Documentos de Académico
Documentos de Profesional
Documentos de Cultura
We hereby accept the work contained in this report titled: Helping Hand for women
Harassment system, as a confirmation to the required standards for the partial fulfillment of
the degree of Bachelors of Science in Software Engineering.
1
Declaration
We hereby declare that this work, neither whole nor in part, has been copied from any source. It
is further declared that we have prepared this report entirely on the basis of our personal efforts
made under the sincere guidance of teachers especially our supervisor Ma’am Nazia. If any part
of this thesis is proved to be copied out from any source or found to be reproduction of some
other, we will stand by the consequences. No portion of the work presented has been submitted
in support of any application for any other degree or qualification of this or any other university
or institute of learning.
MEMBERS’ SIGNATURES
2
Dedication
We dedicate this project to our Parents, Faculty Members and BPGCW who have been a great
source of inspiration and encouragement to us on every stage of our great academic journey.
3
Acknowledgements
We would like to express my appreciation to our parents, for their infinite and much needed
moral and financial support. We would also like to thank our Project Coordinator, who
accommodate with us through the last years, and guided us through each step towards
submission. He very patiently organized the internal and external evaluations, and then deal with
our lack of ability to do the corrections, asked of me, diligently.
We are especially grateful to our supervisor Dr. Muhammad Babar. Not only for taking on our
project under their wing, but also for providing us with their unscrupulous guidance whenever
required.
We would like to extend our gratitude to all the teachers who taught us the hacks we have learnt
during our degree, and have successfully applied to our Final Year Project and the dissertation.
And last, but not the least, We appreciate all the support from the admin staff, exam office, and
all other beings on campus, especially to our friends, for always lifting up my spirits and being
with us.
4
Table of content
Abstract ......................................................................................................................................................... 6
3.2. Functional Requirements ........................................................................................................ 20
3.3. Non Functional Requirements ................................................................................................ 21
3.3.1. Performance Requirements ..................................................................................................... 21
3.3.2. Safety Requirements ............................................................................................................... 21
3.3.3. Security Requirements ............................................................................................................ 21
3.3.4. Software Quality Attributes .................................................................................................... 21
3.4. Advantages/Benefits of proposed system ............................................................................... 22
3.5. Design Considerations ............................................................................................................ 22
4.1 .Use Cases Diagrams .................................................................................................................. 24
4.2. Detailed Use Cases .......................................................................................................................... 25
4.2.1. User Sign In .................................................................................................................................. 25
4.3. Class Diagram .............................................................................................................................. 37
4.4. Sequence Diagram for login ........................................................................................................ 38
4.5. Sequence Diagram for shake phone ............................................................................................. 39
4.7. Activity Diagrams ........................................................................................................................ 41
Figure 4.7: Activity Diagrams ............................................................................................................ 41
Adding user record in database. ......................................................................................................... 52
5
Abstract
This Women Harassment System valuates various tracking systems which monitor the women
children, in an individual basis. This type of tracking is done due to children and women who
helpless at the time of lost from school to home or home to school, adults also face issues like
kidnapping, harassment by gangsters or others, even elders face issues like memory loss or
autism. These problems mainly state us to study about the remedy measures to overcome the
need of these people while at the time of risk. To avoid these problems among various peoples,
this system alert the receiver end that the people in front end are under danger through messages
or calling them automatically. These activities are done by GSM used for mobile communication
& GPS latitude and longitude positions through direct satellite connection. What is especially
discouraging about this situation is that at the same time that so much energy and money is being
invested in efforts to attract and retain women in science, engineering, and medical fields, it
appears women are often bullied or harassed out of career pathways in these fields.
6
Chapter 1: Introduction
The basic purpose of this document is to elicit, analyze and define high-level security for the women
and children. Android phone application designed to help user to provide a security place where they
can communicate with their private persons in case of any emergency .It may be with the help of
sending message, calls, location and alert dialog etc. This application helps parents and security
panels to track the location of women and children by Global positioning system (GPS). Once user
find their respective location they are looking for they can make help for the women and safe them.
The important feature of the women harassment system that registered person easily gets to know
that the user needs help. It also brings the current location of the user. The police can also view and
offer help with the help of the cloud services in which they can track the position of the user at any
time. It possible to track the cloud services in which they can track the position of the user and .The
exact position of the user is track with the help of Google Maps; with the help of latitude and
longitude values it is possible to locate any position.
1.1.1. Objectives
Designing a women's harassment application to be used for women's safety. Recently, safety
concerns are the society's biggest issue. In this application we can easily get to know that the
women needs help contact with their private persons without having to spend any money.
