically designed to have as few
implementation dependencies as possible. It is intended to let application
developers "write once, run anywhere" (WORA), meaning that code that
runs on one platform does not need to be recompiled to run on another. Java
applications are typically compiled to byte code (class file) that can run on
any Java virtual machine (JVM) regardless of computer architecture. Java is,
as of 2014, one of the most popular programming languages in use,
particularly for client-server web applications, with a reported 9 million
developers.

Java Development Kit


The Java Development Kit (JDK) is an implementation of either
one of the Java SE, Java EE or Java ME platforms released by Oracle
Corporation in the form of a binary product aimed at Java developers on
Solaris, Linux, Mac OS X or Windows. Since the introduction of the Java
platform, it has been by far the most widely used Software Development Kit
(SDK).

5.2 JAVA FEATURES


Java is an object oriented programming language developed by
Sun Microsystems of USA in 1991. Java is first programming language
which is not attached with any particular hardware or operating system.
Program developed in Java can be executed anywhere and on any system.
Features of Java are as follows:
 Compiled and Interpreted
15

 Platform Independent and portable


 Object- oriented
 Robust and secure
 Familiar, simple and small
 Multithreaded and Interactive
 High performance
 Dynamic and Extensible

5.3 BACK END


SQLite
SQLite is an ACID-compliant embedded relational database
management system contained in a small (~275 kB) C programming library.
SQLite implements most of the SQL standard, using a dynamically and
weakly typed SQL syntax that does not guarantee the domain integrity. In
contrast to other database management systems, SQLite is not a separate
process that is accessed from the client application, but an integral part of it.
SQLite read operations can be multitasked, though writes can only be
performed sequentially.

Android Runtime
Android includes a set of core libraries that provides most of the
functionality available in the core libraries of the Java programming
language. Every Android application runs in its own process given by the
OS, and owns its own instance of the Dalvik virtual machine. Dalvik has
been written so that a device can run multiple VMs efficiently.

Linux Kernel
Android relies on Linux version 2.6 for core system services such
as memory management, process management, network stack, security, and
driver model. The kernel also acts as a hardware abstraction layer between
the applications and all the hardware.
16

CHAPTER 6
PROJECT DESCRIPTION

6.1 PROBLEM DEFINITION


With increased crime and occurrences of emergency situation it is
required for technology to provide support rather HELP in the case of
emergency. The main problem is in case of emergency to find nearest places
like Hospital, Medical Store, Police station, Fire Station. It is always
required to query the places in the Google maps which is time consuming.
Another problem is to notify our friends about the distress we are required to
type message which is also a time consuming process so, there is need for
automation of the process with more innovative and intuitive way.

6.2 OVERVIEW OF THE PROJECT


Application will help the smart phone users in distress or
otherwise by providing the functionality of four applications as one better
application. The application allows the user to access nearest locations like
hospitals, pharmacies, police stations and fire stations (Nearest Places
module). It also allows users to send a predefined message to three
predefined contacts by shaking the handheld device (Motion Message
module). Further it allows the user to pin a location and find his way back
using navigation (Find My Way module). Finally it allows the user to get
basic health tips and first aid information (Medical Help module). The user
interface is intuitive and self descriptive.

6.3 MODULE DESCRIPTION


Modules
The project “GOOGLE NEAREST HELP ZONE” contains major
four modules. Those modules are listed below:

 Find Nearest Places Module


17

 Hospitals Module
 Pharmacy Module
 Police station Module
 Fire Station Module
 Motion messaging Module
 Find My Way Back Module
 Present Identity Number(PIN) Module
 Find My Way(FMW) Module
 Medical help Module
 First Aid Module
 Tips Module

6.3.1 Find Nearest Places Module


Hospitals Module
The user can find nearest hospitals by clicking the “HOSPITALS”
button under Nearest places. It will show the nearest hospitals address and
phone number. If user want make a call and view the map.

Pharmacy Module
The user can find nearest Pharmacy by clicking the
“PHARMACY” button under Nearest places. It will show the nearest
pharmacy address and phone number. If user want make a call and view the
map.

Police station Module


The user can find nearest Police station by clicking the “POLICE
STATION” button under Nearest places. It will show the nearest police
station address and phone number.
18

Fire station Module


The user can find nearest Fire station by clicking the “FIRE
STATION” button under Nearest places. It will show the nearest fire station
address and phone number. If user want make a call and view the map.

6.3.2 Motion Messaging Module


The user must be able to send automated Distress alert message to
preset phone numbers by shaking the phone. If the user has not entered and
saved the phone numbers, and tries to send message by motion. If the user
enters any invalid phone numbers like more than 10 digits or less than 10
digits.

