0% found this document useful (0 votes)
104 views26 pages

Child Safety

The document discusses the development of a mobile application to help ensure child and women's security. It aims to allow users to track a child's location, view their call and text histories, monitor their internet activity, and include safety features like time limits and pause functions. The app would also allow women to discreetly trigger an alarm and send their location to emergency contacts if they feel unsafe. The objectives, working, and literature review sections provide more details on existing similar apps and the features and design considerations for the proposed app.

Uploaded by

Arun Nagarajan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
104 views26 pages

Child Safety

The document discusses the development of a mobile application to help ensure child and women's security. It aims to allow users to track a child's location, view their call and text histories, monitor their internet activity, and include safety features like time limits and pause functions. The app would also allow women to discreetly trigger an alarm and send their location to emergency contacts if they feel unsafe. The objectives, working, and literature review sections provide more details on existing similar apps and the features and design considerations for the proposed app.

Uploaded by

Arun Nagarajan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 26

CHAPTER 1

INTRODUCTION

Now daily 80% of individuals on the planet having smartphones use people for different
purposes. The most issue of child tracking system android application. The android
application uses SMS services and googles geo assistance in locating the missing child’s
location by the survey of missing children in 2004. There are of total 5996 kids are missing.
Out of those only 4092 children return or were found by police. However, 1904 children are
missed. And also the kid's ages 14 years and 17 years are missed or ran far from home. The
oldsters are worried about their children. By missing the youngsters, the parents are scared to
go on a family trip. There are many chances to miss the child on the trip. The project is
developed for those parents who have worried to miss their child. In Today’s world, most of
Child’s have smartphones. With the assistance of smartphones, geo, and SMS-based tracking
applications parents can watch on their child. Geo is combined with GSM-based SIM card
into mobile to look at on Child's location. The google geo uses longitude and latitude to trace
the placement the SMS (Short Message Service) is used to communicate child side and parent
side applications. SMS service is used when mobile phones don’t support internet
connectivity. System ready to send the child’s smartphone's exact location in the parent's
smartphone when parent demand to test the child’s location.

Today is the world of Smartphone right from the villagers to metropolitan every one carries
Smartphone. Among these about 84 percent of the market is covered by android and this
share is growing continuously, considering this fact in mind, the very important issue of
Children security can be resolved using Android phone. Children security is the main aim of
this application. For a parent it is risky to give children with school bus driver. Will they
reach school? Will the driver drive bus within speed limit? Will he bring them to home
safely? Will he follow the proper root to home? All such question will come to the parent, so
there is a need to solve these questions. This application Secure Child will be very helpful to
such worried parents and assures them the safety of children. Internet has brought revolution
in the field of communication. One can use internet for various purpose but the main aim of
internet is sharing of information. The most useful application of internet is web services
where internet plays a very important role.
This Smartphones have changed the world as we can do almost everything from them. Faster
Internet connections, calling features and the smart user interface has attracted many people
to go for smartphones and almost everyone has access to it. Many businesses are using
Android smartphones to launch their app for ease of doing business. There are many scopes
of android based smartphones, one such is the „security for users‟, which can be achieved by
using different sensors and APIs of the Android operating system. Security of women has
been a major concern for our society, women feel uncomfortable walking alone at night and
avoid going to deserted places. Many cases of sexual and mental harassment against women
are scared to work in an environment where a number of male employees are more. Parents
are scared to send their girls to night parties, hangouts, and other places. People from
different age groups are also getting mentally and sexually harassed in different places like
school, college, workplaces, and public transports, etc, and they keep quiet about these
problems and they don’t have any means to ask for help in such a situation in India. Children
are also getting harassed and bullied in schools and colleges and they are unable to ask for
help. According to Wikipedia, over 14% of students from high school consider suicide, and
7% of them attempt suicide. Students that bullied are around 2 to 9 times more likely to
consider suicide than non-victims. A study from Britain says that in young people more than
suicide is related to bullying. Since abduction cases are increasing, parents always worry
when their small kid come late to home, and they always want to know their whereabouts.
Many non-government and government agencies are working constantly to solve these
problems.

