Está en la página 1de 56

Certificate

We hereby accept the work contained in this report titled: Helping Hand for women
Harassment system, as a confirmation to the required standards for the partial fulfillment of
the degree of Bachelors of Science in Software Engineering.

Department of Computer Science

BILQUIS POST GRDAUATE COLLEGE , FOR WOMEN


PAF NUR KHAN. RAWALPINDI.

1
Declaration

We hereby declare that this work, neither whole nor in part, has been copied from any source. It
is further declared that we have prepared this report entirely on the basis of our personal efforts
made under the sincere guidance of teachers especially our supervisor Ma’am Nazia. If any part
of this thesis is proved to be copied out from any source or found to be reproduction of some
other, we will stand by the consequences. No portion of the work presented has been submitted
in support of any application for any other degree or qualification of this or any other university
or institute of learning.

MEMBERS’ SIGNATURES

2
Dedication

We dedicate this project to our Parents, Faculty Members and BPGCW who have been a great
source of inspiration and encouragement to us on every stage of our great academic journey.

Thanks for being with us, always!

3
Acknowledgements

We would like to express my appreciation to our parents, for their infinite and much needed
moral and financial support. We would also like to thank our Project Coordinator, who
accommodate with us through the last years, and guided us through each step towards
submission. He very patiently organized the internal and external evaluations, and then deal with
our lack of ability to do the corrections, asked of me, diligently.

We are especially grateful to our supervisor Dr. Muhammad Babar. Not only for taking on our
project under their wing, but also for providing us with their unscrupulous guidance whenever
required.

We would like to extend our gratitude to all the teachers who taught us the hacks we have learnt
during our degree, and have successfully applied to our Final Year Project and the dissertation.
And last, but not the least, We appreciate all the support from the admin staff, exam office, and
all other beings on campus, especially to our friends, for always lifting up my spirits and being
with us.

4
Table of content
Abstract ......................................................................................................................................................... 6
3.2. Functional Requirements ........................................................................................................ 20
3.3. Non Functional Requirements ................................................................................................ 21
3.3.1. Performance Requirements ..................................................................................................... 21
3.3.2. Safety Requirements ............................................................................................................... 21
3.3.3. Security Requirements ............................................................................................................ 21
3.3.4. Software Quality Attributes .................................................................................................... 21
3.4. Advantages/Benefits of proposed system ............................................................................... 22
3.5. Design Considerations ............................................................................................................ 22
4.1 .Use Cases Diagrams .................................................................................................................. 24
4.2. Detailed Use Cases .......................................................................................................................... 25
4.2.1. User Sign In .................................................................................................................................. 25
4.3. Class Diagram .............................................................................................................................. 37
4.4. Sequence Diagram for login ........................................................................................................ 38
4.5. Sequence Diagram for shake phone ............................................................................................. 39
4.7. Activity Diagrams ........................................................................................................................ 41
Figure 4.7: Activity Diagrams ............................................................................................................ 41
Adding user record in database. ......................................................................................................... 52

5
Abstract
This Women Harassment System valuates various tracking systems which monitor the women
children, in an individual basis. This type of tracking is done due to children and women who
helpless at the time of lost from school to home or home to school, adults also face issues like
kidnapping, harassment by gangsters or others, even elders face issues like memory loss or
autism. These problems mainly state us to study about the remedy measures to overcome the
need of these people while at the time of risk. To avoid these problems among various peoples,
this system alert the receiver end that the people in front end are under danger through messages
or calling them automatically. These activities are done by GSM used for mobile communication
& GPS latitude and longitude positions through direct satellite connection. What is especially
discouraging about this situation is that at the same time that so much energy and money is being
invested in efforts to attract and retain women in science, engineering, and medical fields, it
appears women are often bullied or harassed out of career pathways in these fields.

6
Chapter 1: Introduction

1.1. Overall Description

The basic purpose of this document is to elicit, analyze and define high-level security for the women
and children. Android phone application designed to help user to provide a security place where they
can communicate with their private persons in case of any emergency .It may be with the help of
sending message, calls, location and alert dialog etc. This application helps parents and security
panels to track the location of women and children by Global positioning system (GPS). Once user
find their respective location they are looking for they can make help for the women and safe them.
The important feature of the women harassment system that registered person easily gets to know
that the user needs help. It also brings the current location of the user. The police can also view and
offer help with the help of the cloud services in which they can track the position of the user at any
time. It possible to track the cloud services in which they can track the position of the user and .The
exact position of the user is track with the help of Google Maps; with the help of latitude and
longitude values it is possible to locate any position.

1.1.1. Objectives

Designing a women's harassment application to be used for women's safety. Recently, safety
concerns are the society's biggest issue. In this application we can easily get to know that the
women needs help contact with their private persons without having to spend any money.

1.1.2. Problem Description


There is no request for the scheme of harassment of females, which involves no cash.
When users install our application, some category should be used to verify women's place.
When users or females need help from their individuals by simply pressing the send button, the a
pplication will be sent to the private person. Then both private individuals and females chat and c
all each other as well.