By developing women Harassment application , it will provides security for the alone women and
children they suffer from the security concerns.
1.1.3. Methodology
7
The process model followed in this system will be Incremental model. There will be 4 increments or
phases as requirements, designing, implementation and testing. Each increment will be an
evolutionary model to implement.
1.1.4. Limitation
In the existing system we will discussed that how the women and children get help from their registered
person in case of any emergency and how the women can inform to the registered person. This
application can also help police department to reduce the crimes, which are against women and
the evidence can be used to trace the crime.
1.1.6. Motivation
The advantage of developing this app is to secure the women and children and provide safety
measure for them.
This application will helpful for those who want to get secure from the harassment issues. It can
provide the current location of the women to the private persons. This application send alert message
to the nearest police station.
Figure 2 main functional classes
Women Police/Parents
8 Women
Security App
Message/Alarm Message Message
Acknowledgement
There are some hypotheses in this system's software, hardware, and users that can influence
demands if altered.
1.1.11. Hardware and Software:
Android studio:
Firebase:
9
The user is supposed to communicate with the software only. First the customer must enter i
n the application and then the user can access the application after registering and then share
their place with the enrolled people.
a. Description
b. Criticality
Medium.
c. Technical issues
e. Risks
User account should be secure enough so nobody can access otherwise the data can be steal and can
be misused.
The user account will depend for the information from the existing database.
1.2.2. Registered:
a. Description
The application will provide the registration option where user can register by email.
b. Criticality
10
High.
c. Technical issues
e. Risks
None
a. Description
The system will provide the facility to sign out the system.
b. Criticality
High.
c. Technical issues
Easy to use.
e. Risks
None
11
f. Dependencies with other requirements
a. Description
The system should provide the facility of reset password and also provide to set a new password
in case of forgetting.
b. Criticality
Medium
c. Technical issues
None
No cost expected.
e. Risks
None
Reset link should be sent to the user email so that they can easily change/reset it and update the
database.
a. Description
b. Criticality
12
High.
c. Technical issues
None.
e. Risks
None.
1.2.8. Call:
a. Description
b. Criticality
High.
c. Technical issues
Not as such
No cost effect
e. Risks
None.
13
f. Dependencies with other requirements
g. must be logging.
Android application will provide user interface with three option register, instruction and view
registered. Our private persons can register with the application with valid phone number, where they
can receive the call, message and alerts and with the internet connection they can also view the
current location of the user. So user can easily get the help from their registered persons and also
communication through chat.
.
1.3.2. Hardware Interfaces
The device is used to reading/writing data. In this application user will register. So registered person
can get the further information of user and help them.
Chat
Call
14
1.5. Nonfunctional Requirements
The system does not have a particular metric to verify efficiency, but the application should
be quick enough to assist user in the event of harassment and user can readily interact with ot
her registered persons.
The application will execute on android phones and will give output.
Application will be reliable.
System will be secure.
This request will help those who want to be safe from the problems of harassment. It can pro
vide private individuals with the user's present place. This request sends an alert signal to the
closest police station and the present place.
1.6.1. Reliability
The system bought to have a high performance specified the user have to be ready to see a w
ell-organized and managed system.
15
1.6.2. Maintainability
Our system is specified for one task. There will not be so much change in the future. Therefore,
maintainability does not have more importance than it has in normal software.
1.6.3. Portability
Regarding user interface, an important design goal is keeping it simple. User interface should
not be so complicated. Besides, the user should not need to do anything for basic usage
of the system.
1.6.4. Extensibility
Since the system will be used online and by a single user, security is not an issue.
1.6.5. Reusability
Accuracy of the system is important for the user. For this reason, the system should have 100%
accuracy.
When the women are in unsecure area then they will be able to inform their problem to the related
registered persons by using this app. The registered person need to login the application, the
application provide the current location of women send message and call to the registered person for
the awareness of women harassment.
1.8. Summary
This application helps parents and security panels to track the location of women and children by
Global positioning system (GPS). Once user find their respective location they are looking for they
can make help for the women and safe them.
The important feature of the women harassment system that registered person easily gets to know
that the user needs help. It also brings the current location of the user. The police can also view and
offer help with the help of the cloud services in which they can track the position of the user at any
time. It possible to track the cloud services in which they can track the position of the user and sensor
16
generate alarm in the respective police station .The exact position of the user is track with the help of
Google Maps; with the help of latitude and longitude values it is possible to locate any position.