OBJECTIVES
The Study Child and women security Application aims to deliver an android based mobile
app which provides the features to facilitates users in desperate situation and ask for help
from their parents, police and people from surroundings. The app can be used to track
location and send it to different emergency contacts, ask for help when getting bullied and
harassed by someone, and call police when there is emergency. This App is developed
carefully with simple and easy to understand user interface for users to easily access and use
the app in emergency without any confusion. The App uses simple pink colour theme and
doesn’t store any of the user data for any marketing purposes or extra profit. The app should
be capable of installing in any android-based devices with API level greater than 20. The app
has the feature of recording audio and video for later recognizing the criminals. The app is
fully dedicated to provide features for child and women security.
WORKING OF THE PROJECT
The application firstly asks you to login to your account if user doesn’t have an account
he/she can register. After Login the user can see the details of their respective children like
their account Id etc. After this user can see several choices to track their children like
location, contact, web history, social media which allows user to know if they are performing
illegal actions or seeing illegal things. For example, if the user wants to know the location of
a child then through the location tracker the user can locate his/her particular child and track
its Whereabouts. Then in contacts user can see that who is contacting his/her particular child
and whether the person communicating is known. Further user can view the web – history of
his child to know whether the child is not browsing illegal activities online. Further some
features can be added for the child’s safety like Time Limit, Instant Pause, Schedules which
does not makes the child too distracted from something important and helps to avoid
excessive usage of the device. The application works efficiently and the user can use the
particular application very easily and hence can protect their children from illegal things
happening around them and user the children will always be protected from such harmful.

LITERATURE SURVEY
ADVANCE WOMAN SECURITY SYSTEM BASED ON ANDROID
2016
In [13], Kavita Sharma et al. describes about safety and security of women by using
electronic device to both detect the problem & alert Authorities. The authors suggest a new
perspective to use technology to protect women that is GPS and GSM based ―Women
Security System―app that provides the combination of GPS devices as-well-as provides
alerts and message with an emergency button trigger. At times of danger the user has to press
volume key button after which an alert message is sent to register contacts and a voice call to
the first registered contact. The alert message is ―I AM IN TROUBLE PLEASE HELP ME‖.
The project was developed in Android which provides the level of reliability, availability and
compatibility.
SECURE FOR WOMEN: AN ANDROID APPLICATION
2016
In [15], Saleem Pasha et al. have developed bSecure a personal safety app. This application
was developed with a focus on women safety. Whenever the user feels insecure they can use
this application to be safe. When the user clicks the power button 3 times, the app activates
and for every 30 seconds it sends the user’s current location to the registered contact number
in the form of SMS. If the helper’s mobile is in silent mode, it automatically changes to
general mode with a notification message ―I’M IN DANGER…‖ to the address of the user
repeatedly. Another feature is that it captures the surrounding environmental images by a
single shake of the mobile. This captured image will be sent to the Email of the receiver. The
registered contact and GPS location are updated and saved in a database.

PERSONAL EMERGENCY NOTIFICATION APPLICATION FOR MOBILE


DEVICES
2015
In this paper [20], Akansha Raj et al. describes about an emergency notification application
for mobile devices. This application has an interface which is capable of sending emergency
notification messages. The application implements a location awareness system which gives
the user’s current location, sends this location using Short Message Service (SMS) and shares
location with dear ones and the voice recording is saved in the database for future reference.
At first the user shares his/her location with the server from where other users can get this
location if they have the authentication provided by the user.