By developing women Harassment application , it will provides security for the alone women and
children they suffer from the security concerns.

1.1.3. Methodology

7
The process model followed in this system will be Incremental model. There will be 4 increments or
phases as requirements, designing, implementation and testing. Each increment will be an
evolutionary model to implement.

1.1.4. Limitation
In the existing system we will discussed that how the women and children get help from their registered
person in case of any emergency and how the women can inform to the registered person. This
application can also help police department to reduce the crimes, which are against women and
the evidence can be used to trace the crime.

1.1.5. Title of the project

The project title is “Helping Hand for Women Harassment System”.

1.1.6. Motivation

The advantage of developing this app is to secure the women and children and provide safety
measure for them.

1.1.7. Project Scope

 The application allow user to register the private persons.


 Search for detail view of registered persons.
 The application must keep user details.
 Manage the security by providing the current location from Global positioning system.
 Send the call and message without having real money.
 Chat and Call option (Contact through mobile number).

1.1.8. Business Context

This application will helpful for those who want to get secure from the harassment issues. It can
provide the current location of the women to the private persons. This application send alert message
to the nearest police station.
Figure 2 main functional classes

Women Police/Parents
8 Women
Security App
Message/Alarm Message Message

Acknowledgement

1.1.9. Operating Environment

This application support android phones provided with internet connection.


 The application will work on smart android phones.
 Android phone must be connected with internet.
 The application version is 21.
 System development is done with Android studio.
 Restful APIs is used to read the data from database into mobile application.
 Backend with JAVA.
 Database with firebase.
 Front end with XML.
 Android operating system.

1.1.10. Assumptions and Dependencies

There are some hypotheses in this system's software, hardware, and users that can influence
demands if altered.
1.1.11. Hardware and Software:

Android studio:

It’s needed to develop the mobile application.

Firebase:

It will be used to perform all the database transaction.

Restful API’s with Retrofit:

The users will communicate with the software of the application.


Users:

9
The user is supposed to communicate with the software only. First the customer must enter i
n the application and then the user can access the application after registering and then share
their place with the enrolled people.

1.2. Functional Requirements

1.2.1. User Sign in:

a. Description

The application will provide the facility to sign in to application.

b. Criticality

Medium.

c. Technical issues

There must be reset option in case of forgetting password.

d. Cost and schedule

This requirement isn’t expecting any cost.

e. Risks

User account should be secure enough so nobody can access otherwise the data can be steal and can
be misused.

f. Dependencies with other requirements

The user account will depend for the information from the existing database.

1.2.2. Registered:

a. Description

The application will provide the registration option where user can register by email.

b. Criticality

10
High.

c. Technical issues

This interface should be simple and easy to use.

d. Cost and schedule

This requirement isn’t expecting any cost.

e. Risks

None

f. Dependencies with other requirements

The email must be valid.

1.2.3. View Registered:

a. Description

The system will provide the facility to sign out the system.

b. Criticality

High.

c. Technical issues

Easy to use.

d. Cost and schedule

This requirement isn’t expecting any cost.

e. Risks

None

11
f. Dependencies with other requirements

The system must be logged in.

1.2.4. Forgot/Reset Password:

a. Description

The system should provide the facility of reset password and also provide to set a new password
in case of forgetting.

b. Criticality

Medium

c. Technical issues

None

d. Cost and schedule

No cost expected.

e. Risks

None

f. Dependencies with other requirements

Reset link should be sent to the user email so that they can easily change/reset it and update the
database.

1.2.7. Message (Chat):

a. Description

The application provides the facility of chat with other user.

b. Criticality

12
High.

c. Technical issues

None.

d. Cost and schedule

No such cost affects.

e. Risks

None.

f. Dependencies with other requirements

User must be logging.


must connect with internet.

1.2.8. Call:

a. Description

The system will provide the facility of call.

b. Criticality

High.

c. Technical issues

Not as such

d. Cost and schedule

No cost effect

e. Risks

None.

13
f. Dependencies with other requirements
g. must be logging.

1.3. External Interface Requirements

1.3.1. User Interfaces

Android application will provide user interface with three option register, instruction and view
registered. Our private persons can register with the application with valid phone number, where they
can receive the call, message and alerts and with the internet connection they can also view the
current location of the user. So user can easily get the help from their registered persons and also
communication through chat.
.
1.3.2. Hardware Interfaces

1.3.2.1. Android Application

The device is used to reading/writing data. In this application user will register. So registered person
can get the further information of user and help them.

1.3.3. Software Interfaces

 DB tool (Firebase) will be used to maintain database


 Backend with JAVA
 Front end with XML.
 Database with firebase.