2.1 Introduction
We probably live in the most unpleasant moment our cutting-
edge society has ever discovered as far as women's safety is concerned.We go for offering capacity
to those without whom we stop to exist. Our thought is to plan a framework which will make each
place and consistently more secure for ladies once more. This framework will geo tag and sends
SOS alarm to the closest police headquarters, close contacts and furthermore ready individuals in
and around the scene of the wrongdoing, everything exactly at a tick of a catch. The thought is to
compensate for the time it takes police to land at the area.
Furthermore firebase database is acknowledged for putting away and recovering client's
refinements, for example, call and client's area. In this database the five to six private individuals of
ladies register to the cell phone of ladies by utilizing the firebase database. This framework
comprises of communication supervisor for recognizing the data about the Android versatile terminal
which every client holds, and the server which stores client's data.
At the point when the client requires the security (for example police) or a parent, a quick alarm message will
be sent to the police headquarters' sensor and parent's telephone. With this framework it is feasible for
security and guardians to follow the area of the kids and ladies. At the point when the ladies press the volume
catch for 3 seconds at that point ready message and call send to the enlisted individual. Android is a product
stack for cell phones with a working framework, and key applications. Its SDK gives apparatuses and APIs
important to start creating applications on the Android stage utilizing the Java programming language.
Diverse capacities have been actualized for the new age provocation framework, for example,
communication supervisor to follow active call and SMS. Be that as it may, Android versatile terminal is
associated with rapid 3G organize for compelling information exchange. Harassment can be made at a fast
with no mutilation in the system. This ladies provocation framework utilizes the cloud innovation to store
17
and recover communication data utilizing GPS framework. Worldwide Positioning System, in the blink of an
eye known as GPS System, the framework gives the office to know the area of the person in question. It
comprises of little chip which is appended to the item to be followed. This chip will give out signs which are
followed by the area which sends information to the earth giving the definite area of the client. GPS
following has come to be acknowledged on a worldwide scale. Because of the utilization of 3G organize the
information is recovered and put away in the server at an exceptionally fast. A. Highlights of the ladies
provocation System One can without much of a stretch become more acquainted with that the client needs
assistance. It likewise brings the present area of the client (unfortunate casualty). These alarm messages are
sent to the security and parent’s portable as a SMS design. The police can likewise view and offer assistance
with the assistance of the cloud administration in which they can follow the situation of the injured individual
whenever. It is conceivable to follow the careful position of the unfortunate casualty with the assistance of
Google Maps; with the assistance of scope and longitude esteems [1]
18
against the blamed on the grounds that for different reasons like not realizing the right expert to report it
to or feeling embarrassed/ liable about the episode.
In Women Harassment System utilizes firebase which is a ground-breaking social database motor accessible
to all applications. Rich advancement condition incorporates a gadget emulator, apparatuses for
troubleshooting, memory and execution profiling, and a module for the Eclipse IDE.
What’s more firebase database is use for putting away and recovering client’s subtleties, for example, call
and client's area. In this database the five to six private individuals of ladies register to the cell phone of
ladies by utilizing the firebase database. [3]
19
Chapter 3: Requirement Analysis
3.1. Stakeholders
This app is beneficial for the women and children who face the security issues.
REQ-1: Register
In this case user enters name and email and password for registration. All the private peoples of
women must have install women harassment App in your android phones.
REQ-2: Log In
In this case register user will be access to login.
REQ- 3: Log Out
For logout his/ her account.
REQ- 4: Create a circle
User can add 5 to 6 contact numbers to their circle who receive the alert message and call.
REQ- 5: Send SMS
When press the volume button can send SMS and place automatic call even in no Internet Zone.
REQ-6: Automatic dial number
When press the volume button Automatic dial numbers which are saved in contact.
REQ-7: Remembers last location
The alert message seeking help with location details.
In the existing system the monitoring is done by fixing tags in different location for identifying
the exact position.
REQ- 8: Panic Button
On clicking this button the app sends in a distress message and a live location of the user to the
nearest police station
REQ- 9: Time-stamped FIR
Every click on the panic button shall automatically lodge a time-stamped FIR which shall also be
geotagged. The user can later fill in the details of the report once the circumstances are
permissible.
REQ-10: User Authentication
20
Every user while registering into the app would be authenticated by a specific verification no. in
order to maintain a foolproof system.
REQ-11: Alarm activated
Alarm activated to the private people of women when they press the volume button for three
seconds.
For safety of Woman Harassment system, due to virus or OS failure it required to take the
database backup so, the database will not lost.
a. System will have several types of clients and each user has separate access constraints.
b. Proper use of confirmation should be provided.
c. All registered person can read the manual (guide). If user wants to use Harassment monitoring
system then s/he must be login.
Usability
Dependability.
