Int
ern
at
i
onal
Journ
al of Ele
ctrical
an
d
Co
mput
er
En
gin
eeri
ng
(IJ
E
C
E)
Vo
l.
9
, No
.
5
,
Octo
ber
201
9
, pp.
4355
~
43
63
IS
S
N:
20
88
-
8708
,
DOI: 10
.11
591/
ijece
.
v
9
i
5
.
pp4355
-
43
63
4355
Journ
al h
om
e
page
:
http:
//
ia
es
core
.c
om/
journa
ls
/i
ndex.
ph
p/IJECE
Manifest
ing a
mo
bil
e a
pp
lication
on
safety
which as
certains
women s
alus
in
B
anglades
h
El
ias Hossa
in
1
,
W
ah
idur
Ra
hma
n
2
,
Ta
req
ul Islam
3
,
Seli
m H
os
sa
i
n
4
1
Depa
rtment of
Software
Eng
ineeri
ng,
Daffodi
l
I
nte
rna
ti
ona
l
Uni
ver
sit
y
,
Banglad
esh
2
Depa
rtment of
Com
pute
r
Scie
n
ce
and Engi
ne
ering,
Mawla
n
a
Bh
asha
ni
Sc
ie
nc
e a
nd
Technol
og
y
Univer
sit
y
,
Ban
gla
desh
3
, 4
Depa
rtment
of
Com
pute
r
Sci
en
ce
and Engi
ne
ering a
t
Khw
aj
a
Y
unus Ali
Univer
si
t
y
,
B
angl
ad
esh
Art
ic
le
In
f
o
ABSTR
A
CT
Art
ic
le
history:
Re
cei
ved
Feb
24
, 201
9
Re
vised
A
pr 18
, 2
01
9
Accepte
d
Apr 30
, 201
9
Thi
s
pape
r
r
efle
ct
s
on
the
ind
emnit
y
of
wom
en
in
our
socie
t
y
.
T
he
proposed
m
odel
ensure
s
the
embodim
ent
of
a
m
obil
e
a
ppli
c
at
ion
.
The
al
gorit
hm
,
we
deve
lope
d
fo
r
thi
s
m
odel
foc
uses
the
safe
t
y
i
ss
ues
which
is
a
ppli
c
abl
e
to
both
inside
as
well
as
outside
of
the
house
for
the
wom
en
in
Bangl
ad
esh.
The
soluti
on
of
t
his
proble
m
s
ca
n
be
done
throu
gh
som
e
int
err
elate
d
fe
at
ur
es
such
as
i)
SO
S
butt
on
pre
ss
in
g
which
ensure
s
aut
om
at
ic
ca
l
l
ing,
inst
ant
loc
a
ti
on
tr
ac
kin
g
s
y
stem
throu
gh
GP
S
of
the
phone
and
sen
ding
tra
ck
ed
loc
a
ti
on
to
all
tr
usted
num
ber
s,
aut
om
at
i
ca
l
l
y
se
cre
t
e
vid
eo
re
cor
ding
s
y
st
em
ii
)
voic
e
comm
and
det
e
ct
ion
which
assures
exa
ct
sam
e
fea
tu
res
as
S
OS
butt
on
pre
ss
ing
ii
i)
phon
e
shaki
ng
fea
tu
res
serv
e
user
inst
ant
i
m
m
unit
y
b
y
ca
l
li
ng
a
trusted
num
ber
.
Thi
s
rese
arc
h
al
so
assures
expe
rimente
d
da
ta
ana
l
y
sis
at
Dh
ak
a
c
ity
b
ase
d
on
respond
ti
m
e,
th
e
t
ime
it
t
ake
s
t
o
arr
iv
e
the
SM
S
and
Phon
e
ca
l
l
and
cur
re
nt
loc
ation
of
the
vic
ti
m
.
Also
do
a
short
compari
son a
m
ong
the m
ost po
p
ula
r
saf
ety
relat
e
d
m
obil
e application
s.
Ke
yw
or
d
s
:
GP
S
Mob
il
e
a
pp
li
ca
ti
on
Safety
SO
S
butt
on
Vo
ic
e
c
omm
and
Copyright
©
201
9
Instit
ut
e
o
f Ad
vanc
ed
Engi
n
ee
r
ing
and
S
cienc
e
.
Al
l
rights re
serv
ed
.
Corres
pond
in
g
Aut
h
or
:
Wah
i
dur
Ra
hma
n,
Dep
a
rtm
ent o
f C
om
pu
te
r
Scie
nce a
nd E
ng
i
ne
erin
g,
Ma
wlana
B
has
han
i
Scie
nce
a
nd Tec
hnology
Unive
rsity
,
Santosh
, Ta
ngai
l, Dh
a
ka
–
19
02, Ba
ng
la
des
h.
Em
a
il
:
wah
idtu
hin0@
gm
ai
l.c
om
1.
INTROD
U
CTION
In
acco
r
dan
ce
with
recent
sta
ti
sti
cs
of
UN
(
Un
it
ed
Nati
on
s
),
it
is
cal
c
ulate
d
th
at
al
m
os
t
35%
wo
m
en
arou
nd
the
w
orl
d
e
xperienc
e
d
ph
ysi
cal
or
s
exu
al
vio
le
nce.
A
gain,
f
ur
t
her
sta
ti
sti
cs
on
w
om
en
safety
re
la
te
d
issues
done
by
m
any
nationa
l
stud
ie
s
s
ho
ws
that
a
bout
75%
wo
m
en
faces
ph
ysi
cal
an
d
se
xu
al
fe
ro
ci
ty
.
It’s
al
s
o
m
at
t
er
of
c
on
ce
rn
that
ap
prox
im
at
el
y
15
m
i
ll
io
n
ad
oles
ce
nce
girl
ha
ve
e
xp
e
rience
d
f
or
ce
d
sex
a
t
so
m
e
par
t
of
l
ife.
N
ow,
the
qu
e
sti
on
is
what
is
the
scena
ry
of
vio
le
nce
against
the
w
om
en
in
Ba
ng
l
ades
h.
A
case
st
ud
y
on
w
om
en
vio
le
nce,
se
xual
ab
us
e,
a
nd
ph
ysi
cal
har
assm
ent
is
done
by
D
ha
ka
Me
dical
C
ollege
on
th
e
victim
s
who
suffe
re
d
treat
m
ent
a
t
On
e
Stop
Crisi
s
Ce
ntre
(O
CC
)
and
burn
un
it
[1
].
The
res
ult
of
the
case
stu
dy
cl
ea
rly
show
s
m
assive
vio
le
nc
e
a
gainst
w
om
en
in
Ba
ngla
de
sh.
Alm
os
t
63%
of
w
om
en
age
d
from
16
to
30
ye
ars
feaced
the
vi
olence
ei
ther
ph
ysi
cal
ly
or
m
ental
ly
.
So
,
i
t’s
a
m
atter
of
gr
eat
con
ce
r
n
about
safety
relat
ed
i
ssu
es
for
wo
m
en
in
Ba
ngla
de
sh
.
This
is
ou
r
key
m
oto
to
dev
el
op
an
e
ffi
ci
ent
way
to
s
us
ta
in
vio
le
nce
a
gain
gt wom
en
an
d ens
ur
e t
heir
sa
f
et
y.
