A Mobile Based Women Safety Application (I Safe Apps)
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 1
Abstract
Abstract: Many unfortunate incidents have been taking place in woman’s case. Problems may come from anydirection such as women walking on the road after the work, going to super market or many other reasons forwhich they go alone. People at home are not sure of their return safely. Another factor is woman die withoutknowing the reason as they attend excursions and industrial trips conducted by the organizations. It happensdue to attacks on woman but not suicides. In 2013 there happened an incident which is a gag rape in New Delhiin the case of 23 year old woman in bus at 9:30 PM. Another incident that has taken place at Mumbai in thecase of woman who is leaving her native place after Christmas holidays has been kidnapped and killed. Theseare some of the problems that have taken place in the day to day life of women. In order to overcome suchproblems faced by women the I Safety (women security apps) mobile based application is not only necessary touse but also plays a pivotal role with android software.
Authors and Affiliations
Dr. Sridhar Mandapati , Sravya Pamidi , Sriharitha Ambati
Defended Data Embedding For Chiseler Avoidance in Visible Cryptography by Using Morphological Transform Domain
This paper proposes a data-veiling technique for binate images in morphological transform domain for authen- tication purpose. To attain blind watermark drawing, it is difficult to use the detail coordinate pre...
Uncompressed Image Steganography using BPCS: Survey and Analysis
Steganography is the art and science of hide secret information in some carrier data without leaving any apparent evidence of data alternation. In the past, people use hidden tattoos, invisible ink or punching on...
Glaucoma Detection Using Dwt Based Energy Features and Ann Classifier
Abstract: Glaucoma is a disease in which fluid pressure in the eye increases continously, and damage the optic nerve and leads to vision loss.It is the second leading cause of blindness. For identification of disea...
Cuckoo Search based Optimal Elliptic Curve Cryptography (OECC) for Text Encryption
Abstract : The Cryptography converts our original text information into non understandable form of text that is cipher text which is more powerful because which is not understandable. . In this work we are implemented th...
Segmentation of White Blood Cells Using Fuzzy C Means Segmentation Algorithm
ABSTRACT: The objective of this paper is to develop a tool to identify the white blood cells from blood smear images through segmentation. In our research work, we have identified white blood cells from color image...