6.3.3 Find My Way Back Module


Present Identity Number (PIN) Module
The user must be able to pin or save the current location by
clicking “PIN” button under find my way. It will show the current location.
If user want view the map.

Find My Way (FMW) Module


The user must be able to find the way back to the previously
pinned location by clicking “FMW” button. It will show the source and
destination way map. If user want view the map.
The help application will save the current location. The help
application will fetch the updated current location and shows directions to
reach the pinned location from the currently fetched location.
6.3.4 MEDICAL HELP
The user can read common health related first aid and tips by
clicking appropriate buttons in the “MEDICAL HELP” button.
The user can view demo of how to perform first aid by clicking
“DEMO” button under the first aid.
19

6.4 SYSTEM ARCHITECTURE


System Analysis is an important activity that takes place when we
are building new system or changing the existing one. Analysis helps to
understand the existing system and the requirements necessary for building
the new system. If there is no existing system then analysis defines only the
requirements. One of the most important factors in the system analysis is to
understand the system and its problems. A good understanding of the system
enables designer to identify and correct problems.
By providing an open development platform, Android offers
developers the ability to build extremely rich and innovative application.
Developers are free to take advantage of the device hardware, access location
information, run background services, set alarms, add notifications to the
status bar, and much, much more.
Underlying all applications is a set of services and systems,
including: A rich and extensible set of Views that can be used to build an
application, including grids, lists, text boxes, buttons, an embeddable web
browser. Content Providers that enable applications to access data from other
applications (such as Contacts), or to share their own data.
The help application on android is based on object oriented
design. Object oriented design is the process of planning a system of
interacting objects for the purpose of solving a software problem. It is one
approach to software design. An object contains encapsulated data and
procedures grouped together to represent an entity. The ‘object interface’
defines how the objects interact with other objects. An object oriented
program is described by the interaction of these objects. Object oriented
design is the discipline of defining the objects and their interactions to solve
a problem that was identified and documented during object oriented
analysis.
One of the principle advantages of object oriented programming
techniques over procedural programming techniques is that they enable
programmers to create modules that do not need to be changed when a new
20

type of object is added. A programmer can simply create a new object that
inherits many of its features from existing objects. This makes object-
oriented programs easier to modify.

The System architecture of The Help Application is as shown below:

Interfaces Interfaces Interfaces

Backend logic

Nearest Places Motion Message

Find way Medical Help

Frontend User Interface

Form Layouts Text Fields Image, Media


Widgets

Buttons Sensors

Android Emulator Android Phone

Figure 6.1 System Architecture of The help Application


21

6.5 UML DIAGRAM


The Unified Modeling Language is a general purpose visual
modeling language that is used to specify, visualize, construct, and document
the artifacts of a software system. It captures decisions and understanding
about systems that must be constructed. It is used to understand, design,
browse, configure, maintain, and control information about such systems.
The primary goals in the design of the Unified Modeling Language are:
Provide users with a ready-to-use, expressive visual modeling language so they
can develop and exchange meaningful models.

 Provide extensibility and specialization mechanisms to extend


the core concepts.
 Be independent of particular programming languages and
development processes.
 Provide a formal basis for understanding the modeling
language’s
 Support higher-level development concepts such as
collaborations, frameworks, patterns and components.
Each Unified Modeling Language diagram is designed to let
developers and customers view a software system from a different
perspective and in varying degrees of abstraction. UML diagrams commonly
created in visual modeling tools include.
 Use Case Diagram
 Sequence Diagram
 Class Diagram

6.5.1 Usecase Diagram


Identification of Actors
An actor is someone or something that:
 Interacts with or uses the system.
 Provides input to and receives information from the system.
 Is external to the system and has no control over the use cases.
22

Actors identified are:


 End User
 Serve

Identification of Use cases


In its simplest form, a use case can be described as a specific way
of using the system from a user’s (actors) perspective. A more detailed
description might characterize a use case as:
 A pattern of behavior the system exhibits.
 A sequence of related transactions performed by an actor in
the system.
 Delivering something of value to the actor.

Use cases provide a means to:


 Capture system requirements.
 Communicate with the end users and domain experts.
 Test the system.

A use case diagram can portray the different types of users of a


system and the various ways that they interact with system. This type of
diagram is typically used in conjunction with the textual use case and will
often be accompanied by other types of diagrams as well.

Use Case Diagram for Nearest Places


23

Figure 6.2 Use case Diagram for Nearest Places

6.5.2 Sequence Diagram


A Sequence diagram is a graphical view of a scenario that shows
object interaction in a time-based sequence what happens first, what happens
next. Sequence diagrams establish the roles of objects and help provide
essential information to determine class responsibilities and interfaces.