On
the
ot
her
ha
nd,
And
ro
i
d
a
pp
li
cat
io
n
ver
y
popula
r
in
rec
ent
ye
ars
as
se
rv
i
ng
it
s
great
est
featu
res
.
Alm
os
t
ever
y
per
s
on
in
our
s
ociet
y
wan
t
t
o
feel
the
te
st
of
an
droid
ph
on
e
by
us
in
g
it
s
a
pp
li
cat
io
ns
.
A
ndr
oid
app
li
cat
io
n
m
a
kes
a
re
vo
l
utio
nar
y
c
ha
ng
es
in
the
fiel
d
of
so
ci
o
-
eco
nom
i
cal
sect
or
s
.
I
n
recent
ye
a
r,
a
ndr
oi
d
app
li
cat
io
n
ha
s
beco
m
e
essenti
al
par
t
of
m
od
er
n
te
ch
no
l
og
y
in
t
he
f
ie
ld
of
m
ed
ic
al
,
bio
-
te
c
hnology,
bio
-
inf
orm
atic
s,
eco
nom
ic
a
l
sect
or
,
so
ci
al
issues
a
nd
ente
rtai
nm
ent
pu
r
poses.
I
n
so
m
e
dev
el
op
e
d
c
ou
ntries
m
ob
il
e
app
li
cat
ion
is
us
e
d
as
weapo
n
in
the
fiel
d
of
secu
rity
for
wo
m
en.
But
it
is
a
m
att
er
of
great
re
gret
tha
t
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2088
-
8708
In
t J
Elec
&
C
om
p
En
g,
V
ol.
9
, N
o.
5
,
Oct
ober
201
9
:
4
3
5
5
-
4
3
6
3
4356
peo
ple
of
our
c
ountry
has
le
ss
co
ncern
a
bout
safety
relat
ed
issues
t
ow
a
rds
wo
m
en.
It
w
ou
ld
be
a
gr
eat
i
de
a
if
andr
oid
a
ppli
cat
ion
is
us
e
d
a
s
the
arm
s
of
wo
m
en.
T
his
i
s
the
key
i
dea
and
m
otivati
on
of
our
w
ork.
So
,
we
hav
e
ta
ke
n
an
droid
te
ch
no
l
ogy
as
a
so
luti
on
of
safety
against
w
om
en
vio
le
nce.
This
research
s
hows
the
dev
el
op
m
ent
of
an
a
ppli
cat
ion
w
hich
is
m
a
inly
fo
c
us
e
d
on
w
om
en
safet
y.
Thro
ugh
t
he
us
es
of
t
his
m
od
el
,
safety
and sec
uri
ty
o
f w
om
en
in Ban
glades
h becom
e v
ery si
m
ple, easy and spon
ta
ne
ou
s
.
Ther
e
’s
a
l
ot
of
w
ork
in
t
he
file
d
of
sa
f
et
y
and
sec
ur
i
ty
.
Her
e,
t
he
pap
e
r
[2
]
pr
opose
d
voic
e
com
m
and
base
d
a
pp
li
cat
ion
wh
ic
h
has
ca
pa
bili
ty
to
recog
nize
us
e
r
voic
e.
A
fter
detect
io
n
of
voic
e
com
m
and
,
corres
pondin
g
app
li
cat
io
n
will
wo
r
k
an
d
sta
r
t
tracking
u
ser
’
s
loc
at
ion
by usi
ng
G
PS
m
odule
and
se
nd
tr
acked
locat
ion
to
pr
e
def
i
ned
nu
m
ber
.
A
udio
rec
or
der
will
sta
rt
a
nd
rem
ai
n
at
least
5
m
inu
te
s
to
ta
ke
au
dio
cl
ip
an
d
save
the
rec
orded
file
to
phon
e
st
or
a
ge.
Vo
ic
e
com
m
a
nd
will
wo
r
k
even
if
the
phon
e
keypa
d
is
locked.
Be
cause
of
th
e
app
li
cat
io
n
will
work
i
n
the
bac
kgr
ound
.
A
n
em
erg
enc
y
no
ti
ficat
ion
will
gen
e
rate
if
SM
S
sen
d
s
uccess
ful
ly
. U
ser
ca
n
al
so
sa
ve
c
onta
ct
num
ber
s b
y
usi
ng
voic
e com
m
and
.
In
t
he
pa
pe
r
[
3],
the
a
uthors
desig
ne
d
a
S
CI
WA
RS
a
pp
l
ic
at
ion
(Spy
Cam
era
Id
e
ntific
at
ion
a
nd
Wo
m
en
Atta
ck
Re
scue
Syst
em
)
wh
ic
h
can
be
co
ns
id
ere
d
as
a
par
t
of
tw
o
m
od
ules.
A
f
irst
m
od
ule
at
c
s
as
an
intel
li
gen
t
awa
re
syst
e
m
that
will
identify
t
he
inf
rar
e
d
ray
s
com
ing
fr
om
ever
y
Night
-
vi
sion
secret
ca
m
era
placed
in
al
te
r
native hotel
s
r
oo
m
s
or
r
oom
s
et
c.
a
nd
al
so
s
ensible
t
he
us
e
r
a
bout unsecured
place
by se
nd
i
ng a
sh
ort
m
essage.
The
se
co
nd
m
od
ule
will
be
ena
bled
by
pr
essi
ng
any
ke
y
con
ti
nu
ou
sl
y
wh
ic
h
will
pro
vid
e
favor
t
o
the
vi
ct
i
m
s
fr
om
an
act
ual
offe
ns
iv
e
unsecu
re
d
sit
uation.
It
se
n
ds
the
al
ert
m
es
sage
al
on
g
wit
h
G
PS
locat
ion
t
o
tr
ust
ed
m
ob
il
e nu
m
ber
s.
It also
takes a
proo
f of t
he vo
ic
e
an
d near
by im
age for 4
5
sec
onds.
The
pa
pe
r
[
4]
propose
d
a
n
andr
oid
a
pp
li
c
at
ion
that
ass
ures
secu
ri
ty
in
two
diff
e
ren
t
sit
uations.
On
e
of
t
hem
is
tra
velli
ng
at
ni
gh
t
an
d
an
ot
he
r
one
is
hom
e
secur
it
y.
The
f
irst
m
od
ule
pr
ov
i
de
a
featu
re
cal
le
d
save ou
r
souls (SOS)
. Th
is a
ppli
cat
ion
aslo
ha
ve
capa
bili
ty
t
o
r
un
i
n
the b
a
ckgr
ound. So, no
nee
d
to pres
s an
y
powe
r
bu
tt
on or so
m
et
hin
g
li
ke
that fo
r
ta
king acti
o
ns
. By p
ressin
g
the SOS b
utto
n
an
d
it
will
co
ll
ect
locat
io
n
form
la
t
it
ud
e
a
nd
lo
ng
it
ude
a
nd
sen
d
l
ocati
on
to
re
gisted
nu
m
ber
al
ong
with
al
ert
m
essage.
Sec
ond
m
od
ule
pro
vid
e h
om
e
secur
it
y
syst
em
in
abse
nce
of
us
e
r
at
h
om
e.