1.3.4. Communications Interfaces

 Chat
 Call

1.4. System Features

1.4.1. Alert Notification: The application is capable to send alert notification.


1.4.2. Message (Chat) :The application is provided the facility to chat with other user.
1.4.3. Call: The application is provided the facility to call to other user.
1.4.4. Current location of user is provided to the register person.
1.4.5. Alert message and current location is generated in the nearest police station.

14
1.5. Nonfunctional Requirements

1.5.1. Performance Requirements

The system does not have a particular metric to verify efficiency, but the application should
be quick enough to assist user in the event of harassment and user can readily interact with ot
her registered persons.

1.5.2. Safety Requirements

The system should be built-


in in a easy manner to provide the greatest possible safety. In any case, the collection of infor
mation can be helpful and the complete check can be improved to improve safety.

1.5.3. Security Requirements

Application set privileges to the end-user.


Have checking the internet connection.

1.5.4. Software Quality Attributes

 The application will execute on android phones and will give output.
 Application will be reliable.
 System will be secure.

1.5.5. Business Rules

This request will help those who want to be safe from the problems of harassment. It can pro
vide private individuals with the user's present place. This request sends an alert signal to the
closest police station and the present place.

1.6. Other Requirements

2. Database 2. DB (Firebase) 3. Coding (Java) 4. Coding(XML)

1.6.1. Reliability

The system bought to have a high performance specified the user have to be ready to see a w
ell-organized and managed system.

15
1.6.2. Maintainability

Our system is specified for one task. There will not be so much change in the future. Therefore,
maintainability does not have more importance than it has in normal software.

1.6.3. Portability

Regarding user interface, an important design goal is keeping it simple. User interface should
not be so complicated. Besides, the user should not need to do anything for basic usage
of the system.

1.6.4. Extensibility

Since the system will be used online and by a single user, security is not an issue.

1.6.5. Reusability

System will be available as long as the application is running on is available.

1.6.6. Application Affinity/Compatibility

Accuracy of the system is important for the user. For this reason, the system should have 100%
accuracy.

1.7. Operational Scenarios

When the women are in unsecure area then they will be able to inform their problem to the related
registered persons by using this app. The registered person need to login the application, the
application provide the current location of women send message and call to the registered person for
the awareness of women harassment.

1.8. Summary

This application helps parents and security panels to track the location of women and children by
Global positioning system (GPS). Once user find their respective location they are looking for they
can make help for the women and safe them.
The important feature of the women harassment system that registered person easily gets to know
that the user needs help. It also brings the current location of the user. The police can also view and
offer help with the help of the cloud services in which they can track the position of the user at any
time. It possible to track the cloud services in which they can track the position of the user and sensor

16
generate alarm in the respective police station .The exact position of the user is track with the help of
Google Maps; with the help of latitude and longitude values it is possible to locate any position.

Chapter 2: Literature Review

2.1 Introduction
We probably live in the most unpleasant moment our cutting-
edge society has ever discovered as far as women's safety is concerned.We go for offering capacity
to those without whom we stop to exist. Our thought is to plan a framework which will make each
place and consistently more secure for ladies once more. This framework will geo tag and sends
SOS alarm to the closest police headquarters, close contacts and furthermore ready individuals in
and around the scene of the wrongdoing, everything exactly at a tick of a catch. The thought is to
compensate for the time it takes police to land at the area.

Provocation checking framework acknowledges a versatile wireless system. In view of the


encounters and discoveries of the field explores, another ladies harassment framework is arranged
here. The framework has the accompanying prerequisites.Simple to execute and include capacities,
ready to oversee numerous quantities of proficiently, Adaptive for portability of client and Low
expense. To fulfill the above prerequisites, the harassment framework embraces 3G correspondence
capacity and gathers client's data utilizing Global situating framework.

Furthermore firebase database is acknowledged for putting away and recovering client's
refinements, for example, call and client's area. In this database the five to six private individuals of
ladies register to the cell phone of ladies by utilizing the firebase database. This framework
comprises of communication supervisor for recognizing the data about the Android versatile terminal
which every client holds, and the server which stores client's data.

At the point when the client requires the security (for example police) or a parent, a quick alarm message will
be sent to the police headquarters' sensor and parent's telephone. With this framework it is feasible for
security and guardians to follow the area of the kids and ladies. At the point when the ladies press the volume
catch for 3 seconds at that point ready message and call send to the enlisted individual. Android is a product
stack for cell phones with a working framework, and key applications. Its SDK gives apparatuses and APIs
important to start creating applications on the Android stage utilizing the Java programming language.