SAUVER: AN ANDROID APPLICATION FOR WOMEN SAFETY,


2015
In [21], Bramarambika Thota et al. have proposed Sauver, a personal safety android
application. This app works with a single click and sends SMS notification containing
location of user to the registered contacts for every few seconds. One of the registered
contacts will get a call. Also, the registered contacts and GPS location are saved in the
database from time to time. Also the author briefs about the usage of smart phones equipped
with GPS navigation has rapidly increased over past five years and hence they developed this
application that can provide security.
SELF SALVATION – THE WOMEN’S SECURITY MODULE
2015
In this paper [24], Prof. Basavaraj Chougula et al. suggests a new perspective to use
technology to protect women. The system resembles a normal belt which when activated,
tracks the location of the user using GPS and message is sent with through GSM to three
registered contacts and the police control room. The system also includes a screaming alarm
that uses real-time clock in order to call out for help. It also generates an electric shock for
self-defense and to injure the attacker. The user does not need any smart phone like other
applications. The use of sophisticated components ensures accuracy and makes it reliable.
The belt provides security to the victim in any kind of emergency situations.
CHAPTER 2
SYSTEM ANALYSIS

EXISTING SYSTEM
In the existing system there is no monitoring system for girls, it should create many problems
for them and the no safety mechanism to protect the girls from the misbehaviour activities. In
addition, in the existing system there is no alert mechanism for the girl’s safety, it should be
done by manually only.

DISADVANTAGES
 All the existing systems must be connected to the GPRS service to work properly,
hence cannot be used during emergency if there is no internet connectivity.
 There is no hidden camera detector which is portable to ensure our privacy.
 Monitoring was tedious.
 Mischance in arriving rate.

PROPOSED SYSTEM
We proposed in this project. an Android Application is used to find the location and send the
location to the group of people stored in the phone, SOS Message, Track your phone and
additionally we used a technique of clicking the volume button, if the button is pressed on
time then message alert, second if button is pressed two times then message and audio and
third if the button is pressed long time then.

ADVANTAGES OF PROPOSED SYSTEM


 Easy tracking in Map
 Get the best route to the kid
 Child phone will alert the parent.

EXISTING APPLICATION
These issues include the Meaning of child abuse. How the child is abused by the abuser?
How they are affected by abuser? How the child is affected mentally in the society? How can
they get protection from the abuser? What are the consequences that are affecting the child
further? These applications give the guidelines and help the child to overcome the abuse.
How can the parents and relatives help child to overcome from the abuse. This application
can give internet links to overcome the abuse. This resource may help the child to know more
knowledge on the abuse. These features are helpful for the children and parent to become
aware of child abuse. The children earn make use of this application to improve their
knowledge on child abuse.

Child.Abuse.Protection:
This app will help you to get the child educated about abuse. This app is created by The
CAPS team (Child Abuse Protection Support), Travis Springer, founder of CAPS, and
Spencer Jurgensmeyer, co-founder of CAPS. The application will educate all the kind of the
people all over the country.

Child Abuse Atlas:


For medical professionals serving victims of child abuse, the Child Abuse Atlas includes
hundreds of cases, thousands of high-quality images, Case Review functionality, and
Evidentia Publishing's evidence-based child abuse library, making it a uniquely powerful tool
for learning and collaboration. The child abuse atlas gives all the information about the child
abuse and gives the details about the child and the parents.

POCSO ACT:
POCSO ACT - Protection of Children from Sexual Offences. POCSO app helps children to
know their rights as well as their parent / guardian rights for their children all for the well-
being of the children. With POCSO app, one can strengthen their own limitations as well as
punish those people who exploit children either for their personal benefit or for various other
purposes. POCSO app is just paving the way by creating awareness about child rights and
their uses. Every Child / Parent has the right to get knowledgeable on POCSO Act. Many
tragedies have befallen on children of all countries. Let’s make POCSO lead children a better
life. So get POCSO app right away and help needy children of your society. The POCSO
ACT is the application which gives the information about the rights of the child.

DISADVANTAGE
This kind of android application provides only information about the child abuse and quotes
about the child abuse. There is not any tracking machine to locate the children or they don’t
have option to send the image immediately about how they are abused. Users cannot contact
any psychologist directly. There is no share or giving ideas for protection from the Child
Abuse. It’s used mostly by parents not by children and there is no protection mechanism.

