Manifesting a mobile application on safety which ascertains women salus in Bangladesh

ABSTRACT


INTRODUCTION
In accordance with recent statistics of UN (United Nations), it is calculated that almost 35% women around the world experienced physical or sexual violence. Again, further statistics on women safety related issues done by many national studies shows that about 75% women faces physical and sexual ferocity. It's also matter of concern that approximately 15 million adolescence girl have experienced forced sex at some part of life. Now, the question is what is the scenary of violence against the women in Bangladesh. A case study on women violence, sexual abuse, and physical harassment is done by Dhaka Medical College on the victims who suffered treatment at One Stop Crisis Centre (OCC) and burn unit [1]. The result of the case study clearly shows massive violence against women in Bangladesh. Almost 63% of women aged from 16 to 30 years feaced the violence either physically or mentally. So, it's a matter of great concern about safety related issues for women in Bangladesh. This is our key moto to develop an efficient way to sustain violence againgt women and ensure their safety.
On the other hand, Android application very popular in recent years as serving its greatest features. Almost every person in our society want to feel the test of android phone by using its applications. Android application makes a revolutionary changes in the field of socio-economical sectors. In recent year, android application has become essential part of modern technology in the field of medical, bio-technology, bio-informatics, economical sector, social issues and entertainment purposes. In some developed countries mobile application is used as weapon in the field of security for women. But it is a matter of great regret that people of our country has less concern about safety related issues towards women. It would be a great idea if android application is used as the arms of women. This is the key idea and motivation of our work. So, we have taken android technology as a solution of safety against women violence.This research shows the development of an application which is mainly focused on women safety. Through the uses of this model, safety and security of women in Bangladesh become very simple, easy and spontaneous.
There's a lot of work in the filed of safety and security. Here, the paper [2] proposed voice command based application which has capability to recognize user voice. After detection of voice command, corresponding application will work and start tracking user's location by using GPS module and send tracked location to predefined number. Audio recorder will start and remain at least 5 minutes to take audio clip and save the recorded file to phone storage. Voice command will work even if the phone keypad is locked. Because of the application will work in the background. An emergency notification will generate if SMS send successfully. User can also save contact numbers by using voice command.
In the paper [3], the authors designed a SCIWARS application (Spy Camera Identification and Women Attack Rescue System) which can be considered as a part of two modules. A first module atcs as an intelligent aware system that will identify the infrared rays coming from every Night-vision secret camera placed in alternative hotels rooms or rooms etc. and also sensible the user about unsecured place by sending a short message. The second module will be enabled by pressing any key continuously which will provide favor to the victims from an actual offensive unsecured situation. It sends the alert message along with GPS location to trusted mobile numbers. It also takes a proof of the voice and nearby image for 45 seconds.
The paper [4] proposed an android application that assures security in two different situations. One of them is travelling at night and another one is home security. The first module provide a feature called save our souls (SOS). This application aslo have capability to run in the background. So, no need to press any power button or something like that for taking actions. By pressing the SOS button and it will collect location form latitude and longitude and send location to registed number along with alert message. Second module provide home security system in absence of user at home. This application reports the user about an endeavor of information activity at home by a message and a recompose SMS triggers and a screaming alarm siren in the house. Needed an android mobile, a hardware circuit embedded with a switch and GSM modem that also connect to the door. When someone tries to open the door, the switch steed and break for the microcontroller to activate the GSM modem to send alert SMS to the registered number through the modem.
The paper [5] proposes an application, single click of SOS sends a message based on the location and audio or video calling to the parent number. Receivers touch the location URL in the message to view it in the Google Map. This application provides variety of helping tools like "First-Aid help, Fake Call Help and video call". The 'First-Aid help' tool provides help in the field of different health related problems occured at an accidental or emergency situation during at night. First aid help works for different problems are such as foolish and not breathing, choking, bleeding heavily, burns, heart attack, diabetes etc. The 'Fake call help' reliefs from the meeting time or parties when women start feeling uncomfortable and think that, "if someone calls me then she will leave this place". Ringtone of fake call is as same as phone call ringtone. This application also sends the audio and video recording via Email or Gmail in the time of danger where users are unable to speak or tell the situation.

WORKING PRINCIPLE 2.1. Block diagram of proposed system
This developed system, Figure 1 is divided into some interrelated components. This components are inevitable for assuring safety issues in smart way. Users are easily able to treat this components in their regular purposes for safety specially the women in our society and country [6,7]. Figure 2 shows the flowchart of SOS button pressing. In the figure, we have tired to figure out how the SOS button properly worked, if the mobile headphone is conncected or not. We use headphone power up button as a SOS button [8][9][10][11][12][13]. First connect headphone to app. After pressing the button, system will check button pressing detection or not. If Yes, system will take some actions such as Automatic calling to one trusted number, automatic location tracking will begin and sending location to all trusted number, automatic camera will be opened and start video recording and the save recorded video in phone storage or memory card.

Voice command
Voice command module can be performed by user voice detection. After finding the voice command "Help me" then system will start to detect voice. If required voice detects, automatically performing the actions same as Figure 3. When users of the application activate voice mode, it will be running in the background automatically. So, when the system find required voice command, it will be try to recognize and then perform it's given actions. When the system finds stop command option, it will stop the whole system which is running in the backgroung of mobile phone and users are not able to run the application on the background. To perform this operation we use Google speech recognizer.