This
a
pp
li
cat
ion
r
e
ports
the u
ser
ab
out
an
e
nd
e
a
vo
r
of
in
form
at
ion
act
ivit
y
at
ho
m
e
by
a
m
essa
ge
an
d
a
recom
po
se
SMS
tri
gg
e
rs
an
d
a
scr
ea
m
ing
al
arm
siren
in
the
ho
us
e.
Nee
ded
an
a
ndr
oid
m
ob
il
e,
a
hard
war
e
ci
rcu
it
e
m
bed
ded
with
a
switc
h
a
nd
G
SM
m
od
e
m
that
al
so
connect
to
the
door.
Wh
e
n
som
e
on
e
trie
s
to
op
e
n
the
do
or,
the
switc
h
ste
ed
an
d
break
f
or
the
m
ic
ro
co
nt
ro
ll
e
r
to acti
vate the
GS
M m
od
em
t
o
se
nd alert
S
MS to t
he
re
gis
te
red
num
ber
thro
ugh
t
he
m
od
em
.
The
pa
per
[
5]
pro
po
ses
a
n
a
ppli
cat
ion
,
sin
gle
cl
ic
k
of
SOS
sen
ds
a
m
essage
base
d
on
th
e
l
ocati
on
and
au
di
o
or
vi
deo
cal
li
ng
to
t
he
par
e
nt
nu
m
ber.
Re
cei
ve
rs
tou
c
h
t
he
locat
ion
URL
in
t
he
m
essage
to
view
it
in
the
Goo
gle
Ma
p.
T
his
ap
pl
ic
at
ion
pro
vide
s
var
ie
ty
of
he
lping
to
ols
li
ke
“First
-
Ai
d
help,
Fa
ke
Ca
ll
Help
and
vid
e
o
cal
l
”.
The
‘F
irst
-
Aid
h
el
p’
to
ol
pro
vid
es
help
in
the
fiel
d
of
dif
fer
e
nt
hea
lt
h
relat
ed
pr
oble
m
s
occure
d
at
an
acci
den
ta
l
or
em
erg
ency
sit
ua
ti
on
duri
ng
at
night.
First
ai
d
hel
p
w
orks
f
or
diff
e
re
nt
prob
le
m
s
are
su
c
h
as
f
ooli
sh
an
d
not
br
eat
hin
g,
c
hoki
ng,
blee
ding
he
avily
,
bur
ns
,
hear
t
at
ta
ck,
di
abetes
et
c.
T
he
‘F
a
ke
cal
l
help’
reli
efs
from
the
m
eet
ing
tim
e
or
par
ti
es
w
he
n
wo
m
en
sta
rt
feeli
n
g
unc
om
f
or
ta
ble
and
t
hin
k
tha
t
,
“i
f
so
m
eon
e
cal
ls
m
e
then
sh
e
will
le
ave
this
place”
.
Ri
ng
t
one
of
fa
ke
cal
l
is
as
sa
m
e
as
ph
one
cal
l
rin
gto
ne
.
This
ap
plica
ti
on
al
so
sen
ds
the
au
dio
a
nd
vid
e
o
rec
ordi
ng
via
Em
ai
l
or
Gm
ai
l
in
the
tim
e
of
da
ng
e
r
wh
e
re
us
ers
are
una
ble to spea
k or
te
ll
the situati
on
.
2.
WORKI
NG
P
RINCIPLE
2.1.
Bl
oc
k d
i
ag
r
am
of p
r
oposed
s
ys
tem
This
de
velo
pe
d
syst
em
,
Figu
re
1
is
div
ide
d
into
so
m
e
interrelat
ed
com
ponen
ts
.
This
c
om
po
nen
ts
ar
e
inevita
ble
f
or
assur
i
ng
safety
issues
in
sm
a
rt
way.
Use
rs
are
easi
ly
able
to
treat
this
c
om
po
ne
nts
in
their
regular
pur
pos
es for
saf
et
y s
pe
ci
al
ly
the w
om
en
in
our
s
oc
ie
ty
and
c
ountr
y
[6,
7]
.
2
.
2
.
S
OS
butto
n
pressin
g
Figure
2
sho
w
s
the
flow
c
har
t
of
SOS
bu
tt
on
pr
essin
g.
I
n
th
e
figure,
we
ha
ve
ti
red
to
fig
ure
ou
t
ho
w
the
S
OS
bu
tt
on
prop
e
rly
w
orked,
if
t
he
m
obil
e
headpho
ne
is
conncect
e
d
or
not.
We
use
hea
dphone
po
wer
up
bu
tt
on
as
a
S
O
S
butt
o
n
[
8
-
13
]
.
First
co
nnect
hea
dphone
t
o
app.
A
fter
pres
sing
t
he
bu
tt
on
,
syst
em
wil
l
check
bu
tt
on
pressi
ng
detect
ion
or
no
t.
If
Yes,
s
yst
e
m
will
ta
ke
so
m
e
act
ion
s
su
ch
as
A
uto
m
atic
calli
ng
to
one
trusted
num
ber,
aut
om
at
ic
loc
at
ion
trac
king
will
beg
i
n
a
nd
sen
di
ng
locat
io
n
to
al
l
truste
d
num
ber
,
a
utom
at
ic
ca
m
era
will
be
op
e
n
ed
a
nd
sta
rt
vid
eo
r
e
cordin
g
an
d
the
save
rec
orde
d
vi
deo
in
phon
e
st
or
a
ge
or
m
e
m
or
y ca
rd
.
Evaluation Warning : The document was created with Spire.PDF for Python.
In
t J
Elec
&
C
om
p
En
g
IS
S
N:
20
88
-
8708
Ma
nifest
ing
a mobil
e ap
plica
ti
on
on s
afety
w
hich ascert
ain
s w
om
e
n
s
al
us i
n
B
angl
ad
e
s
h
(
Eli
as
H
os
s
ai
n
)
4357
Figure
1.
Pro
pose
d
syst
em
arch
it
ect
ur
e
diag
ram
Figure
2. Flo
w
ch
a
rt and
w
orkin
g
proce
dure
of SOS
b
utto
n p
ressin
g
2.
3.
Vo
ic
e c
om
mand
Vo
ic
e
c
omm
a
nd
m
od
ule
ca
n
be
perform
ed
by
use
r
voic
e
detect
io
n.
A
fter
fin
ding
the
voic
e
com
m
an
d
“
He
lp
m
e”
then
syst
e
m
will
st
art
to
detect
vo
ic
e.
I
f
requ
ired
voic
e
det
ect
s,
aut
om
ati
c
al
ly
perform
ing
th
e
act
ion
s
sam
e
as
Fi
g
ur
e
3.
Wh
e
n
us
er
s
of
the
ap
plica
ti
on
act
ivate
voic
e
m
od
e,
it
will
be
run
ni
ng
in
the
backg
rou
nd
a
ut
om
a
ti
cal
l
y
.
So,
w
hen
t
he
syst
e
m
find
re
quir
ed
voic
e
com
m
and
,
it
wil
l
be
try
to
recog
nize
an
d
then
perf
or
m
it’
s
giv
e
n
act
io
n
s
.