FEASIBILITY STUDY
1. Technology & System Feasibility:
Feasibility study of technology and system depends on the interface design of how android
application is interactive, best visualized and user-friendly for architectural students and on
the system functionalities how the features of architectural application are best and useful and
also on hardware availability.

2. Human-Factor/Time Feasibility:
Feasibility study of human-factor and schedule depends on user background so that user can
set their on background and on comfortability, how the user is able to use the application
efficiently and produce meaningful and precise output and also on user’s demands, project
deadlines and readiness that how the application fulfills the flexibility and requirement of the
users.

3. Financial Feasibility:
Economy feasibility study depends on infrastructure cost, Maintenance cost and overall
solution cost of proposed application.

4. Legal Feasibility:
Legal feasibility depends on privacy, security and legal concerns such as data privacy,
accountability, nepotism , and many more.

5. Operational/Resource Feasibility:
It depends on how application (system) solves the problems and satisfies the requirement of
users by using some operational parameter such as affordability, reliability, disposability,
maintainability, sustainability, usability, supportability, producibility and resource feasibility
depends on time availability and amount of resources.
CHAPTER 3
SYSTEM REQUIREMENTS

HARDWARE REQUIREMENTS

COMPONENT SPECIFICATION
CPU Intel Dual Core 2.4 GHz or Later
RAM 2GB DDR2
Hard Disk 160 GB
Display Wide VGA (Video Graphics Array)
Input Keyboard and Mouse
Optional Devices Android Phone (Jelly Bean 4.2 or higher)

SOFTWARE REQUIREMENTS

COMPONENT SPECIFICATION
Front End Android
Back End MySQL
IDE Android Studio
Language Java
Platform Windows 7 or later
Database Server XAMPP

SOFTWARE DESCRIPTION
ANDROID
The Android software development kit (SDK) includes a comprehensive set of development
tools. These include a debugger, libraries, a handset emulator based on QEMU,
documentation, sample code, and tutorials. Currently supported development platforms
include computers running Linux (any modern desktop Linux distribution), Mac OS X 10.5.8
or later, and Windows 7 or later. As of March 2015, the SDK is not available on Android
itself, but software development is possible by using specialized Android applications.

Until around the end of 2014, the officially supported integrated development environment
(IDE) was Eclipse using the Android Development Tools (ADT) Plugin, though IntelliJ
IDEA IDE (all editions) fully supports Android development out of the box, and NetBeans
IDE also supports Android development via a plugin. As of 2015, Android Studio, made by
Google and powered by IntelliJ, is the official IDE; however, developers are free to use
others, but Google made it clear that ADT was officially deprecated since the end of 2015 to
focus on Android Studio as the official Android IDE.

Additionally, developers may use any text editor to edit Java and XML files, then use
command line tools (Java Development Kit and Apache Ant are required) to create, build and
debug Android applications as well as control attached Android devices (e.g., triggering a
reboot, installing software package(s) remotely).

Enhancements to Android's SDK go hand in hand with the overall Android platform
development. The SDK also supports older versions of the Android platform in case
developers wish to target their applications at older devices. Development tools are
downloadable components, so after one has downloaded the latest version and platform, older
platforms and tools can also be downloaded for compatibility testing.

Android applications are packaged in .apk format and stored under /data/app folder on the
Android OS (the folder is accessible only to the root user for security reasons). APK package
contains .dex files (compiled byte code files called Dalvik executables), resource files, etc.

ANDROID DEBUG BRIDGE


The Android Debug Bridge (ADB) is a toolkit included in the Android SDK package. It
consists of both client and server-side programs that communicate with one another. The
ADB is typically accessed through the command-line interface, although numerous graphical
user interfaces exist to control ADB.

JAVA STANDARDS
Obstacles to development include the fact that Android does not use established Java
standards, that is, Java SE and ME. This prevents compatibility between Java applications
written for those platforms and those written for the Android platform. Android only reuses
the Java language syntax and semantics, but it does not provide the full class libraries and
APIs bundled with Java SE or ME. However, there are multiple tools in the market from
companies such as Myriad Group and UpOnTek that provide Java ME to Android conversion
services.

