Professional Documents
Culture Documents
Submited by
PRANALI KHARE (SS16IF006)
SHWETA BHOSALE (SS16IF010)
SONALI SARAMBALE (SS16IF017)
KIRAN GAYKAR (SS16IF020)
SUBJECT : -
2 Introduction
3 Main Body Of Project
4 System Design
4.1 Flow Chart . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
5 Description Of Working
6 Testing
6.1 Unit Testing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
6.2 Integration Testing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
6.3 System Testing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
6.3.1 Security Testing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
6.4 Performance Testing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
6.5 Usability Testing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
6.6 Compatibility Testing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
6.7 Acceptance Testing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
6.8 Dummy Test Cases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
7 GUI
8 Conclusion
Chapter 1: Abstract
In our Country, even though it has super power and an economic development, but still there are many
crimes against women. The atrocities against the women can be brought to an end with the help of our
product “P$K”. This device is a security system, specially designed for women in distress. Method/Analysis:
Using ARM controller for the hardware device is the most efficient and it consumes less power.We
analysed that there are no security device for our total safety.
The user has to carry multiple devices. We found an ALL-IN-ONE security device which has all the features
in one click. Now-a-days women harassment is increasing and women and children safety is a big question
mark. To overcome this problem, this paper explores the IOT concepts such as measuring the body
temperatures, heart beat rates/pulse rates by sensors to monitor their conditions and alerts nearby
location police station or relatives. Since, there are some web or mobile applications for women safety and
emergencies, it does not work at all situations. The lady cannot stay on the gadget at all the time. Instead,
she could be monitored by wearing smart watches, etc.
It could be accessed by wireless technologies like GPS, GSM, GPRS, and Wi-Fi and monitored by nearby
devices. Applications/Improvements: In this paper we used ARM controller and android application in
which both the device and the smart phone are synchronized using Bluetooth, hence both can be triggered
independently. We can record audio for further investigation and can give an alert call and message to the
pre-set contacts with the instant location every 2 minutes and can be tracked live using our application.
Hidden camera detector is also a distinct feature using which we can ensure our privacy.
Chapter 2: Introduction
Introduction of our “P$K” is a security device specially designed for women in emergency and in distress. It is
simple and easy to use and carry with various functionalities. Current scenario from the media shows that
women are facing lot of troubles and they are not secure in untimed situation. Meanwhile, women are working
equal to men like an IT Techie, Doctor, Engineer, Business women, Police, nurse, teacher, Army, Air forces, etc.,
When they are leaving alone, they may face the problems like robbery, rape and murder or harassment, etc.
Crime against women:
a) Domestic violence:
Bass beat, Kick, Biting, Shove, Preventive, Circumstances, Push back,Throwingobjects.
b) CriminalViolence:
Intimidation, Sexual Abuse, Control and domineering, Rape,Seizure, Kidnapping and Slay, Acid Attack.
c)Social Violence:
Eve-teasing, Might Wife/Daughter law to go for feticide etc…
To overcome these type of women security issues and ensures their safety some mechanisms are need in the
society.This paper illustrates how the IOT (Internet-Of-Things) technology is used to provide women safety.The
numbers of smart phone users are turning into greater in amount all over the world. A smart phone has many
applications which is useful to people in which our “P$K” will become one of those. It is a personal safety product
designed to keep you and your friends safe 24/7. It is packed with features for both everyday safety and real
emergencies, making it an ultimate tool for all. This user-friendly application can be accessed by anyone who has
installed it in their smart phones as well as who has our device. Our intention is to provide you with fastest and
simplest way to contact your nearest help. The basic approach (single click) is to intimidate the instant location and
a distress message to the cops and the preset numbers, so that unfortunate incident can be averted and to provide
real time evidence for the action against the perpetrators of crime against women This device can help police
department to reduce the crimes, which are against women and the evidence can be used to trace the crime.
“P$K” is a guide, which aids people to take preventive measures as soon as possible during:
• Being stalked while walking.
• Attempted physical or sexual assault.
• Unsafe neighbours.
• Domestic violence.
Chapter 3: Main Body Of Project
The main aim of our project is to create an application and a small device which can be
useful for women safety. Women safety has been a big concern and it has been the most
important duty of every person. There is no chance of the welfare of the world unless the
condition of the women is improved. So we have made a application which name is PSK .
This application is made in android.
Our main admin panel where all the data will be stored in PHP sql database . Every module
data like the registeration,login,trusted people , unsafe ,safe….etc
Chapter 4: System Design
In our project there are many modules(units), first we created units of basic functionalities, feedbacks,trusted people and rate
us
After creating the modules, we tested each modules separately which is nothing but unit testing. The main objective was to
see whether all the desired functionalities are met or not. This type of testing is very easy and useful when are application has
lot of units. Testing every unit is beneficial because we concentrate on each and every unit which also improves the reliability,
efficiency, security etc.
The purpose is to validate that each unit of the software performs as designed.
After testing each individual units in the program the next step is to do integration. Unit testing is always done before
integration testing.
Integrating testing checks the data flow from one module to other modules. This kind of testing is performed by testers.