Wh
e
n
the
syst
e
m
find
s
st
op
c
omm
and
opti
on
,
it
will
stop
th
e
whole
syst
em
w
hich
is
run
ning
in
t
he
ba
ckgr
oung
of
m
ob
il
e
ph
one
an
d
use
rs
a
r
e
not
able
to
run
the
app
li
cat
io
n on
the b
ac
kgr
ound. T
o pe
rfor
m
this
op
e
rati
on
we use
Goo
gle
sp
eec
h r
eco
gn
iz
er.
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2088
-
8708
In
t J
Elec
&
C
om
p
En
g,
V
ol.
9
, N
o.
5
,
Oct
ober
201
9
:
4
3
5
5
-
4
3
6
3
4358
Figure
3.
Fl
ow
ch
a
rt and
w
orkin
g
proce
dure
of
voi
ce c
omm
and
detect
ion
2.4
.
Hid
den c
amer
a
rec
ordi
ng
Hidden
cam
era
is
a
bu
il
t
in
ca
m
era
palced
in
the
m
ob
il
e
phon
e
bu
t
pr
ogra
m
m
a
ti
cal
l
y
i
t’s
po
ssi
ble
to
run
in
the
bac
kgr
ound.
T
o
w
ork
with
hidden
ca
m
era
we
hav
e
to
us
e
bac
kgr
ound
ser
vice
.
Hidden
cam
e
ra
will
keep
vid
e
o
re
cord
ing
in
t
he
backg
rou
nd
f
or
sa
fety
relat
ed
m
atters.
I
n
Figure
4,
m
a
nu
al
ly
,
afte
r
press
in
g
captu
re
butt
on
of
th
e
ph
on
e
,
it
will
auto
m
at
ic
al
ly
s
ta
rt
vid
eo
record
i
ng
in
the
bac
kgr
ound
an
d
sa
ve
the
recorde
d
vid
e
o
cl
ip in
phone
m
e
m
or
y ca
rd
or
phone st
or
a
ge
.
A
gain,
i
f
sys
tem
d
et
ect
s
stop
capt
ur
e
butt
on the
n
backg
rou
nd servic
e w
il
l b
e fi
ni
sh
ed
. S
yst
em
i
s unb
le
to
ta
ke vide
o
in
b
ac
kg
rou
nd w
it
ho
ut
sta
rt ser
vice
.
Figure
4. Flo
w
ch
a
rt and
w
orkin
g proce
dure
of
h
id
den
cam
era r
ec
ordi
ng
2
.
5
.
Ph
on
e
sh
ak
in
g
de
tecti
on
By
us
ing
acce
le
ro
m
et
er
senso
r
,
phone
sha
king
will
be
work
ed
.
First
of
al
l
we
nee
d
to
act
ivate
sh
a
king
m
od
e.
Af
te
r
act
ivati
on
of
ph
on
e
s
hak
i
ng,
it
will
be
r
unni
ng
in
t
he
backgro
und.
Fig
ur
e
5
s
ho
ws
the
phone
sh
a
king
detect
ion
syst
e
m
.
If
syst
e
m
detcet
s
sh
aki
ng
3
tim
es,
autom
a
ti
cal
l
y
per
f
or
m
the
act
i
on
s
as
descr
i
bed
i
n
the
sect
ion
3.1
.
If
syst
e
m
find
the
com
m
and
of
stop
s
ha
ki
ng
m
od
e,
the
n
sh
a
king
m
od
e
will
be
st
op
pe
d.
Evaluation Warning : The document was created with Spire.PDF for Python.
In
t J
Elec
&
C
om
p
En
g
IS
S
N:
20
88
-
8708
Ma
nifest
ing
a mobil
e ap
plica
ti
on
on s
afety
w
hich ascert
ain
s w
om
e
n
s
al
us i
n
B
angl
ad
e
s
h
(
Eli
as
H
os
s
ai
n
)
4359
Figure
5
.
Flo
w
cha
rt and
w
orkin
g proc
e
dure
of
phone s
hak
i
ng d
et
ect
io
n
3.
SY
STE
M REQUI
REME
N
TS
The
dev
el
op
m
ent
of
the
pro
pose
d
m
od
el
can
be
do
ne
th
rough
s
of
t
war
e
a
s
well
as
ha
r
dware
pa
rt
of
the
us
e
r
sm
a
rt
phone.
B
ot
h
of
them
play
s
a
sign
i
ficant
r
ole
in
the
proces
s
of
e
xpan
ding
the
app
li
cat
io
n.
S
oft
war
e
sect
io
n
can
be
cl
assif
ie
d
by
re
qu
i
re
d
pro
gram
m
ing
la
ngua
ge,
de
velo
ping
plat
form
,
ID
E
a
nd
O
S
(oper
at
in
g
sys
tem
).
The
em
bodim
ent
of
this
ap
plica
ti
on
is
per
f
orm
ed
by
an
droid
s
tud
io
,
Java
Pro
gr
am
m
ing
Lan
gu
a
ge
.
The
databa
se
of
this
ap
pl
ic
at
ion
is
real
tim
e
database
wh
ic
h
is
fir
ebase.
Figure
6
s
hows
d
at
aba
se syst
e
m
o
f
de
velo
pe
d
a
pp
li
cat
io
n.
Figure
6
.
Syst
em
d
ia
gr
am
o
f
da
ta
base s
yst
em
of
dev
el
op
e
d
a
pp
li
cat
io
n
The
us
e
r
al
so
r
equ
i
re
to
ad
d
tr
us
te
d
num
ber
a
nd
tr
us
te
d
c
onta
ct
nu
m
ber
w
il
l
be
sa
ve
d
in
th
e
databa
s
e
m
od
ule.
All
th
e
inform
at
ion
s
will
be
save
d
in
the
data
bas
e.
W
e
us
e
real
-
tim
e
database
for
sto
rin
g
da
ta
on
the
onli
ne.
T
he
hard
war
e
se
ct
ion
di
vid
e
d
i
nto
tw
o
inte
rrel
at
ed
par
ts
.
T
his
tw
o
pa
rts
act
as
a
hear
t
of
t
he
wireless
com
m
un
ic
at
io
n
as
w
el
l
as
locat
ion
sh
ari
ng
f
or
sa
f
et
y
relat
ed
issues.
Firstl
y,
Use
rs
ha
ve
to
ca
rry
ou
t a
sm
art
ph
on
e
to
est
ablish
a
reli
able
connecti
on
thr
ough
GSM
and
G
PRS
m
od
ule.
Seco
ndly
,
the
us
e
r’
s
m
ob
il
e
m
us
t hav
e
GPS m
od
ule
for
tr
ackin
g
the
loca
ti
on
.
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2088
-
8708
In
t J
Elec
&
C
om
p
En
g,
V
ol.
9
, N
o.
5
,
Oct
ober
201
9
:
4
3
5
5
-
4
3
6
3
4360
Global
posit
io
ning
syst
em
(G
PS)
is
a
na
vig
a
ti
on
a
nd
pro
pe
r
posit
ion
in
g
t
ools
that
trac
ks
t
he
locat
io
n
base
d
on
la
ti
tud
e
an
d
l
ongitu
de.