ANDROID STUDIO
Android Studio is the official integrated development environment (IDE) for the Android
platform. It was announced on May 16, 2013 at the Google I/O conference. Android Studio
was in early access preview stage starting from version 0.1 in May 2013, then entered beta
stage starting from version 0.8 which was released in June 2014. The first stable build was
released in December 2014, starting from version 1.0.

Based on JetBrains' IntelliJ IDEA software, Android Studio is designed specifically for
Android development.[8] It is available for download on Windows, macOS and Linux, and
replaced Eclipse Android Development Tools (ADT) as Google's primary IDE for native
Android application development.

FEATURES
New features are expected to be rolled out with each release of Android Studio. The
following features are provided in the current stable version:
 Gradle-based build support
 Android-specific refactoring and quick fixes
 Lint tools to catch performance, usability, version compatibility and other problems
 ProGuard integration and app-signing capabilities
 Template-based wizards to create common Android designs and components
 A rich layout editor that allows users to drag-and-drop UI components, option to
preview layouts on multiple screen configurations[13]
 Support for building Android Wear apps
 Built-in support for Google Cloud Platform, enabling integration with Firebase Cloud
Messaging (Earlier 'Google Cloud Messaging') and Google App Engine[14]
 Android Virtual Device (Emulator) to run and debug apps
XAMPP
XAMPP is a free and open source cross-platform web server solution stack package
developed by Apache Friends, consisting mainly of the Apache HTTP Server, MariaDB
database, and interpreters for scripts written in the PHP and Perl programming languages.
XAMPP stands for Cross-Platform (X), Apache (A), MariaDB (M), PHP (P) and Perl (P). It
is a simple, lightweight Apache distribution that makes it extremely easy for developers to
create a local web server for testing and deployment purposes. Everything needed to set up a
web server – server application (Apache), database (MariaDB), and scripting language (PHP)
– is included in an extractable file. XAMPP is also cross-platform, which means it works
equally well on Linux, Mac and Windows. Since most actual web server deployments use the
same components as XAMPP, it makes transitioning from a local test server to a live server
extremely easy as well.

The term XAMPP is an apparent acronym. However, there is no official acronym expansion
specified on the Apache Friends website. Their homepage header reads “XAMPP Apache +
MariaDB + PHP + Perl”, indicating that this abbreviation is a recursive acronym.

MySQL was replaced with MariaDB on 2015-10-19 and beginning with XAMPP versions
5.5.30 and 5.6.14, effectively altering the meaning of the acronym.

FEATURES
XAMPP is regularly updated to the latest releases of Apache, MariaDB, PHP and Perl. It also
comes with a number of other modules including OpenSSL, phpMyAdmin, MediaWiki,
Joomla, WordPress and more. Self-contained, multiple instances of XAMPP can exist on a
single computer, and any given instance can be copied from one computer to another.
XAMPP is offered in both a full and a standard version (Smaller version).

USAGE
Officially, XAMPP's designers intended it for use only as a development tool, to allow
website designers and programmers to test their work on their own computers without any
access to the Internet. To make this as easy as possible, many important security features are
disabled by default. XAMPP has the ability to serve web pages on the World Wide Web. A
special tool is provided to password-protect the most important parts of the package.
XAMPP also provides support for creating and manipulating databases in MariaDB and
SQLite among others.

Once XAMPP is installed, it is possible to treat a localhost like a remote host by connecting
using an FTP client. Using a program like FileZilla has many advantages when installing a
content management system (CMS) like Joomla or WordPress. It is also possible to connect
to localhost via FTP with an HTML editor.