Diverse capacities have been actualized for the new age provocation framework, for example,
communication supervisor to follow active call and SMS. Be that as it may, Android versatile terminal is
associated with rapid 3G organize for compelling information exchange. Harassment can be made at a fast
with no mutilation in the system. This ladies provocation framework utilizes the cloud innovation to store

17
and recover communication data utilizing GPS framework. Worldwide Positioning System, in the blink of an
eye known as GPS System, the framework gives the office to know the area of the person in question. It
comprises of little chip which is appended to the item to be followed. This chip will give out signs which are
followed by the area which sends information to the earth giving the definite area of the client. GPS
following has come to be acknowledged on a worldwide scale. Because of the utilization of 3G organize the
information is recovered and put away in the server at an exceptionally fast. A. Highlights of the ladies
provocation System One can without much of a stretch become more acquainted with that the client needs
assistance. It likewise brings the present area of the client (unfortunate casualty). These alarm messages are
sent to the security and parent’s portable as a SMS design. The police can likewise view and offer assistance
with the assistance of the cloud administration in which they can follow the situation of the injured individual
whenever. It is conceivable to follow the careful position of the unfortunate casualty with the assistance of
Google Maps; with the assistance of scope and longitude esteems [1]

2.2 Related Works:

2.2.1. Categorization of Existing Techniques/Works/Research


In the current framework the checking is finished by fixing labels in various areas for recognizing the careful
position. The android terminal is associated with Bluetooth and remote LAN and it is constrained to shorter
separation .The proposed framework has no limit limits. The correspondence connect to the administration
server is overseen by remote LAN which is moderately moderate when contrasted with the 3G arrange. The
dynamic blending of portable terminal is obligatory. The system is progressively perplexing and it isn't solid.
The message is exchanged through remote LAN and it isn't verified. A. Disadvantages of Existing System
An individual can't know the client's (victim's) current area. There is a plausibility of information misfortune
amid the message exchange starting with one portable terminal then onto the next versatile Terminal. There
is a respite in information exchange because of 2G arrange. Open regard for offer assistance can't think about
injured individual's Features of the area [2]

2.2.2. Limitations/Gaps within Existing Techniques/Works


Among the most noticeably awful nations in wrongdoing, Pakistan has a loath some reputation in all types of
sexual abuse. In homes, on boulevards, in open transports and even workplaces. Pakistani ladies are in a
consistent condition of cautiousness, similar to a nation on psychological oppressor alert. We have made a
country where ladies are figuring out how to adapt to existential nervousness and we ought to be
embarrassed. A great deal of NGOs, restoration focuses and helpline numbers have been made operational
in the previous year’s however they are on the whole fixes to the badgering that has just occurred and not
the 'preventions' that we need. There are sure prior applications that do make an impression on the spared
contacts yet none of them is successful and sufficiently brisk and as per an overview, the current innovation
doesn't make most ladies feel safe. A noteworthy change in the fundamental structure and a couple of
additional items to these is a need. In a great deal of cases, it is seen that ladies don't record a grievance

18
against the blamed on the grounds that for different reasons like not realizing the right expert to report it
to or feeling embarrassed/ liable about the episode.

2.2.3. Proposed Improvements in Existing Work


One can without much of a stretch become more acquainted with that the ladies need assistance. It
additionally brings the present area of the ladies (unfortunate casualty). These alarm messages are sent to the
police sensor and parents versatile as a SMS group. It is conceivable to follow the careful position of the
person in question (ladies) with the assistance of Google Maps; with the assistance of scope and longitude
esteems it is conceivable to find any position.

In Women Harassment System utilizes firebase which is a ground-breaking social database motor accessible
to all applications. Rich advancement condition incorporates a gadget emulator, apparatuses for
troubleshooting, memory and execution profiling, and a module for the Eclipse IDE.

What’s more firebase database is use for putting away and recovering client’s subtleties, for example, call
and client's area. In this database the five to six private individuals of ladies register to the cell phone of
ladies by utilizing the firebase database. [3]

19
Chapter 3: Requirement Analysis

3.1. Stakeholders
This app is beneficial for the women and children who face the security issues.

3.2. Functional Requirements


The functional requirements are:

REQ-1: Register

In this case user enters name and email and password for registration. All the private peoples of
women must have install women harassment App in your android phones.
REQ-2: Log In
In this case register user will be access to login.
REQ- 3: Log Out
For logout his/ her account.
REQ- 4: Create a circle
User can add 5 to 6 contact numbers to their circle who receive the alert message and call.
REQ- 5: Send SMS
When press the volume button can send SMS and place automatic call even in no Internet Zone.
REQ-6: Automatic dial number
When press the volume button Automatic dial numbers which are saved in contact.
REQ-7: Remembers last location
The alert message seeking help with location details.
In the existing system the monitoring is done by fixing tags in different location for identifying
the exact position.
REQ- 8: Panic Button
On clicking this button the app sends in a distress message and a live location of the user to the
nearest police station
REQ- 9: Time-stamped FIR
Every click on the panic button shall automatically lodge a time-stamped FIR which shall also be
geotagged. The user can later fill in the details of the report once the circumstances are
permissible.
REQ-10: User Authentication

20
Every user while registering into the app would be authenticated by a specific verification no. in
order to maintain a foolproof system.
REQ-11: Alarm activated
Alarm activated to the private people of women when they press the volume button for three
seconds.