Correctness
21
Durability
Presence
Accessibility
Safety
Security
Confidentiality.
3.5.1. Assumptions
There are some assumptions in the software, hardware, and about users of this system that, if
changed, can affect requirements.
It is assumed that the Device must have installed and logged in on the device.
All the permissions needed to the application work properly are granted.
Internet connection must available.
Users:
It is supposed that the end-user can use the android application. Application while the internet is
available. User is already registered and signed in with system to let the application work
properly.
22
3.5.2. Constraints
There are a number of factors that will limit development options. Any errors that are detected
by a module must be logged internally by the module where the error has occurred. This can be
done from an external testing and can be removed by replacing the module. The software will be
used primarily to deploy and repairs completely. It will only notify them of an error that has
occurred.
23
4.1 .Use Cases Diagrams
24
Figure 4.1.1: Woman Use Case Diagram
25
Use Case ID UC-1.1
Actor User
Include None
Assumption None
4.2.2. Login
26
Use Case ID UC-1.2
Actor User
Include None
Assumption None
27
Use Case ID UC-1.3
Actor User
Trigger User will able to add family contact . Message (Chat) The application is
provided the facility to chat with other user. Call The application is
provided the facility to call to other user.
Preconditions User Login
Include None
Assumption None
28
Use Case ID UC-1.4
Actor User
Include None
Assumption None
29
Use Case ID UC-1.5
Actor User
Description User will shake phone to send notification family member. Message (Chat)
The application is provided the facility to chat with other user.
1.4.3. Call The application is provided the facility to call to other user.
Trigger User will shake phone
Exception None
Assumption None
4.2.6. Messages
30
Use Case ID UC-1.6
Actor User
Description Family members will get message. Message (Chat) The application is
provided the facility to chat with other user. Call The application is
provided the facility to call to other user.
Trigger User shake phone
Include None
Assumption None
4.2.7. Call
31
Use Case ID UC-1.7
Actor User
Description Family members will get call. Message (Chat) The application is provided
the facility to chat with other user. Call The application is provided the
facility to call to other user.
Trigger User shake phone
Include None
Assumption None
4.2.8. Notification
32
Use Case ID UC-1.8
Actor User
Description Family members will get Notification. At the point when the client requires
the security (for example police) or a parent, a quick alarm message will be
sent to the police headquarters' sensor and parent's telephone.
With this framework it is feasible for security and guardians to follow the
area of the kids and ladies.
Trigger User shake phone
Exception None
Include None
Assumption None
33
4.2.9. Current Location
Actor User
Description Family members will get current location. This application will helpful for
those who want to get secure from the harassment issues. It may be provide the
current location of the user to the private persons. This application send alert
message to the nearest police station through sensor.
Exception None
Include None
Assumption None
34
4.2.10. Recording
Actor User
Description User will record. At the point when the ladies press the volume catch for 3 seconds
at that point ready message and call send to the enlisted individual. Android is a
product stack for cell phones with a working framework, and key applications. Its
SDK gives apparatuses and APIs important to start creating applications on the
Android stage utilizing the Java programming language.
Trigger User must be login
Exception None
Include None
Assumption None
Actor User
Description User will connect with Google. At the point when the ladies press the volume catch
for 3 seconds at that point ready message and call send to the enlisted individual.
Android is a product stack for cell phones with a working framework, and key
applications. Its SDK gives apparatuses and APIs important to start creating
applications on the Android stage utilizing the Java programming language.
Trigger User click on connect with Google button
Exception None
Include None
Assumption None
36
Note and issues None
37
4.4. Sequence Diagram for login
In this diagram when he signs first, admin is authenticating him , he User will able to Login
application When the women are in unsecure area then they will be able to inform their problem
to the related registered persons by using this app. The registered person need to login the
application, the application provide the current location of women send message and call to the
registered person for the awareness of women harassment.
38
4.5. Sequence Diagram for shake phone
In this diagram If women shake the mobile phone with their registered persons then simply they will be
able to receive the information of women when they need the help. Then both women and registered
persons also chat and shared their problem with each other.
39
4.6. Sequence Diagram for Emergency contact
In this diagram women send alert message, notification, and current location to their trustworthy
persons. Once user find their respective current location they are looking for they can make an
offer to providing help to the needy women. In this application two parties can get location first
one is registered persons and the other one is the nearest police station they will take care of
women harassment without having to spend any money.