PHP is a server-side scripting language designed primarily for web development but also
used as a general-purpose programming language. Originally created by Rasmus Lerdorf in
1994,[4] the PHP reference implementation is now produced by The PHP Development
Team.[5] PHP originally stood for Personal Home Page,[4] but it now stands for the recursive
acronym PHP: Hypertext Preprocessor.[6]

PHP
PHP code may be embedded into HTML or HTML5 markup, or it can be used in
combination with various web template systems, web content management systems and web
frameworks. PHP code is usually processed by a PHP interpreter implemented as a module in
the web server or as a Common Gateway Interface (CGI) executable. The web server
software combines the results of the interpreted and executed PHP code, which may be any
type of data, including images, with the generated web page. PHP code may also be executed
with a command-line interface (CLI) and can be used to implement standalone graphical
applications.

The standard PHP interpreter, powered by the Zend Engine, is free software released under
the PHP License. PHP has been widely ported and can be deployed on most web servers on
almost every operating system and platform, free of charge.

The PHP language evolved without a written formal specification or standard until 2014,
leaving the canonical PHP interpreter as a de facto standard. Since 2014 work has gone on to
create a formal PHP specification.

PHP 7
During 2014 and 2015, a new major PHP version was developed, which was numbered
PHP7. The numbering of this version involved some debate. While the PHP 6 Unicode
experiment had never been released, several articles and book titles referenced the PHP 6
name, which might have caused confusion if a new release were to reuse the name. After a
vote, the name PHP 7 was chosen.

The foundation of PHP 7 is a PHP branch that was originally dubbed PHP next generation
(phpng). It was authored by Dmitry Stogov, Xinchen Hui and Nikita Popov, and aimed to
optimize PHP performance by refactoring the Zend Engine to use more compact data
structures with improved cache locality while retaining near-complete language
compatibility. As of 14 July 2014, WordPress-based benchmarks, which served as the main
benchmark suite for the phpng project, showed an almost 100% increase in performance.
Changes from phpng are also expected to make it easier to improve performance in the
future, as more compact data structures and other changes are seen as better suited for a
successful migration to a just-in-time (JIT) compiler. Because of the significant changes, the
reworked Zend Engine is called Zend Engine 3, succeeding Zend Engine 2 used in PHP 5.

Because of major internal changes in phpng, it must receive a new major version number of
PHP, rather than a minor PHP 5 release, according to PHP's release process. Major versions
of PHP are allowed to break backward-compatibility of code and therefore PHP 7 presented
an opportunity for other improvements beyond phpng that require backward-compatibility
breaks, including wider use of exceptions, reworking variable syntax to be more consistent
and complete, and the deprecation or removal of various legacy features.

PHP 7 also introduced new language features, including return type declarations for
functions, which complement the existing parameter type declarations, and support for the
scalar types (integer, float, string, and boolean) in parameter and return type declarations.

MySQL
MySQL is an open-source relational database management system (RDBMS). Its name is a
combination of "My", the name of co-founder Michael Widenius' daughter, and "SQL", the
abbreviation for Structured Query Language. The MySQL development project has made its
source code available under the terms of the GNU General Public License, as well as under a
variety of proprietary agreements. MySQL was owned and sponsored by a single for-profit
firm, the Swedish company MySQL AB, now owned by Oracle Corporation. For proprietary
use, several paid editions are available, and offer additional functionality.

MySQL is a central component of the LAMP open-source web application software stack
(and other "AMP" stacks). LAMP is an acronym for "Linux, Apache, MySQL,
Perl/PHP/Python". Applications that use the MySQL database include: TYPO3, MODx,
Joomla, WordPress, phpBB, MyBB, and Drupal. MySQL is also used in many high-profile,
large-scale websites, including Google (though not for searches), Facebook, Twitter, Flickr,
and YouTube.
CHAPTER 4
PROJECT DESCRIPTION

This system consists of two components: Child App and Parent Control App. The Child App
will be the android application or android phone. It is designed in such a way that it has very
few elements and very less user interaction and the interval at which location updates are
received can be predefined, but ideal timing will be every 10minutes. In this system server
will receive data sent from the client side and it will save it in a database and display to the
parent app. The tracking is possible with two main components: GPS and Network; these two
features are present in almost all smart phones now. For first time once user installs the app,
he/she should start the app and after that every 10minutes or any predefined time the
application will start automatically and fetch the location and send to server.