Construction of Sequence Diagrams


A Sequence diagram is a graphical view of a scenario that shows
object interaction in a time-based sequence what happens first, what happens
next. Sequence diagrams establish the roles of objects and help provide
essential information to determine class responsibilities and interfaces.The
following tools located on the sequence diagram toolbox which enable to
model sequence diagrams:

Message Icons
24

A message icon represents the communication between objects


indicating that an action will follow. The message icon is a horizontal, solid
arrow connecting two life lines together.

Sequence Diagram for Validation of PNR Check

User Nearest Places Motion Find Myway Medical Help


Messaging Back

1.Find Nearest Places

2.Shake the Phone Send Automated Alert Message

3.Click PIN or SAVE button under the Find Myway Back

4.Read Common helth releted First Aid and Tips

Figure 6.3 Sequence Diagram for Nearest places

6.5.3 Class Diagram


A UML class diagram is made up of a set of classes and a set of
relationships between classes.
A description of a group of objects all with similar roles in the
system, which consists of:
 Structural features (attributes) define what objects of the
class "know"
25

 Represent the state of an object of the class


 Are descriptions of the structural or static features of a
class
 Behavioral features (operations) define what objects of the
class "can do"
 Define the way in which objects may interact
 Operations are descriptions of behavioral or dynamic
features of a class.

Class Notation
A class notation consists of three parts:
1. Class Name
 The name of the class appears in the first partition.
2. Class Attributes
 Attributes are shown in the second partition.
 The attribute type is shown after the colon.
 Attributes map onto member variables (data members) in code.
3. Class Operations (Methods)
 Operations are shown in the third partition. They are services
the class provides.
 The return type of a method is shown after the colon at the
end of the method signature.
 The return type of method parameters are shown after the
colon following the parameter name.
 Operations map onto class methods in code
26

Figure 6.4 Splash Activity Class

Figure 6.5 Menu Activity Class


27

Figure 6.6 Nearest Help Activity Class

Figure 6.7 Find my Way Class


28

Figure 6.8 Shake Activity Class

Figure 6.9 Setting Activity Class

Figure 6.10 Alert Dialog Class


29

Figure 6.11 Connection Detector Class

Figure 6.12 Google Places Class


30

Figure 6.13 GPS Tracker Class

Figure 6.14 Nearest Help Main Activity Class


31

Figure 6.15 Single Place Activity Class


32

Figure 6.16 Place Details Class

Figure 6.17 Places List Activity Class

Figure 6.18 Place Map Activity Class


33

TESTING
Testing is the process of finding difference between the expected
behavior specified by the system models and the observed behavior of the
system.
The purpose of testing is to discover errors. Testing is the process of
trying to discover every conceivable fault or weakness in a work product. It
provides a way to check the functionality of components, sub-assemblies,
assemblies and/or a finished product it is the process of exercising software
with the intent of ensuring that the Software system meets its requirements and
user expectations and does not fail in an unacceptable manner. There are
various types of test. Each test type addresses a specific testing requirement.

TYPES OF TESTING
Unit Testing
It finds differences between the object design model and its
corresponding component.
Unit testing involves the design of test cases that validate that the
internal program logic is functioning properly, and that program inputs
produce valid outputs. All decision branches and internal code flow should
be validated. It is the testing of individual software units of the application,
it is done after the completion of an individual unit before integration. This
is a structural testing, that relies on knowledge of its construction and is
invasive. Unit tests perform basic tests at component level and test a specific
business process, application, and/or system configuration. Unit tests ensure
that each unique path of a business process performs accurately to the
documented specifications and contains clearly defined inputs and expected
results.

Integration testing
Integration tests are designed to test integrated software components to
determine if they actually run as one program. Testing is event driven and is
34

more concerned with the basic outcome of screens or fields. Integration tests
demonstrate that although the components were individually satisfaction, as
shown by successfully unit testing, the combination of components is correct
and consistent. Integration testing is specifically aimed at exposing the
problems that arise from the combination of components.

System Test
System testing ensures that the entire integrated software system meets
requirements. It tests a configuration to ensure known and predictable results.
An example of system testing is the configuration oriented system integration
test. System testing is based on process descriptions and flows, emphasizing
pre-driven process links and integration points.

White Box Testing


White Box Testing is a testing in which in which the software tester has
knowledge of the inner workings, structure and language of the software, or at
least its purpose. It is used to test areas that cannot be reached from a black box
level.