T
he
GP
S
c
od
e
r
m
od
ule
s
earchs
a
n
act
ua
l
address.
The
y
can
be
st
reet
nam
e,
nearby
place,
sch
oo
ls,
c
olleg
es
et
c.
If
GP
S
syst
e
m
is
no
t
in
w
ork
or
GPS
is
disable
d,
l
ocati
on
will
be
sent
autom
at
ic
ally
on
ly
the
co
ord
inate
valu
e
of
l
at
it
ud
e
an
d
l
on
gitud
e
.
B
ut
to
functi
onat
e
thi
s
proce
dure
pr
op
e
rly
internet is
nee
de
d
. Alg
ori
thm
1,
s
how
s
how
t
he GPS
m
od
ul
e wor
ks
for
l
oc
at
ion
s
har
i
ng.
STEP
1:
Re
que
st for acces
s lo
cat
ion
.
STEP
2: C
hec
k GPS
is en
abl
ed or
not.
STEP
3:
If
(
GPS==
E
NA
BLE
D)
The
n g
oto
STEP
4 othe
r
w
ise
goto STEP
1
STEP
4: T
racki
ng
will
b
e
gin
STEP
5: C
ollec
t coo
r
din
at
e
STEP
6: Se
nd
coor
din
at
e to
tr
us
te
d pe
ople
.
STEP
7: E
N
D
Algorithm
1
. L
ocati
on s
har
i
ng A
lg
ori
thm
u
sing G
PS
m
odule
To
w
ork
a
G
SM/
GP
RS
m
od
ule
ef
fecti
vel
y,
need
e
d
a
SI
M
car
d
f
or
m
ob
il
e
com
m
un
ic
at
ion
.
The
SI
M
ca
rd
resides
in
th
e
GS
M/
GP
R
S
m
odule
an
d
al
lo
w
wireless
c
om
m
un
ic
at
ion
thr
ough
ou
t
the
world
.
The
S
IM
car
d
or
Subsc
riber
I
den
ti
ty
m
od
ule
is
respo
ns
ible
for
se
nd
i
ng
S
MS
to
al
l
trust
ed
num
ber
s
th
at
are
store
d
in
the
ap
plica
ti
on
datab
ase.
4.
RESU
LT
S
A
ND
DI
SCUS
S
ION
4
.
1.
Ex
peri
ment 0
1
We'
ve
done
s
om
e
exp
erim
e
nts
with
s
haki
ng
a
nd
vo
ic
e
com
m
and
cr
ie
te
ria
and
f
ound
s
om
e
exp
e
rim
ented
data.
Our
e
xpe
rim
ent
is
to
trace
dow
n,
ho
w
m
uch
tim
e
it
t
akes
t
o
recei
ve
the
m
essage
a
t
the
receiver
e
nd
a
fter
the
phone
sh
a
king
an
d
voic
e
com
m
and
.
W
e
hav
e
ta
ke
n
te
ste
d
data
s
epar
at
el
y
f
or
phone
sh
a
king
an
d
voic
e
com
m
and
.
Our
ex
per
im
e
nted
data
s
how
s
that
SMS
send
in
g
de
pends
on
the
m
ob
il
e
phone
ver
si
on
a
nd
th
e
wireless
network.
It’s
a
m
at
te
r
of
gr
eat
won
der
that
w
e
fo
un
d
ver
y
li
tt
le
resp
onse
tim
e
fo
r
transm
itti
ng
th
e
SMS
i
n
rura
l
areas.
Af
te
r
s
uccesf
ull
10
e
xp
e
rim
ent
Tab
le
1,
we
f
ound
the
a
ver
a
ge
re
sp
onse
tim
e aro
und 8
.
1
to
8.3 m
secon
ds.
Fi
gure
7 s
hows g
raphical
r
e
pr
ese
ntati
on of e
xp
e
rim
ent
ed data
.
Table
1.
E
xper
i
m
ented
data
pa
ssing t
hro
ugh
vo
ic
e c
omm
and
Exp
eri
m
en
t no
Res
p
o
n
se
ti
m
e
(0.0
0
1
s)
Distan
ce(k
m
)
Co
o
rdin
ate
Test 1
6
.8
1
.2
2
3
.75
1
6
,
90
.37
7
8
Test 2
6
.87
1
.2
2
3
.75
1
6
,
9
0
.37
7
8
Test 3
8
.1
2
4
2
.6
2
4
.36
3
6
,
8
8
.62
4
1
Test 4
5
.2
2
3
7
.8
2
4
.89
4
9
,
9
1
.86
8
7
Test 5
1
4
.42
1
9
3
.3
2
4
.89
4
9
,
9
1
.86
8
7
Test 6
1
3
.13
2
4
3
.9
2
2
.35
6
9
,
9
1
.78
3
2
Test 7
7
.60
2
9
9
.4
2
1
.82
1
0
,
9
0
.12
1
4
Test 8
9
.30
3
.0
2
3
.72
8
6
,
9
0
.38
5
4
Test 9
3
.1
1
8
0
.5
2
3
.54
5
0
,
8
9
.17
2
6
Test 10
6
.60
1
6
7
.3
2
2
.87
2
4
,
9
1
.09
7
3
Figure
7. G
raphical
r
e
pr
ese
nt
at
ion
of ex
per
i
m
ented
data
of
voic
e comm
and
Evaluation Warning : The document was created with Spire.PDF for Python.
In
t J
Elec
&
C
om
p
En
g
IS
S
N:
20
88
-
8708
Ma
nifest
ing
a mobil
e ap
plica
ti
on
on s
afety
w
hich ascert
ain
s w
om
e
n
s
al
us i
n
B
angl
ad
e
s
h
(
Eli
as
H
os
s
ai
n
)
4361
4
.
2.
Ex
peri
ment 0
2
We
did
so
m
e
exp
e
rim
ents
in
the
night.
T
he
aver
a
ge
sta
ti
sti
cal
value
of
r
e
sp
onse
tim
e
in
D
hak
a
ci
ty
is
arou
nd
6.8
t
o
8
wh
ic
h
is
r
eflect
ing
on
T
able
2
a
nd
Fig
ur
e
8
.T
he
ti
m
e
it
’s
ta
ke
to
t
r
ansm
it
action
s
at
the
receiver
en
d.
Howe
ver,
the
whole
syst
em
dep
e
nd
on
the
cel
lu
la
r
net
wor
k.
We
ha
ve
al
s
o
m
ade
a
com
par
is
on
on
feat
ur
es
am
ong
so
m
e
po
pula
r
m
ob
il
e
app
li
cat
ion
s
in
google
paly
store
.
Fo
r
our
rese
arch,
we
ha
ve
ta
ken
8
app
li
cat
io
ns
and
fou
nd
the
bette
r
res
ult
than
th
ei
r
exi
xt
ing
res
ult
ref
l
ect
ed
on
Tabl
e
3.
Ba
sic
al
ly
,
tho
s
e
app
li
cat
io
ns
stron
gly
fo
cus
on
s
om
e
par
ticular
sect
or
in
the
fiel
d
secur
it
y
or
safety
.