SCOPE OF THE PROJECT


Security of women and children has been a major concern in our society. Rape cases and
abductions have increased for women as well as children. People of different age groups are
getting mentally and sexually harassed in public places like school, colleges, work places and
public transport etc. Guardians and parents are worried about their children security. Many
NGO’s and government agency are struggling to provide an accurate solution for these social
problems. To answer this need, ―Child and women security application introduces a location
and security based mobile application, which works on Android devices. The App provides
dedicated features to assist women and children in desperate situations, where they can ask
help from police, parents and anyone nearby. Discussed app is in the constant development
phase as the discussion proceeds.

MODULES
 User Module
 Guardian Module
 Location Module
 Alert Module
USER MODULE
In this module, user can register their accounts in their smart phones and login to the main
page of the app. The app uses one time registration so that enables fast retrieval of local
information. In the registration process, the student can upload the basic information along
with guardian details and contact number and secure authentication password for login
purpose. The login and profile details are available in centralized server. The application
regularly updates the user location and the location will be available to the guardian app.

GUARDIAN MODULE
In this module, the guardian can use separate smart phone to register for their child safety.
The login details will be simple; it does require the guardian phone number only. The Child
Location will be available to the guardian app in the main screen.

LOCATION MODULE
In this module, user location will record in the centralized server in regular interval of one
minute. The location usually contains the Latitude and Longitude position and the position
will be available in the Google Map API of the User App and Guardian App. For the
recording of location parameter, user must turn on Mobile Data and Location settings in their
phones.

ALERT MODULE
In this module, it generates a very high-volume scream in times of distress when the lungs of
a person fail in screaming in trouble. The generated scream is in a child’s voice is severely
helpful in discouraging the potential strong trouble makers. The only work done by this
application is whenever the person pushes or touches the application, the phone screams
loudly and SMS will send to the guardian phone.
CHAPTER 5
SYSTEM DESIGN

ARCHITECTURE DIAGRAM

FLOW DIAGRAM
USE CASE DIAGRAM
SEQUENCE DIAGRAM

Parent Child Child Safety Location Finder Alert


App

1: Registration

2: Login

3: Child Connect

4: Send Location

5: Track Location

6: GPS Location

7: Show in Map

8: Alert Parent

9: Push Notification
CHAPTER 6
SYSTEM TESTING

Before applying method to design effective test cases, a software engineer must understand the
basic principles that guide software testing. Davis (DAV95) suggests a set of testing principles
which have been adapted for use in this book.
 All tests should be traceable to customer requirements.

 Test should be planned long before testing begins.

 Test pare to principle applets to software testing.

 Testing should begin “in the small” and progress towards testing “in the page”

 Exhaustive testing is not possible.

UNIT TESTING
Unit testing focuses on verification errors on the smallest unit of software design-the module.
Using the procedural design description as a guide, important control paths are tested to
uncover errors within the boundary of the module.
The module interface is tested to ensure that the information properly flows into and out of the
program unit under test. Boundary conditions are tested to ensure that the module operates
properly at the boundaries established to limit of restrict processing.

INTEGRATION TESTING
Integration testing is a systematic technique for constructing the program structure while
conducting test to uncover errors associated with interfacing. The objective is to take unit
tested modules and build a program structure that has been dictated by design.

WHITE BOX TESTING


White box testing is some time is called glass box testing, is a test case design that uses a
control structure of the procedural design to drive the test cases. Using white-box testing
methods, the software engineer can drive test cases that
 Guarantee that logical decisions are on the true and false sides
 Exercise all logical decisions are on the true and false sides
 Execute all loops at their boundaries and within their operational bounds
 Exercise internal data structure to assure the validity

ACCEPTANCE TESTING
Finally when the software is completely built, a series of acceptance tests are conducted to
enable the client to validate all requirements. The user conducts these tests rather than the
system developer, which can range from informal test drive to a planned and systematical
executed series of tests.
These acceptance tests are conducted over a period of weeks or months, there by uncovering
cumulative errors that might degrade the system order time. In this process alpha testing and
beta testing are used to uncover the errors that only the end user seems able to find.