Black Box Testing


Black Box Testing is testing the software without any knowledge of the
inner workings, structure or language of the module being tested. Black box
tests, as most other kinds of tests, must be written from a definitive source
document, such as specification or requirements document. It is a testing in
which the software under test is treated, as a black box .you cannot “see” into
it. The test provides inputs and responds to outputs without considering how
the software works.

Structural Testing
It finds differences between the system design model and a subset of
integrated subsystems.
35

Performance Testing
It finds differences between the non functional requirements and actual
system performance.

Functional test
Functional tests provide systematic demonstrations that functions tested
are available as specified by the business and technical requirements, system
documentation, and user manuals.

Functional testing is centered on the following items:


Valid Input : identified classes of valid input must be accepted.
Invalid Input : identified classes of invalid input must be rejected.
Functions : identified functions must be exercised.
Output : identified classes of application outputs must be
exercised.
Systems/Procedures : interfacing systems or procedures must be invoked.
Organization and preparation of functional tests is focused on
requirements, key functions, or special test cases. In addition, systematic
coverage pertaining to identify Business process flows; data fields, predefined
processes, and successive processes must be considered for testing. Before
functional testing is complete, additional tests are identified and the effective
value of current tests is determined.
In the development of our application we have exhaustively
implemented functionality testing wherein we took up each user scenario and
tested it against the application.
Functional testing is a type of black box testing that bases its test
cases on the specifications of the software component under test. Functions
are tested by feeding them input and examining the output.
36

6.6 INPUT DESIGN


Input design is the link between the information system and users
and those steps that are necessary to put transaction data into a usable form
for processing data entry. The activity of putting data into the computer for
processing can be activated by instruction the computer to read data form a
written printed document or it can be occur by keying data directly into the
system.

6.7 OUTPUT DESIGN


Output design is a process that involves designing necessary
outputs that have to be used by various users according to requirements.
Efficient intelligent output design should improve the system relationship
with the user and help in decision making. Output design generally refers the
results and information that are generated by the system output design
generally refers to the results and information that are generated by the
system.
Output design phase of the system is concerned with the
convergence of information to the end user-friendly manner. The output
design should efficient, intelligent so that system relationship with the end
user is improved and they are by enhancing the process of decision-making.
It also serves as historical record for future reference.
The main form of interaction between the users is the output
design hence the output should be designed with great attention. The output
should be presented in impressive form, which will satisfy the user
requirement in simple and attractive manner, precise information is provided
so that the user can make the utmost use of this application. The output
design objectives are as follows:
 Assure purposeful output
 Make meaningful to user
 Provide appropriate quantity
37

CHAPTER 7
SYSTEM IMPLEMENTATION

The term implementation has different meanings, ranging from


the conversion of a basic application to a compatible replacement of a
computer system. Implementation is used here to mean the process
converting a new or a revised system design into an operational one. During
the implementation stage the system design is converted to coding using
required programming language.
Implementation is the stage where all the planned activities are
put into action. The most crucial stage in achieving a new successful system
and in giving confidence on the system for the users that will work
efficiently and effectively. It involves careful planning, investigation of the
current system and its constraints on implementation.
At the implementation stage the main workload, the greatest up
level, and the major impact on existing practices shifts to the client
department. If the implementation stage is not carefully planned, it can be
cause greater loss. The system implementation has three main aspects. They
are education and training, system testing and changeover. The
implementation stage involves following tasks:
 Careful planning
 Investigation of system and constraints
 Design of methods to achieve the changeover
 Training of the staff in the changeover phase
 Evaluation of the changeover method
The purpose of system implementation can be summarized as
follows to making the new system available to a prepared set of users, and
positioning ongoing support and maintenance of the system within the
performing organization.
At a finer level of detail, deploying the system consists of
executing all steps necessary to educate the consumers on the use of new
38

system, placing the newly developed system into production, confirming that
all data required at the start of operation is available and accurate, and
validation that business functions that interact with the system are
functioning properly.
If implementation is not carefully planned and controlled, it can
cause confusion. Implementation includes all those activities that take place
to convert from the old system to new one. The new system may be totally
new, replacing an existing manual or automated system or it may be a major
modification to an existing system. The implementation phase consists of the
following processes.
 Prepare for system implementation
 Deploy system
 Transition to performing organization
 System Security

Implementation Techniques
Implementation is a stage of the project when the theoretical
design is turned into a working system. User’s confidence is that the new
system will work and be effective in the implementation storage. The stage
consist of five categories they are
 Detection and correction of error.
 Training the user personal.
 Testing the developed program with sample data.
 Testing whether the system meets user requirement.