Although each software module is unit tested, defects still exist for various reasons like
A Module, in general, is designed by an individual software developer whose understanding and programming logic
may differ from other programmers. Integration Testing becomes necessary to verify the software modules work in
unity.
Interfaces of the software modules with the database could be erroneous
External Hardware interfaces, if any, could be erroneous
Inadequate exception handling could cause issues.
We tested our application against all the possible security measures. Like while we login into the system, and after that when
we logout and click the back button it should provide the user with the login page again rather than providing again the
logged-in application.
Sr.No Test case test case Pre- steps Expected Actual output Result
id specification Condition output
1 #TC1 Test if user is User must be 1)Enter valid Display Toast Display Toast pass
able to login register Username and message" User message"
successfully already password has Succesfully User has
2)Click on Login" Succesfully
login/submit Button Login"
2 #TC2 Test if user User must 1)Enter Invalid Display Toast Display Toast pass
not able to not be Username and message" Failed message"
login register password Occured" Failed
successfully already 2)Click on Occured"
login/submit Button
3 #TC3 Test if user is User must 1)fill all the fields Display Toast Display Toast pass
able to not be properly. message" message"
register register Register Register
successfully already succesful" succesful"
4 #TC4 Test if user User must 1)enter Invalid inputs Display Toast Display Toast pass
not able to not be message" Failed message"
register register Occured" Failed
successfully already Occured"
5 Test if help user must be 1)click on help button Display toast Display toast pass
button work login message"Notific message"Noti
properly or ationand text ficationand
not message send text message
succesfully" send
succesfully"
6 #TC6 Test if user must be 1)click on help button Display toast Display toast pass
second help login message"Notific message"Noti
button work ationand text ficationand
properly or message send text message
not succesfully" send
succesfully"
7 #TC7 Test if user mustbe 1)click onnavigatrion Display toast Display toast pass
trusted login and bar->Trusted people message"Contac message"Con
people are have a 2)click on Add ts add tacts add
added or not permissionto contacts sucessfully" sucessfully"
access 3)select a contact
contacts 4)click Add
8 #TC8 Test if maps user must be 1)click on Alert map should be map will be pass
is open or login and Notification show show
not when data
click on alert connectionsh
Notification ould be on
9 #TC9 Test if user must be 1)click on Alert Google maps Google maps pass
Google maps login and Notification should be open will be open
is open or data 2)Click on Google view
not when connectionsh
click on alert ould be on
Notification
11 #TC11 Test if user must be 1)click on help button trusted people Trusted pass
trusted login and should get a people get
people get data text msg aText msg
text msg or connectionsh
not ( -- in ould be on
Trouble) GPS should
be on
12 #TC12 Test if Safe user must be 1)click on navigatrion Display toast Display toast pass
button work login and bar-> I m safe message"Notific message"Noti
properly or data 2)click on safe button ationand text ficationand
not connectionsh message send text message
ould be on succesfully" send
GPS should succesfully"
be on
13 #TC13 Test if user must be 1)click on navigation Trusted people Trusted pass
trusted login and bar-> I amSafe get aText msg people get
people get data 2)click on safe button aText msg
text msg or connectionsh
not ( I m ould be on
safe) GPS should
be on
14 #TC14 Test if police user must be 1)click on Second help police should be police get a pass
get a trouble login and button get a trouble trouble msg
msg or not data msg and user and user
connectionsh location location
ould be on
GPS should
be on
15 #TC15 Test if police user must be 1)click on navigation police should be police get a pass
get a safe login and bar-> I amSafe get a safe msg safemsg and
msg or not data 2)click on safe button and user user location
connectionsh location
ould be on
GPS should
be on
16 #TC16 Test if user must be 1)click on navigation display toast display toast pass
feedback login bar-> feedback msg "feedback msg
option work 2) write Feedback succesfully "feedback
properly or 3)click on send button send" succesfully
not send"
17 #TC17 Check if data Database 1)Enter info in Data added in Data added in pass
stored in DB and Register page. your databnase. your
when user application databnase.
suucesfully connected to
register. same same
network.
18 #TC18 Test if mobile and 1)mobile bluetooth display toast display toast pass
buletooth is hardware paired with hardware msg "bluetooth msg
connected to buletooth bluetooth is connected" "bluetooth is
hardware or should be connected"
not ON
20 #TC20 Test if rate user must be 1)click on navigation display toast display toast pass
us option login bar-> rate us msg "rate 2.5"(a msg "rate
work 2) click on stars points) 2.5"(a points)
properly or
not
Chapter 7: GUI
Chapter 8: Conclusion
Our primary goal of this project is to ensure every woman in our society to feel safe and secured. According
to the survey in India 53% of working women are not feeling safe - Women is working in night shift
(Bangalore-56%, Chennai-28%, Hyderabad-35%, Mumbai-26%). In Overall 86% of working women in India,
women facing hurdles are high in Delhi, Mumbai, Hyderabad, Kolkata and Pune comparatively to other
places. P$K can play a major role by providing women a safe environment in all situations for example (
physical threatened, harassed, robbery, stalked). Implementing real time application and a device, we can
solve the problems to an extent.