But
in
ou
r
pro
ps
e
d
app
li
cat
io
n,
w
e
trie
d
hard
to
com
bin
e
al
l
the
featur
es
in
th
e
fiel
d
wo
m
en
safety
.
Thu
s
m
aking
our
propose
d
app
li
cat
io
n
sim
pler, m
or
e eff
i
ci
ent, frie
ndli
er towar
ds w
ome
n
a
nd obio
us
l
y handy
Table
2
.
E
xper
i
m
ented
da
ta
pa
ssing t
hro
ugh
p
ho
ne
s
ha
king
Exp
eri
m
en
t no
Res
p
o
n
se ti
m
e
(0.0
0
1
s)
Distan
ce(k
m
)
Co
o
rdin
ate
Test 1
7
1
.2
2
3
.75
1
6
,
9
0
.37
7
8
Test 2
7
.2
1
.2
2
3
.75
1
6
,
9
0
.37
7
8
Test 3
1
2
.02
2
4
2
.6
2
4
.36
3
6
,
8
8
.62
4
1
Test 4
8
2
3
7
.8 k
m
2
4
.89
4
9
,
9
1
.86
8
7
Test 4
8
2
3
7
.8 k
m
2
4
.89
4
9
,
9
1
.86
8
7
Test 5
6
.9
1
9
3
.3 k
m
2
4
.89
4
9
,
9
1
.86
8
7
Test 6
1
3
.13
2
4
3
.9 k
m
2
2
.35
6
9
,
9
1
.78
3
2
Test 7
8
.7
2
9
9
.4 k
m
2
1
.82
1
0
,
9
0
.12
1
4
Test 8
8
.5
3
.0 k
m
2
3
.72
8
6
,
9
0
.38
5
4
Test 9
3
8
.2
1
8
0
.5 k
m
2
3
.54
5
0
,
8
9
.17
2
6
Test 10
4
.30
1
6
7
.3 k
m
2
2
.87
2
4
,
9
1
.09
7
3
Figure
8. G
raphical
r
e
pr
ese
nt
at
ion
of ex
per
i
m
ented
data
of
phone
sh
a
king
appr
oac
h
Table
3
.
Feat
ur
es com
par
iso
n a
m
on
g s
om
e p
opular
m
ob
il
e app
li
cat
io
ns
Ap
p
na
m
e
Featu
res
Prop
o
sed
sy
ste
m
f
eatu
res
Stay
saf
e
Locatio
n
sen
d
in
g
b
y
press
in
g
SOS
key
Yes
Ch
illa
Locatio
n
sen
d
in
g
t
o
tr
u
sted
the n
u
m
b
er
b
y
press
in
g
ph
o
n
e po
wer
b
u
tto
n
3 ti
m
es
Yes
Sh
ak
e to saf
ety
Locatio
n
sen
d
in
g
t
o
tr
u
sted
the co
n
tact nu
m
b
e
r
b
y
sh
ak
e ph
o
n
e
Yes
BSaf
e
Sen
d
an aler
t
m
ess
ag
e to g
u
ardian
by
p
ressin
g
bu
tto
n
Yes
W
o
m
en
saf
et
y
Sen
d
a
lo
catio
n
to trus
ted
con
tact nu
m
b
er
b
y
tap to
bu
tt
o
n
.
Yes
Vith
U
Sen
d
a
lo
catio
n
to trus
ted
con
tact nu
m
b
er
b
y
tap to
bu
tt
o
n
.
Yes
S
m
art24
x
7
Sen
d
in
g
a
lo
catio
n
to trus
ted
con
tact
n
u
m
b
er
by
p
r
ess
in
g
to a bu
tto
n
Yes
Hi
m
m
a
t
Sen
d
in
g
aud
io
an
d
vid
eo
to th
e po
lice statio
n
by
p
ressin
g
SOS
Yes
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2088
-
8708
In
t J
Elec
&
C
om
p
En
g,
V
ol.
9
, N
o.
5
,
Oct
ober
201
9
:
4
3
5
5
-
4
3
6
3
4362
5.
SCREE
N SH
OTS
Ba
sic
al
ly
,
ou
r
dev
el
op
e
d
a
pp
l
ic
at
ion
offers
var
ie
ty
of
func
ti
on
s.
B
ut
in
orde
r
to
f
oc
us
m
ai
n
par
t
the
app
li
cat
io
n we
pro
vid
e a
p
a
rt
of our
ap
plica
ti
on in Fi
gure
9.
Figure
9. Scree
n
s
ho
ts
of
our devel
op
e
d
m
obil
e app
li
cat
ion
6.
FUTU
RE W
O
RKS
In futu
re, we
w
il
l wo
r
k har
d
t
o:
-
Ma
ke
this a
ppli
cat
ion
p
la
tf
or
m
ind
epe
nde
nt.
-
Add
l
ot of
func
ti
on
al
it
ie
s d
epe
nd
i
ng on t
he o
bj
ect
iv
e
of
t
he
functi
onal
it
ie
s.
-
Re
du
ce
the m
em
or
y con
s
um
ption
in
the
de
vi
ce an
d
al
s
o
e
nsure
the lit
tl
e
m
e
m
or
y space
.
-
In
cl
ud
e
G
e
o
-
fe
ncin
g wh
ic
h
ca
n be
us
e
d
to
id
entify
saf
e
and
un
s
afe a
reas.
-
Connect
th
rou
gh Bl
ueto
oth
with sm
art d
ev
ic
e.
-
Dev
el
op a
way w
her
e
a
us
er
c
an fin
d
real t
im
e tracki
ng v
i
de
o.
7.
CONCL
US
I
O
N
In
c
oncede
dly
it
’s
inclu
ded
t
hat
this
syst
em
will
play
an
e
ff
ect
ive
ro
le
for
the
sa
fety
of
wo
m
en
i
n
Ba
ng
la
desh
.
It
would
be
po
ssi
ble
to
ide
ntify
the
crim
inal
throu
gh
this
syst
e
m
so
that
w
om
en
can
ens
ur
e
their
safety
.
The
pro
po
s
ed
syst
em
pr
ovides
t
he
m
od
ule
S
OS
(
Sa
ve
our
souls.
)
butt
on
p
re
ssin
g
and
t
hroug
h
thi
s
,
it
’s
po
s
sible
to
se
ndin
g
cu
rrent
lo
cat
ion
to
t
ru
ste
d
num
ber
by
pressi
ng
this
S
OS
key.
T
his
s
yst
e
m
pr
ovides
vo
ic
e
detect
s
the
m
od
ule.
Ba
sic
al
ly,
in
t
he
ti
m
e
of
da
ng
e
r,
it
’s
not
possi
b
le
to
cal
li
ng
or
te
xt
so
m
eon
e
by
pr
essi
ng
m
ob
il
e
bu
tt
on
or
op
e
n
te
m
po
rar
y
loc
k.
I
n
s
om
e
incident
our
pro
po
se
d
sy
stem
pr
ovide
s
om
e
us
efu
l
fea
ture
s
.
Ver
y
easy
to
cal
li
ng
so
m
eon
e
or
passing
current
locat
io
n
b
y
voic
e
co
m
m
and
li
ke
“
HELP”
.