Implementation Procedures
The implementation phase is less creative than system design. A
system project may be dropped at any time prior to implementation,
although it becomes more difficult when it goes to the design phase.
 The conversion portion of the implementation plan is finalized
and approved.
39

 Files are converted.


 Assuming no problems, parallel processing is discontinued.
 Implementation results are documented for reference.
 Parallel processing between the existing system and the new
system are logged on a special form.

Technology
The technology used in building the help application is android.
Following sections give a brief description of this technology. Android is a
software stack for mobile devices that include an operating system,
middleware and key applications. The Android SDK provides the tools and
API necessary to begin developing applications on the Android platform using
theJavaprogramming.
40

CHAPTER 8
CONCLUSION AND FUTURE ENHANCEMENT

8.1 CONCLUSION
The application will help the smart phone users in distress or
otherwise by providing the functionality of four applications as one better
application. The application allows the user to access nearest locations like
hospitals, pharmacies, police stations and fire stations (Nearest Places module).
Users to send a predefined message to three predefined contacts by
shaking the handheld device (Motion Message module); further it allows the
user to pin a location and find his way back using navigation (Find My Way
module); finally it allows the user to get basic health tips and first aid
information (Medical Help module). The user interface is intuitive and self
descriptive.
This application paves the way for much more intuitive, interactive
and user-friendly by creating new ways to interact with application. This
application can be used to find nearest places, send messages etc. This makes
object-oriented programs easier to modify. In the vision, a handheld system
would provide its users with a multi-function app that they currently do not
posses.

8.2 FUTURE ENHANCEMENT


As a future enhancement this application can provide
1) Street view in maps.
2) More options in Nearest Places and Medical Help modules.
3) Online data storage for Medical Help.
4) Automatic messages based on some criteria (eg. Location)
for Motion Message.
5) Including notification to pin location when visiting new
locations.
41

CHAPTER 9
REFERENCES

1. Bhaskar Kamal Baishya, (2014), “Mobile Phone Embedded With


Medical and Security Applications” IOSR Journal of Computer
Engineering (IOSR-JCE), Volume 16, Issue 3 (Version IX ), PP 30-3.

2. Dongare Uma and RautRavina (2015), “An Android Application for


Women Safety Based on Voice Recognition” International Journal of
Computer Science and Mobile Computing, Vol.4 Issue.3, pg. 216-220.

3. Dr. Sridhar Mandapati, Sravya Pamidi and Sriharitha Ambati


(2015), “A Mobile Based Women Safety Application (I Safe Apps)”
IOSR Journal of Computer Engineering (IOSR-JCE) Volume 17, Issue
1 (Version I), PP 29-34.

4. Magesh Kumar.S and Raj Kumar.M, “Emergency Application For


women” International Journal of Scientific and Research Publications,
Volume 4, Issue 3, ISSN 2250-3153.

5. Nishant Bhardwaj (2014), “Design and Development of Suraksha - A


Women Safety Device”, International Journal of Information &
Computation Technology, Volume 4, pp. 787-792.

6. Poonam Bhilare, Swapnil Makode and Rasika Kahane (2015), “Women


Employee Security System using GPS And GSM Based Vehicle
Tracking”, International Journal for Research in Emerging Science and
Technology, Volume-2, Issue-1, ISSN 2349-7610.

7. Prof. Basavaraj Chougula, Priya Patil and Priyanka Das (2014), “Smart
Girls Security System”, International Journal of Application or
42

Innovation in Engineering &Management (IJAIEM), Volume 3, Issue


4, pp.2319-9849.

8. Remya George and Rosemary Babu.T (2014), “An Intelligent Security


System for Violence against Women in Public Places” International
Journal of Engineering and Advanced Technology (IJEAT), Volume-3,
Issue-4, ISSN 2249-8958.

9. Thooyavan. V (2014), “Advanced Security System for Women”,


International Research Journal of Engineering and Technology, Volume
4, Issue 3, pp.2395-0072.

10. Vaijayanti Pawar and Neha Pathak (2014), “Android Application for
Women Safety”, International Journal of Engineering Research and
Applications, Volume 4, Issue 3(Version 1), pp.823-826.

11. Vijaylashmi. B, Renuka. S, PoojaChennur, Sharangowda Patil, “Self


Defence System for Women with Location Tracking and SMS Alerting
through GSM Network”, International Journal of Research in
Engineering and Technology (IJRET), eISSN:2319-1163, Volume 4,
Issue 5.

WEBSITES
1. http://developer.android.com
2. http://www.android.com
3. http://www.anddev.org

Вам также может понравиться