ALPHA TESTING
The customer conducts the alpha test at the developer’s site. The client notes the errors and
usage problems and gives report to the developer. Alpha tests are conducted in a control
environment.

BETA TESTING
The beta testing is conducted at one or more customer’s sites by the end users of the software.
Unlike the alpha testing, the developer is not present. Therefore, a beta test is a “live”
application of the software in the environment that cannot be developed by the developer. The
customer records all the problems encountered during the beta testing and reports these to the
developers at regular intervals.

BLACK BOX TESTING


Black box testing focuses on the functional requirements of the software. That is black box
testing enables the software engineer to drive a set of input conditions that will fully exercise
the requirements for a program.
Black box testing is not an alternative for white box testing techniques. Rather, it is a
complementary approach that is likely to uncover different class of errors.
Black box testing attempts to find errors in the following categories:
 Interface errors.
 Performances in data structures or external database access.
 Performance errors.
 Initialization and termination errors.
 Incorrect or missing functions.
All the above-mentioned errors were checked in the process of black.
CHAPTER 7
IMPLEMENTATION

GPS SENSORS
GPS is a multiple – satellite based radio positioning system in which each GPS satellite
transmits data that allows user to precisely measure the distance from the selected satellite to
his antenna and to compute position, velocity and time parameters to high degree of accuracy.
GPS delivers with high sensitivity and accuracy with low power consumption. GPS module
design is flexible to accommodate various RF interference

INPUT DESIGN
Input Screen must be design in such a way to give an easy navigation throughout the screen
without the violation of the input validation. Input design is the process of converting the
user-originated data into a computer-based format. Inaccurate input data are the most
common cause of error in data processing. The goal of an input data are collected and
organized into a group and error free. Input data are collected and organized into a group of
similar data. Once identified, appropriated input media are selected for processing.
The design was done with six major objectives in mind:
• Effectiveness
• Accuracy
• Ease o Use
• Consistency
• Simplicity
• Attractiveness

OUTPUT DESIGN
Designing computer output should proceed in an organized, well throughout manner; the
right output must be developed while ensuring that each output element is designed so that
candidates will find the system easy to use effectively. The term output refers to any effect
produced by a system whether displayed or executed. When we design an output we must
identify the specific output that is needed to meet the system. The usefulness of the new
system is evaluated on the basis of their output. The output from the computer systems is
required primarily to communicate the results of processing to users.
An output generally refers to the result that is generated by the system. An application is
successful only when it can produce efficient and effective reports. The reports generated
must be useful for the management and for the future reference.
CHAPTER 8
CONCLUSION AND FUTURE SCOPE

CONCLUSION
The system has presented a Smart safety device for child monitoring using Android. It
provides efficient monitoring of child with the help of GPS and GSM based Technology. The
proposed system provides communication between parent and child. It provides parents with
the realtime Location, and the ability to locate their child or alert by standers in acting to
rescue or comfort the child. The application keeps track of the child periodically and updates
the status of child to the user. Thus, the parents are always kept aware of their Child
constantly

FUTURE SCOPE
For surveillance of the child's surroundings, to get a clearer picture of the location, this
wearable can also contain a camera module incorporated in it. The camera will be collecting
information in the same manner as the GPS module. It will be on standby conserving power
waiting for the particular keyword "SNAPSHOT" to be sent from the user's smart phone to
the GSM shield will activate the camera to start clicking a snapshot of the surrounding and
save the file temporarily on the external microSD card. After which Arduino Uno will access
the saved image from the microSD storage and transfer it to the GSM module which send it
to the user via SMS/MMS text.

You might also like