This
syst
e
m
autom
at
ic
ally
detect
s u
s
e
r v
oi
ce thr
ough the
se m
od
ules.
The
pr
opos
e
d
syst
e
m
p
ro
vi
de
s
Phon
e
s
ha
ki
ng
feat
ur
e
s
.
S
om
eti
m
e
s
wo
m
en
can’
t
c
al
l
to
par
e
nts
if
sh
e
faces
pro
bl
e
m
s
or
sh
e
c
an’
t
noti
fy
he
r
cu
rr
e
nt
sit
u
at
i
on
to
he
r
pa
re
nts
in
the
tim
e
of
da
ng
e
r.
I
n
t
his
sit
uation
a
w
om
en
can
se
nd
their
locat
io
n
t
o
al
l
tru
ste
d
num
ber
s
an
d
pa
ren
ts
by
s
hak
i
ng
ph
on
e
t
hr
ee
tim
es.
Wh
e
n
syt
em
detect
s
sh
akin
g
phone
three
ti
m
es
then
syst
em
will
awak
e
and
a
uto
m
at
icall
y
trackin
g
c
urren
t
locat
ion
an
d
s
end
i
ng
locat
io
n
to
al
l
trusted
num
ber
s
thr
ough
SMS
.
T
his
syst
e
m
pr
ovides
m
ulti
ple
safety
featur
e
s
a
nd th
rou
gh
these
w
om
en
can e
nsur
e safety
.
The
propose
d
syst
e
m
pr
ovid
es
Hidde
n
ca
m
era
m
od
ule.
In
s
om
e
cases
this
syst
e
m
al
so
pro
vid
e
d
us
ef
ul
e
vid
e
nc
e.
Th
r
ough
hi
dd
e
n
ca
m
era
m
od
ule,
syst
em
can
ta
ke
screte
vide
o
cl
ip
an
d
sa
ve
it
to
phon
e
stora
ge
an
d
it
can
be
im
po
rtance
evi
de
nce
f
or
detect
ing
t
he
crim
inal.
In
t
he
ti
m
e
of
danger,
Wo
m
en
ne
eds
to
ta
ke
so
m
e log
for
the ide
ntifi
cat
ion
of
the c
r
i
m
inal bu
t d
ue t
o
la
ck
of
proper ev
i
den
ce
w
om
en
and
poli
ce can’
t
identify
the
cri
m
inal.
Hidden
ca
m
era
m
od
ule
act
as
the
e
vi
den
ce
.
S
o,
this
al
l
about
our
works
a
nd
de
ve
lop
e
d
m
od
el
o
f
the prop
os
ed
syst
e
m
.
W
e
work
e
d very h
a
rd
to
e
ns
ure w
o
m
en
safety
f
or
our
s
ociet
y and
cou
ntry.
W
e
hav
e
c
hosen
a
ndr
oid
te
ch
no
l
og
y
to
est
ablis
h
this
m
od
el
.
We
can
say
th
at
we
render
a
ti
t
tl
e
con
tribu
t
ion
s
in
the f
ie
ld
wom
e
n
sa
fety
in
Ba
ngla
des
h.
Evaluation Warning : The document was created with Spire.PDF for Python.
In
t J
Elec
&
C
om
p
En
g
IS
S
N:
20
88
-
8708
Ma
nifest
ing
a mobil
e ap
plica
ti
on
on s
afety
w
hich ascert
ain
s w
om
e
n
s
al
us i
n
B
angl
ad
e
s
h
(
Eli
as
H
os
s
ai
n
)
4363
REFERE
NCE
S
[1]
Khan,
N.
T.
,
Be
gum
,
A.,
Chow
dhur
y
,
T.
M.
J.,
Das,
B.
K
.
,
Sh
a
hid,
F.,
Kabir
,
S.,
Begum,
M.,
Viole
nc
e
aga
ins
t
wom
en
in
Banglade
sh
,”
Del
ta
M
edi
ca
l
Col
le
ge
J
ournal
,
vol
.
5(1)
,
pp
.
25
-
29
,
201
7.
[2]
Tha
kar
e,
Ra
ja
ni
T.
,
a
nd
M.
R.
Shahade,
"Revi
e
w
on
Android
B
ase
d
SO
S
E
m
erg
ency
Aler
t
But
t
on,
"
Inte
rnation
al
Journal
of
R
ese
a
rch
in
S
cienc
e
&
Engi
n
ee
ring
,
vo
l.
1
,
2015
.
[3]
Bhardwa
j,
Nish
ant
,
and
Nit
ish
Aggarwal
,
"D
esign
and
Deve
lo
pm
ent
of
“Sura
ksha”
-
A
W
om
e
n
Safe
t
y
Devi
ce
,
"
Inte
rnational
Jo
urnal
of
In
formation
&
Computat
ional
Te
chnol
og
y
,
vo
l. 4(
8
)
,
pp.
787
-
792
,
2014
.
[4]
Chand,
Dhr
uv
,
e
t
al
.
,
"A
m
obil
e
appl
i
ca
t
ion
for
W
om
en'
s
Safe
t
y:
W
oSA
pp,
"
TENCON
2015
-
2015
IEEE
R
egi
on
10
Confe
renc
e,
IEEE
,
2015
.
[5]
Sapna,
M.,
N
.
Sha
hana
B
egum,
and
S.
Tha
ng
a
Ram
y
a
,
"
SW
C
(
Safe
t
y
for
W
ome
n
&
Chil
d)
,
an
Android
App
.
”
Inte
rna
ti
o
na
l
Jou
rna
l
of
Appli
ed
Resea
rch
,
v
ol
.
4,
no.
1
,
pp.
26
-
31
,
2016
.
[6]
Para
dkar
,
Abhijit,
and
Dee
p
ak
Sharm
a
,
"A
ll
in
o
ne
Intelli
g
ent
S
a
fety
S
y
s
te
m
for
W
om
en
Secur
ity
,
"
Inte
rnat
ional
Journal
of
Computer
App
li
ca
ti
on
s
,
vol. 130(
11
)
,
pp.
33
-
40
,
2015
.
[7]
Singh,
Kara
nde
e
p,
et
al
.
,
"D
evel
oping
a
fra
m
ew
ork
for
eva
lu
ati
ng
the
pa
ti
en
t
e
ngage
m
ent
,
qu
alit
y
,
and
safe
t
y
o
f
m
obil
e
he
al
th
ap
pli
c
at
ions,
"
Iss
ue
Bri
ef
(Com
m
onw Fund)
vol.
5
(
1
)
,
pp
.
11
,
2016
.
[8]
Yarra
bothu,
Rav
i
Sekhar
,
and
Br
amara
m
bika
Th
ota
.
"A
bha
y
a:
A
n
Andr
oid
App
for
the
saf
ety
of
wom
en,
"
India
Confe
renc
e
(
INDICO
N
)
,
2015.
Annual
I
EE
E
.
I
E
EE
,
2015.
[9]
Visw
ana
th,
Kalp
ana
,
and
As
hish
Basu
,
"S
afe
ti
Pi
n:
an
innovative
m
obil
e
app
to
c
oll
e
ct
data
on
wom
en'
s
safe
t
y
i
n
India
n
ci
t
ie
s,
"
Gende
r
&
Dev
el
o
pment
vol
.