Hidden camera recording
Hidden camera is a builtin camera palced in the mobile phone but programmatically it's possible to run in the background. To work with hidden camera we have to use background service. Hidden camera will keep video recording in the background for safety related matters. In Figure 4, manually, after pressing capture button of the phone, it will automatically start video recording in the background and save the recorded video clip in phone memory card or phone storage. Again, if system detects stop capture button then background service will be finished. System is unble to take video in background without start service.

Phone shaking detection
By using accelerometer sensor, phone shaking will be worked. First of all we need to activate shaking mode. After activation of phone shaking, it will be running in the background. Figure 5 shows the phone shaking detection system. If system detcets shaking 3 times, automatically perform the actions as described in the section 3.1. If system find the command of stop shaking mode, then shaking mode will be stopped.

SYSTEM REQUIREMENTS
The development of the proposed model can be done through software as well as hardware part of the user smart phone. Both of them plays a significant role in the process of expanding the application.Software section can be classified by required programming language, developing platform, IDE and OS (operating system). The embodiment of this application is performed by android studio, Java Programming Language. The database of this application is real time database which is firebase. Figure 6 shows database system of developed application. The user also require to add trusted number and trusted contact number will be saved in the database module. All the informations will be saved in the database. We use real-time database for storing data on the online. The hardware section divided into two interrelated parts. This two parts act as a heart of the wireless communication as well as location sharing for safety related issues. Firstly, Users have to carry out a smart phone to establish a reliable connection through GSM and GPRS module. Secondly, the user's mobile must have GPS module for tracking the location. Global positioning system (GPS) is a navigation and proper positioning tools that tracks the location based on latitude and longitude. The GPS coder module searchs an actual address. They can be street name, nearby place, schools, colleges etc. If GPS system is not in work or GPS is disabled, location will be sent automatically only the coordinate value of latitude and longitude. But to functionate this procedure properly internet is needed. Algorithm 1, shows how the GPS module works for location sharing. STEP 1: Request for access location. STEP 2: Check GPS is enabled or not. STEP 3: If (GPS== ENABLED) Then goto STEP 4 otherwise goto STEP 1 STEP 4: Tracking will begin STEP 5: Collect coordinate STEP 6: Send coordinate to trusted people. STEP 7: END Algorithm 1. Location sharing Algorithm using GPS module To work a GSM/GPRS module effectively, needed a SIM card for mobile communication. The SIM card resides in the GSM/GPRS module and allow wireless communication throughout the world. The SIM card or Subscriber Identity module is responsible for sending SMS to all trusted numbers that are stored in the application database.

Experiment 01
We've done some experiments with shaking and voice command crieteria and found some experimented data. Our experiment is to trace down, how much time it takes to receive the message at the receiver end after the phone shaking and voice command. We have taken tested data separately for phone shaking and voice command. Our experimented data shows that SMS sending depends on the mobile phone version and the wireless network. It's a matter of great wonder that we found very little response time for transmitting the SMS in rural areas. After succesfull 10 experiment Table 1, we found the average response time around 8.1 to 8.3 mseconds. Figure 7 shows graphical representation of experimented data.

Experiment 02
We did some experiments in the night. The average statistical value of response time in Dhaka city is around 6.8 to 8 which is reflecting on Table 2 and Figure 8 .The time it's take to transmit actions at the receiver end. However, the whole system depend on the cellular network. We have also made a comparison on features among some popular mobile applications in google paly store. For our research, we have taken 8 applications and found the better result than their exixting result reflected on Table 3. Basically, those applications strongly focus on some particular sector in the field security or safety. But in our propsed application, we tried hard to combine all the features in the field women safety. Thus making our proposed application simpler, more efficient, friendlier towards women and obiously handy

SCREEN SHOTS
Basically, our developed application offers variety of functions. But in order to focus main part the application we provide a part of our application in Figure 9.

CONCLUSION
In concededly it's included that this system will play an effective role for the safety of women in Bangladesh. It would be possible to identify the criminal through this system so that women can ensure their safety. The proposed system provides the module SOS (Save our souls.) button pressing and through this, it's possible to sending current location to trusted number by pressing this SOS key. This system provides voice detects the module. Basically, in the time of danger, it's not possible to calling or text someone by pressing mobile button or open temporary lock. In some incident our proposed system provide some useful features. Very easy to calling someone or passing current location by voice command like "HELP". This system automatically detects user voice through these modules.
The proposed system provides Phone shaking features. Sometimes women can't call to parents if she faces problems or she can't notify her current situation to her parents in the time of danger. In this situation a women can send their location to all trusted numbers and parents by shaking phone three times. When sytem detects shaking phone three times then system will awake and automatically tracking current location and sending location to all trusted numbers through SMS. This system provides multiple safety features and through these women can ensure safety.
The proposed system provides Hidden camera module. In some cases this system also provided useful evidence. Through hidden camera module, system can take screte video clip and save it to phone storage and it can be importance evidence for detecting the criminal. In the time of danger, Women needs to take some log for the identification of the criminal but due to lack of proper evidence women and police can't identify the criminal. Hidden camera module act as the evidence. So, this all about our works and developed model of the proposed system. We worked very hard to ensure women safety for our society and country. We have chosen android technology to establish this model. We can say that we render a tittle contributions in the field women safety in Bangladesh.