40
4.7. Activity Diagrams
41
4.8. Methodology
This research paper was and complicated journey to set out upon due to the delicate idea of the
subject. It was trying to contact ladies who had been explicitly bugged and all the more in this
way, were happy to impart their encounters to the scientists. The investigation utilized a mix of
quantitative and subjective information. To connect with a bigger database of ladies, a concise
poll was readied which included inquiries on: sort of association, its size, and its strategies
identified with inappropriate behavior. It likewise included inquiries on whether the respondent
had encountered any type of inappropriate behavior, and provided that this is true, who was the
criminal and what measures did the respondent take to deal with the experience. The survey was
messaged to around 800 ladies directors known to the specialist and through them to other
individuals. Not with standing utilizing the purposive examining strategy with known
individuals, it required a few updates on email what's more, phone guaranteeing them on the
confidentiality of their reactions just as that of the association.
42
Chapter 5: Implementation
5.1. Discussion
The following issue were identified while development of the project. • Internet connectivity
issue on either side (i.e. the system won’s work if there is no network connectivity on either
mobile device) • User must be install the application.
Technologies:
a. Java
b. Xml
c. Firebase Database
Tools:
a. Android Studio
b. Google firebase console
c.
5.4. Summary
43
In this chapter we show the implementation of our system. We used the modern tools and
techniques to implement our project. We used latest hardware IDE ANDROID STUDIO The
proposed system fulfills the user’s requirements. Tools like ANDROID STUDIO and firebase
console help us to build this system.
44
Chapter: 6 Testing
Performance
Database Access
Behavior
Invalid Functionalities from Valid one
Internal/External components Interfacing
To ensure the quality of the solution, it is checked under the following techniques:
System Testing
Integration Testing
Acceptance testing
To test the System’s functionality, the solution is checked by testing all its component and check
the overall working of the system. In Integration testing, the system has tested each and every
component for the expected output. For the Acceptance Testing, the system tested as a whole by
entering different inputs and the found bugs and errors were then removed. To ensure the system
quality, different designed test cases were applied on the system which is discussed in the next
section.
Description When the application is open then the splash screen will be appear for 3
seconds
45
Conditions The application must be installed in mobile.
Description The authorized user will be enter valid email and password
Registration (Signup)
46
Table 4 Registration (signup)
Description New user will install app and create new account
47
2 Enter password Pass
48
Description Shake the mobile for maximum 37 sec
49
5.2.8. Test Case 8
Description User will share the current location with nearest police station.
50
1 Click on send button Pass
Delete option.
Description The user also have deletes option to delete register person.
Insert option.
51
Description The user also insert option to enter register person.
52
5 Save record Pass
Logout.
Table 15 Logout.
1 Logout Pass
5.3. Summary
In this chapter we’ve discussed different test cases to ensure the system quality using black box
testing technique. This black box testing strategy ensures that the system is working properly
according to the defined flow and all the test cases are accepted successfully. In the testing
phase, all the non-functional and functional requirements are being tested to ensure its
Performance and Behavior with internal/external components of Interface, database connectivity,
invalid and valid inputs.
53
The system is tested under the different testing techniques like Integration, System and
Acceptance Testing Technique. Different test cases were designed to check the system for the
different input values using these strategies.
The test cases were tested with the expected outputs and their results were got with the validated
points. The test cases ensure the proper functioning of the Functional and Nonfunctional
requirements.
54
Chapter 7: Conclusion
7.1. Conclusion
The Helping Hand for Women Harassment System Application has successfully developed and
deployed according to this project report. And it is hereby concluded that will help in providing
security and safety for the women. Where user can share their current situation with the
registered person in case of any problem. The women also shared their current location with the
latitude and longitude by clicking on button. This application helps women to send alert
message, notification, and current location to their trustworthy persons. Once user find their
respective current location they are looking for they can make an offer to providing help to the
needy women. In this application two parties can get location first one is registered persons and
the other one is the nearest police station they will take care of women harassment without
having to spend any money.
7.4. Summary
In this Chapter, the Women Harassment System is summarized with all the conclusions,
findings, the work done on the project and all the future improvements. This chapter concludes
55
this project and this report as a whole from the proposed idea following the requirements,
development and deployment.
References
https://www.emeraldinsight.com/doi/abs/10.1108/978-1-78714-425-520171002
https://www.researchgate.net/publication/271704076_Sexual_Harassment_in_the_Workplace_An_Explorato
ry_Study_from_Lebanon
https://drum.lib.umd.edu/bitstream/handle/1903/50/dissertation.pdf;jsessionid=E7C1EC28D0DF049ECC90C
6D1CDD17F11?sequence=1
https://diversity.fnal.gov/wp-content/uploads/2018/08/National-Academy-of-Sciences-Sexual-Harassment-
of-Women.-2018-Report.pdf
56