4. methodology

Download Report

Transcript 4. methodology

Student Name
Guide Name
USN NO
H.O.D Name
Name Of The College & Dept
 CONTENTS
1.
Abstract
2.
Objectives
3.
Block diagram
4.
Methodology
5.
Advantages & disadvantages
6.
Applications
7.
Conclusion
1. ABSTRACT
Today in the current global scenario, the prime question in every
Women’s mind, taking into account the ever rising increase of issues on
women harassment in recent past, is only about her safety and security. The
only thought haunting every Women’s is when they will be able to move
freely on the streets even in odd hours without worrying about their security.
This paper suggests a new perspective to use technology to protect women.
The system resembles a normal belt which when activated, tracks the
location of the victim using GPS and sends emergency messages using GSM
,to three emergency contacts and the police control room. The system also
incorporates a screaming alarm that uses real-time clock, to call out for help
and also generates an electric shock to injure the attacker for self defense.
2. OBJECTIVES
The main objective of our project is for anti- voilence for the women
by adapting the authorized ignition system for the cab drivers, where the other
drivers can’t start the vehicle, by adopting this method other drivers can’t
access the vehicle ignition. Besides the above application, the entry and exit of
the employee in the cab is sensed and the message will be sent to the control
room. A micro Tx is placed with an individual women, if they are in threat,
simply they have to press a button, where the location of the cab can be located
within a seconds , with the help of GPS.
3. BLOCK DIAGRAM
BUFFER
DRIVER
RELAY
GPS RECEIVER
FOR AREA
TRACKING
OUTPUT DEVICES
BUZZER
OR
DC MOTOR AS
WATER
SPRINKLER
M
OR
PANIC BUTTON
VISUAL
INDICATIO
N
ARM PROCESSOR
16 X 2 DISPLAY
GSM TX
+12 Volts
+5 Volts
230 V, AC
Supply
TRANSFORME
R
RECTIFIER
FILTER
REGULATOR
HARDWARE REQUIREMENTS:
ARM 7 / Cortex M3, LCD, Relay Driver, Relays, Resistors, Capacitors, LEDs, Crystal, Diodes, Transformer, Voltage
Regulator, Push Button.
SOFTWARE REQUIREMENTS:
Keil compiler uVision 4, Language: Embedded C or Assembly, WLPRO Programmer
4. METHODOLOGY:
In today's world, many women employees are facing the problem of
security which is taking place around the world especially across India. So our
main aim is to avoid the problems of women by developing a system which
can be implemented in real time. And protect them at night duties while
returning back to home from job. The same project can be implemented in
several applications with real time like protecting children’s from children
kidnapers and some are listed below. We are also implementing an application
called report of accident to vehicles carried by them automatically via the
GSM.
5. ADVANTAGES & DISADVANTAGES:
 ADVANTAGES:
1.
Women can go any where with more secure.
2.
Avoids the women rape.
3.
Cuprites can be easily found and can be punished
4.
Consumes less power
5.
Provides very accurate data via GPS system.
6.
Allows the remote location of asset from anywhere there is cellular
Service.
7.
Facilitates simple asset recovery and tracking.
DISADVANTAGES:
The only thing that is clear about constitutional protections for
location-based service information is the lack of clarity
6.APPLICATIONS:
1.
It can be used safeguard the women in critical conditions
2.
It can be used to detect the vehicles under theft.
3.
It can be employed for tracking any movable objects
4.
Fleet control.
5.
Stolen vehicle searching.
6.
Animal control.
7.
Race control.
8.
Espionage/surveillance.
7. CONCLUSION:
The proposed design will deal with critical issues faced by women in
the near past and will help to solve them with technologically sound
equipments and ideas. This system can overcome the fear that scares every
woman in the country about her safety and security.
THANK YOU