3.3. Non Functional Requirements

3.3.1. Performance Requirements


Performance requirements are mentioned below:

 System must handle multiple users.


 The performance of the system should be fast and accurate
 System should be able to handle large amount of data.
 System should handle expected and unexpected errors in a way that prevent a loss of
information.

3.3.2. Safety Requirements


The Safety requirements of our system are as follow:-

 For safety of Woman Harassment system, due to virus or OS failure it required to take the
database backup so, the database will not lost.

3.3.3. Security Requirements


Some Security requirements of the system are as follow:-

a. System will have several types of clients and each user has separate access constraints.
b. Proper use of confirmation should be provided.
c. All registered person can read the manual (guide). If user wants to use Harassment monitoring
system then s/he must be login.

3.3.4. Software Quality Attributes


The system shall be reliable, strong and robustness. The main thing is user must connect with and without
internet.

 Usability

 Dependability.

 Correctness

21
 Durability

 Presence

 Accessibility

 Safety

 Security

 Confidentiality.

3.4. Advantages/Benefits of proposed system


To design a women Harassment app will be used for security of the women. Recently security
concern is the major problem. In this application we can easily get to know that the women needs
help contact with their private persons without having to spend any money.

3.5. Design Considerations


All design considerations were handled in Women Harassment app Phase 1.

3.5.1. Assumptions
There are some assumptions in the software, hardware, and about users of this system that, if
changed, can affect requirements.

Hardware and Software:

 It is assumed that the Device must have installed and logged in on the device.
 All the permissions needed to the application work properly are granted.
 Internet connection must available.

Users:

It is supposed that the end-user can use the android application. Application while the internet is
available. User is already registered and signed in with system to let the application work
properly.

22
3.5.2. Constraints
There are a number of factors that will limit development options. Any errors that are detected
by a module must be logged internally by the module where the error has occurred. This can be
done from an external testing and can be removed by replacing the module. The software will be
used primarily to deploy and repairs completely. It will only notify them of an error that has
occurred.

3.5.3. System Environment


As, it is assumed that user must have to be registered and logged in the device. Now, if the
women need the help then push notification will be send its current location, email, message to
their registered person in case of emergency. If women shake the mobile phone with their
registered persons then simply they will be able to receive the information of women when they
need the help. Then both women and registered persons also chat and shared their problem with
each other.

3.5.4. Design Methodology


The approach that will be used to create and evolve the designs for Women Harassment System
will be functional, structural and data oriented based.

3.5.5. Risks and Volatile Areas


 None

Chapter 4: Project design

23
4.1 .Use Cases Diagrams

Figure 4.1: Admin Use Case Diagram

4.1.1. Woman Use Case Diagram

24
Figure 4.1.1: Woman Use Case Diagram

4.2. Detailed Use Cases

4.2.1. User Sign In

25
Use Case ID UC-1.1

Use case Name Signup

Actor User

Description User will able to signup application

Trigger User click on signup button

Preconditions User Already not exists

Post Condition User successful Resisted

Normal Flow 1. User will open application


2. User Enter details
3. User Click on signup button

Exception All field are required

Include None

Assumption None

Note and issues None

4.2.2. Login

26
Use Case ID UC-1.2

Use case Name Login

Actor User

Description User will able to Login application.


The registered person need to login the application.

Trigger User click on Login button

Preconditions User will already Registered

Post Condition User successfully login

Normal Flow 1. User will open application


2. User will enter phone no and password
3. User Click on Login button
4. Successfully login

Exception Phone no and password will be valid

Include None

Assumption None

Note and issues None

4.2.3. Add Contact

27
Use Case ID UC-1.3

Use case Name Add contact

Actor User

Description User must be login

Trigger User will able to add family contact . Message (Chat) The application is
provided the facility to chat with other user. Call The application is
provided the facility to call to other user.
Preconditions User Login

Post Condition Contact successfully add

Normal Flow 1. User will open application


2. User click on add contact
3. User will enter name and phone number
4. Click on save button

Exception All field are required

Include None

Assumption None

Note and issues None

4.2.4. Secret PIN

28
Use Case ID UC-1.4

Use case Name Secret PIN

Actor User

Description User must be login

Trigger User will click on secret PIN

Preconditions User will be login

Post Condition Valid secret PIN

Normal Flow 1. User will open application


2. User Enter Secret pin
3. User Click on next button

Exception Secret pin must be valid

Include None

Assumption None

Note and issues None

4.2.5. Shake Phone

29
Use Case ID UC-1.5

Use case Name Shake phone

Actor User

Description User will shake phone to send notification family member. Message (Chat)
The application is provided the facility to chat with other user.
1.4.3. Call The application is provided the facility to call to other user.
Trigger User will shake phone

Preconditions User must be login

Post Condition Notification successfully send

Normal Flow 1. User will open application


2. User will shake phone

Exception None

Include Call , messages , notification

Assumption None

Note and issues None

4.2.6. Messages

30
Use Case ID UC-1.6

Use case Name Signup

Actor User

Description Family members will get message. Message (Chat) The application is
provided the facility to chat with other user. Call The application is
provided the facility to call to other user.
Trigger User shake phone