23
(
1
)
,
pp
.
45
-
60
,
201
5
.
[10]
Sarosh,
Muham
m
ad
Yasir,
et
al
.
,
"M
ehf
oo
za
ur
a
t:
Tra
nsform
ing
sm
art
phones
in
to
wom
en
sa
fe
t
y
d
evice
s
aga
ins
t
har
assm
ent
,
"
P
roce
edi
ngs
of
the
Ei
gh
th
Int
ernati
onal
Con
fe
renc
e
on
Inf
orm
ati
on
and
Comm
unic
ati
on
Technol
ogi
es
an
d
Dev
e
lopment
,
ACM
,
2016.
[11]
Jatt
i
,
Anan
d,
et
al
.
,
"D
esign
an
d
deve
lopment
of
an
IOT
base
d
wea
rab
l
e
dev
i
ce
for
th
e
safe
t
y
and
sec
u
ri
t
y
of
wom
en
and
girl
chi
ldre
n
,
"
2016
IEE
E
Int
ernational
Confe
renc
e
on
Re
ce
n
t
Tr
ends
in
El
ectronic
s,
Informatio
n
&
Comm
unic
ati
on
Technol
ogy
(
RTEICT)
,
IEE
E
,
20
16.
[12]
Har
iki
ran
G
.
C.
,
et
a
l
.
,
"S
m
art
sec
urity
solut
ion
f
or
wom
en
b
ase
d
on
Inte
rne
t
Of
Thi
ngs
(IOT,
"
2
016
Inte
rnationa
l
Confe
renc
e
on
E
le
c
tric
al
,
El
e
ct
ro
nic
s,
and
Optimi
zation
Techn
iqu
es
(
ICEE
OT
)
,
IEE
E, 2016.
[13]
Akash,
Saad
Ahm
ed,
et
a
l
.
,
"H
ea
rm
e:
A
sm
art
m
obil
e
appl
i
cati
on
for
m
it
iga
ti
n
g
wom
en
har
ass
m
ent
,
"
2016
IE
EE
Inte
rnational
WI
E
Conf
ere
nce on
Elec
tri
cal and Com
pute
r E
ngin
ee
ring (
WIE
CON
-
ECE
)
,
IE
EE
,
2016.
BIOGR
AP
H
I
ES
OF
A
UTH
ORS
Eli
as
Hossain
Stud
y
ing
a
t
Dep
a
rtment
of
Softw
are
Engi
ne
eri
ng
Final
y
e
ar
f
irst
s
emester
,
D
aff
odi
l
Inte
rna
ti
ona
l
Univer
sit
y
.
His
rese
arc
h
int
er
este
d
are
as
ar
e
App
base
d
sec
uri
t
y
sy
stem
applic
at
io
n
with
art
if
ic
i
al
in
te
lligen
ce
solout
ion
and
Inte
rn
et
of
Thi
ngs.
Curre
ntly
h
e
is
working
with
Mobile
Applic
a
ti
on
(An
droid)
and
Artificial
Intelli
g
enc
e
.
He
is
ver
y
goo
d
at
doing
proj
e
ct
s
base
d
work
i
n
the
fi
el
d
of
and
roid
and
Io
T.
H
e
has
re
ce
iv
ed
m
an
y
pri
ze
s
fro
m
m
any
n
at
ion
a
l
and
in
te
rn
at
io
nal
proje
c
t
bas
ed
co
m
pet
ti
on.
Wahid
ur
Ra
h
man
study
ing
at
Com
pute
r
Scie
n
ce
and
En
gine
er
ing
Depa
rtment
in
Mawla
na
Bhashani
Scie
n
c
e
and
T
ec
hnolo
g
y
Univer
si
t
y
(
MBS
TU)
.
Curre
ntly
he
is
stud
y
i
ng
in
4th
Yea
r
1st
Sem
este
r.
His
re
sea
rch
int
er
ests
inc
lud
e
au
tomation
and
con
trol
l
i
ng,
wire
le
ss
net
working,
ar
ti
fi
cial
int
ellige
n
ce
and
andr
oid
b
ase
d
h
ard
ware
c
ontroll
ing.
In
r
ecent
y
e
ars
he
ha
s
b
ee
n
working
with
Io
T
base
d
app
li
c
atio
n
and
g
ene
r
al pu
rpose
m
obil
e
ap
pli
c
at
ion
.
Tare
qu
l
Is
lam
is
working
as
a
S
eni
or
Lectu
r
er
in
Depa
rtment
of
Com
pute
r
Scie
n
ce
and
Engi
n
ee
r
i
n
g
at
Khw
aj
a
Yunu
s
Ali
Univer
sit
y
,
Siraj
gonj
,
Bang
la
desh.
He
completed
his
B.
Sc.
(Hons
.
)
degr
ee
on
Com
pute
r
Scie
n
ce
and
Eng
ineer
ing
from
Raj
sha
hi
Univer
sit
y
,
B
angl
ad
esh
and
M.Sc
.
(Engg
.
)
o
n
Com
pute
r
Scie
n
ce
and
Engi
n
ee
r
ing
from
Mawla
na
Bhashani
Sci
enc
e
and
Te
chn
olog
y
Univer
si
t
y
,
Ta
nga
il
,
B
angl
a
desh.
His
m
ai
n
rese
arc
h
in
te
r
est
is
base
d
on
Io
T,
Bloc
k
chain,
Cr
y
ptogr
aph
y
a
nd
Network
Secur
i
t
y
,
Softwar
e
Eng
i
nee
ring
,
Im
age P
roc
essing
an
d
Pa
tt
ern
Rec
ogn
it
io
n.
Seli
m
Hossain
is
serving
as
a
Le
c
ture
r
in
Dep
art
m
ent
of
Com
pute
r
Scie
n
ce
a
nd
Engi
nee
r
ing
at
Khw
aj
a
Yunus
Ali
Univer
sit
y
,
Siraj
gon
j
,
B
angl
ad
esh.
He
complet
ed
h
is
B.
Sc.
d
egr
e
e
on
Te
l
ec
om
m
unic
ation
and
El
e
ct
ro
nic
Eng
ineeri
ng
from
Haje
e
Moham
m
ad
Da
nesh
Scie
nc
e
a
nd
Te
chno
log
y
Univer
sit
y
,
Dina
jpur,
B
angl
ad
e
sh
and
M.Sc.
(Engg.
)
on
Inform
at
ion
and
Com
m
unic
at
ion
Te
chno
log
y
fro
m
Mawla
na
Bhasha
ni
Scie
nc
e
an
d
Te
chnol
og
y
U
nive
rsit
y
,
Ta
ng
a
il
,
Bangl
ad
esh.
His
m
ai
n
rese
ar
ch
int
er
est
is
base
d
on
IoT,
B
loc
k
c
hai
n,
Cr
y
p
tograph
y
and
Networ
k
Secur
ity
,
Ant
e
nna,
Algorit
hm
,
OF
DM
,
Software
Engi
ne
ering
as
well
as
Optic
al
Fiber
Com
m
unic
at
ion.
Evaluation Warning : The document was created with Spire.PDF for Python.