Preconditions Family member contact must register

Post Condition Message send successfully

Normal Flow 1. User will shake phone


2. Message send

Exception All field are required

Include None

Assumption None

Note and issues None

4.2.7. Call

31
Use Case ID UC-1.7

Use case Name Call

Actor User

Description Family members will get call. Message (Chat) The application is provided
the facility to chat with other user. Call The application is provided the
facility to call to other user.
Trigger User shake phone

Preconditions Family member contact must register

Post Condition call successfully

Normal Flow 1. User will shake phone


2. call

Exception All field are required

Include None

Assumption None

Note and issues None

4.2.8. Notification

32
Use Case ID UC-1.8

Use case Name Notification

Actor User

Description Family members will get Notification. At the point when the client requires
the security (for example police) or a parent, a quick alarm message will be
sent to the police headquarters' sensor and parent's telephone.
With this framework it is feasible for security and guardians to follow the
area of the kids and ladies.
Trigger User shake phone

Preconditions Family member contact must register

Post Condition Notification send successfully

Normal Flow 1. User will shake phone


2. Notification send

Exception None

Include None

Assumption None

Note and issues None

33
4.2.9. Current Location

Use Case ID UC-1.9

Use case Name Current Location

Actor User

Description Family members will get current location. This application will helpful for
those who want to get secure from the harassment issues. It may be provide the
current location of the user to the private persons. This application send alert
message to the nearest police station through sensor.

Trigger User shake phone

Preconditions Family member contact must register

Post Condition Current location send successfully

Normal Flow 1. User will shake phone


2. Current location send

Exception None

Include None

Assumption None

Note and issues None

34
4.2.10. Recording

Use Case ID UC-1.10

Use case Name Recording

Actor User

Description User will record. At the point when the ladies press the volume catch for 3 seconds
at that point ready message and call send to the enlisted individual. Android is a
product stack for cell phones with a working framework, and key applications. Its
SDK gives apparatuses and APIs important to start creating applications on the
Android stage utilizing the Java programming language.
Trigger User must be login

Preconditions Voice record

Post Condition Recording save

Normal Flow 1. User will recording voice


2. Click on save button

Exception None

Include None

Assumption None

Note and issues None

4.2.11. Connect with Google


35
Use Case ID UC-1.6

Use case Name Connect with Google

Actor User

Description User will connect with Google. At the point when the ladies press the volume catch
for 3 seconds at that point ready message and call send to the enlisted individual.
Android is a product stack for cell phones with a working framework, and key
applications. Its SDK gives apparatuses and APIs important to start creating
applications on the Android stage utilizing the Java programming language.
Trigger User click on connect with Google button

Preconditions Application must be install in phone

Post Condition Connect with Google successfully

Normal Flow 1. User will click on connect with Google


2. Connect with Google successfully

Exception None

Include None

Assumption None

36
Note and issues None

4.3. Class Diagram

Figure 4.3: Class Diagram

37
4.4. Sequence Diagram for login

In this diagram when he signs first, admin is authenticating him , he User will able to Login
application When the women are in unsecure area then they will be able to inform their problem
to the related registered persons by using this app. The registered person need to login the
application, the application provide the current location of women send message and call to the
registered person for the awareness of women harassment.

Figure 4.4 Sequence Diagram for login

38
4.5. Sequence Diagram for shake phone
In this diagram If women shake the mobile phone with their registered persons then simply they will be
able to receive the information of women when they need the help. Then both women and registered
persons also chat and shared their problem with each other.

Figure 4.5: Sequence Diagram for shake phone

39
4.6. Sequence Diagram for Emergency contact
In this diagram women send alert message, notification, and current location to their trustworthy
persons. Once user find their respective current location they are looking for they can make an
offer to providing help to the needy women. In this application two parties can get location first
one is registered persons and the other one is the nearest police station they will take care of
women harassment without having to spend any money.

Figure 4.6: Sequence Diagram for Emergency control

40
4.7. Activity Diagrams

Figure 4.7: Activity Diagrams

41
4.8. Methodology
This research paper was and complicated journey to set out upon due to the delicate idea of the
subject. It was trying to contact ladies who had been explicitly bugged and all the more in this
way, were happy to impart their encounters to the scientists. The investigation utilized a mix of
quantitative and subjective information. To connect with a bigger database of ladies, a concise
poll was readied which included inquiries on: sort of association, its size, and its strategies
identified with inappropriate behavior. It likewise included inquiries on whether the respondent
had encountered any type of inappropriate behavior, and provided that this is true, who was the
criminal and what measures did the respondent take to deal with the experience. The survey was
messaged to around 800 ladies directors known to the specialist and through them to other
individuals. Not with standing utilizing the purposive examining strategy with known
individuals, it required a few updates on email what's more, phone guaranteeing them on the
confidentiality of their reactions just as that of the association.

42
Chapter 5: Implementation

5.1. Discussion
The following issue were identified while development of the project. • Internet connectivity
issue on either side (i.e. the system won’s work if there is no network connectivity on either
mobile device) • User must be install the application.

5.2. Development Methodologies


The system development strategy is designed in such a way that each module will be developed
in a sequence, testing of the module will be in parallel that is, development and testing will be at
same time. After successful completion of one module the second module of the system will be
developed in same manner and will be integrated with the other relevant module afterward. This
strategy will help in incorporating the changes in the requirements at the development time.
Which decrease the headache of evaluating and implementing changes when the module is
completed? As, after completion of the module, any changes to the module will make the whole
module to be investigated and evaluated again.

5.3. Implementation Tools and Technologies


Goods exchange application will be developed using the following technologies.

Technologies:

a. Java
b. Xml
c. Firebase Database

Tools:

a. Android Studio
b. Google firebase console
c.

5.4. Summary

43
In this chapter we show the implementation of our system. We used the modern tools and
techniques to implement our project. We used latest hardware IDE ANDROID STUDIO The
proposed system fulfills the user’s requirements. Tools like ANDROID STUDIO and firebase
console help us to build this system.

44
Chapter: 6 Testing

6.1. Employed Testing Techniques


To test the functionality of our software, we have used the Black Box testing technique. The
testing is done upon the Functional requirement and Non-Functional Requirements. With the
help of Black box testing, we have tested our solution in terms of it’s:

 Performance
 Database Access
 Behavior
 Invalid Functionalities from Valid one
 Internal/External components Interfacing

To ensure the quality of the solution, it is checked under the following techniques:

 System Testing
 Integration Testing
 Acceptance testing

To test the System’s functionality, the solution is checked by testing all its component and check
the overall working of the system. In Integration testing, the system has tested each and every
component for the expected output. For the Acceptance Testing, the system tested as a whole by
entering different inputs and the found bugs and errors were then removed. To ensure the system
quality, different designed test cases were applied on the system which is discussed in the next
section.

6.2. Test Cases

6.2.1. Test Case 1


Splash Screen

Table 2 splash Screen

Test Case ID TC_01

Description When the application is open then the splash screen will be appear for 3
seconds

45
Conditions The application must be installed in mobile.

Result Expected Splashed Screen appeared

Step Full / Regr Tests Results


1 Open application

2 Splash screen appeared with logo Pass

6.2.2. Test Case 2

Login with Correct Email and password

Table 3 Login with correct email and password

Test Case ID TC_02

Description The authorized user will be enter valid email and password

Conditions The user is already registered in database

Result Expected The user is logged to application

Step Full / Regr Tests Results

1 Enter valid email Pass

2 Enter valid password in password field Pass

3 R Click on Login button Pass

4 R Login successfully Pass

6.2.3 Test Case 3

Registration (Signup)

46
Table 4 Registration (signup)

Test Case ID TC_03

Description New user will install app and create new account

Conditions The user must have install the application

Result Expected User registration successfully

Step Full / Regr Tests Results

1 Enter user name Pass

2 R Enter password Pass

3 R Click on Signup button Pass

4 R Registration successfully Pass

6.2.4. Test Case 4

Login to application with Wrong Email and password

Table 5 login to application with Wrong email and password

Test Case ID TC_04

Description User will enter wrong email and password

Conditions The application must be install

Result Expected The user not logging to system

Step Full / Regr Tests Results

1 Enter email Pass

47
2 Enter password Pass

3 Click on Login button Pass

4 R Logging to system Pass

6.2.5. Test Case 5

Shared the current location

Table 6 Share the current location

Test Case ID TC_05

Description User will share the current location.

Conditions The application must be install

Result Expected Share successfully

Step Full / Regr Tests Results

1 Click on send button Pass

2 Location permission must be active Pass

3 R Google map appear with latitude and Pass


longitude values
4 R Show the current location Pass

6.2.6 Test Case 6

Shake the device for recoding

Table 7 Shake the mobile for recording

Test Case ID TC_06

48
Description Shake the mobile for maximum 37 sec

Conditions The application must be install

Result Expected Record successfully

Step Full / Regr Tests Results

1 Click on Recording button Pass

2 Activity of recording must be active and Pass


Gives their acceleration below
3 Shake the mobile. Pass

4 R Alert message and notification send. Pass

6.2.7. Test Case 7

Send Message to register person

Table 8 Send Message to register person

Test Case ID TC_07

Description Send message to the register person for better communication

Conditions User must be registered in database

Result Expected Message send successfully

Step Full / Regr Tests Results

1 Click on send button Pass

2 Activity of message must be active Pass

3 R Alert message send to the register person Pass

49
5.2.8. Test Case 8

Call to register user.

Table 9 Call to register user

Test Case ID TC_08

Description Call to register user for better communication

Conditions The user must be registered in database

Result Expected Call pass to user

Step Full / Regr Tests Results

1 Click in call option Pass

2 Number dial from phone Pass

3 R Call pass to user successfully Pass

6.2.9. Test Case 9

Shared the current location with nearest police station

Table 10 Share the current location with nearest police station

Test Case ID TC_09

Description User will share the current location with nearest police station.

Conditions The application must be install

Result Expected Share successfully

Step Full / Regr Tests Results

50
1 Click on send button Pass

2 Location permission must be active Pass

3 R Google map appear with latitude and Pass


longitude values
4 R Show the current location Pass

6.2.10. Test Case 10

Delete option.

Table 11 Delete option

Test Case ID TC_10

Description The user also have deletes option to delete register person.

Conditions The user must be logging in application

Result Expected Deleted successfully

Step Full / Regr Tests Results

1 Select the register person u want to delete Pass

2 Click on delete button Pass

3 R Successfully deleted. Pass

6.2.11. Test Case 11

Insert option.

Table 12 insert option

Test Case ID TC_11

51
Description The user also insert option to enter register person.

Conditions The user must be logging in application

Result Expected Inserted successfully

Step Full / Regr Tests Results

1 Select the register person u want to insert Pass


from contact list
2 Click on insert button Pass

3 R Successfully inserted. Pass

6.2.12. Test Case 12

Adding user record in database.

Table 13 Adding user record in database

Test Case ID TC_11

Description User signup account the data will be saved in database.

Conditions User must be filled out all field in signup page.

Result Expected Record are save in database

Step Full / Regr Tests Results

1 Select the signup. Pass

2 Enter all field Pass

3 Enter name, email, password, phone-no Pass

4 Click on signup button Pass

52
5 Save record Pass

6.2.14. Test Case 14

Logout.

Table 15 Logout.

Test Case ID TC_14

Description Application also provided logout

Conditions The user must be logging in application.

Result Expected Logout

Step Full / Regr Tests Results

1 Logout Pass

2 Open the navigation menu Pass

3 Click the output button Pass

4 Successfully logout. Pass

5.3. Summary
In this chapter we’ve discussed different test cases to ensure the system quality using black box
testing technique. This black box testing strategy ensures that the system is working properly
according to the defined flow and all the test cases are accepted successfully. In the testing
phase, all the non-functional and functional requirements are being tested to ensure its
Performance and Behavior with internal/external components of Interface, database connectivity,
invalid and valid inputs.

53
The system is tested under the different testing techniques like Integration, System and
Acceptance Testing Technique. Different test cases were designed to check the system for the
different input values using these strategies.

The test cases were tested with the expected outputs and their results were got with the validated
points. The test cases ensure the proper functioning of the Functional and Nonfunctional
requirements.

54
Chapter 7: Conclusion

7.1. Conclusion
The Helping Hand for Women Harassment System Application has successfully developed and
deployed according to this project report. And it is hereby concluded that will help in providing
security and safety for the women. Where user can share their current situation with the
registered person in case of any problem. The women also shared their current location with the
latitude and longitude by clicking on button. This application helps women to send alert
message, notification, and current location to their trustworthy persons. Once user find their
respective current location they are looking for they can make an offer to providing help to the
needy women. In this application two parties can get location first one is registered persons and
the other one is the nearest police station they will take care of women harassment without
having to spend any money.

7.2. Findings and Work done


As there were also very advanced and smart systems exist but they were not providing the
location sharing facility. With our application, the Helping Hand app has been provided new
features of exchanging locations. The user will be able to view the area where the women needed
the help. Then both user can also chat and call to each other. This project becomes even more
affordable, convenient to deploy and well maintained. With this systemized project, chances of
errors will be reduced to few and also it’s a great time saver. By all these qualities, our aim is
completed to build a unique, acceptable, and user friendly system.

7.3. Future Work


Our future work can be based on further working on security of the Women harassment system
as our system only deal with safety of women. Further we can expand the system by developing
an IOS application and also the web application for further convince.

7.4. Summary
In this Chapter, the Women Harassment System is summarized with all the conclusions,
findings, the work done on the project and all the future improvements. This chapter concludes

55
this project and this report as a whole from the proposed idea following the requirements,
development and deployment.

References
https://www.emeraldinsight.com/doi/abs/10.1108/978-1-78714-425-520171002

https://www.researchgate.net/publication/271704076_Sexual_Harassment_in_the_Workplace_An_Explorato
ry_Study_from_Lebanon

https://drum.lib.umd.edu/bitstream/handle/1903/50/dissertation.pdf;jsessionid=E7C1EC28D0DF049ECC90C
6D1CDD17F11?sequence=1

https://diversity.fnal.gov/wp-content/uploads/2018/08/National-Academy-of-Sciences-Sexual-Harassment-
of-Women.-2018-Report.pdf

56

También podría gustarte