GUJARAT TECHNOLOGICAL UNIVERSITY
(Established under Gujarat Act No. 20 of 2007)
Guardian Angel
Information Technology
GEC BHAVNAGAR
Gujarat Technological University | GEC, BHAVNAGAR |
---|
190210116013Certificate
CERTIFICATE
![]() |
Government Engineering College Bhavnagar Department of Information Technology |
![]() |
---|
This is to certify that the project report submitted along with the project entitled Guardian Angel has been carried out by Chirag Bipinbhai Chavda under my guidance in partial fulfillment for the degree of Bachelor of Engineering in Information Technology, 7th Semester of Gujarat Technological University, Ahmadabad during the academic year 2022-23.
Date of Submission:14th July, 2022
Prof.A.P.Patel Prof.A.P.Patel
Internal Guide Head of the department
Department of IT Department of IT
GEC Bhavnagar GEC Bhavnagar
190210116013Candidate’s Declaration
190210116013Declaration
190210116013Table of Contents
![]() |
Government Engineering College Bhavnagar Department of Information Technology |
![]() |
---|
CANDIDATE’S DECLARATION
I hereby declare that the work, which is being presented in the report entitled “Guardian Angel” in partial fulfillment for the award of Degree of “Bachelor of Engineering” submitted to the department of Information Technology, Government Engineering College, Bhavnagar is the record of my own investigations under the guidance of Prof. A. P. Patel.
Chirag Bipinbhai Chavda
190210116013
TABLE OF CONTENTS
Acknowledgement | I | |
---|---|---|
Abstract | II | |
List of Figures/Charts | III | |
List of Tables | IV | |
Chapter 1 | Introduction | |
1.2 | Project Detail | |
1.2.1 | ||
1.2.2 | ||
1.3 | Purpose | |
1.4 | Scope | |
1.5 | Technology And Literature Review | |
Chapter 2 | About The System | |
2.1 | Project Planning | |
2.2 | Feasibility Study | |
2.3 | Activity / Process in New System / Proposed System | |
2.4 | Features of New System / Proposed System | |
Chapter 3 | Analysis | |
3.1 | Problem and Weaknesses of Current System | |
3.2 | Study of Current System/ Requirements of New System | |
3.3 | Study Of Proposed System | |
3.4 | Selection of Hardware / Software / Algorithms / Methodology / Techniques / Approaches and Justification | |
3.5 | E-R Diagram/ Data Flow Diagram/Use Case Diagram | |
Chapter 4 | Design | |
4.1 | System Design & Methodology | |
4.2 | Database Design / Data Structure Design /Data Dictionary | |
Chapter 5 | Implementation and Testing | |
5.1 | Implementation Platform / Environment | |
5.2 | Finding / Results / Outcomes | |
5.3 | Test Results and Analysis | |
Chapter 6 | Screenshots | |
6.1 | User Interface | |
Appendix A | Daily dairy | 26 |
Attendance sheet | 27 | |
Appendix B | Limitation and Future Enhancement | 28 |
Conclusion | 28 | |
References / Bibliography | 29 |
Gujarat Technological University | GEC, BHAVNAGAR |
---|
190210116013Acknowledgement
Gujarat Technological University | IV | GEC, BHAVNAGAR |
---|
ACKNOWLEDGEMENT
It is a great pleasure for me to submit this summer internship project report on “Guardian Angel” as part of the curriculum of “BACHELOR OF ENGINEERING” degree of Gujarat Technological University, Ahmedabad.
It is indeed with a great sense of pleasure and immense sense of gratitude that I acknowledge the help of these individuals.
I am highly indebted to Principal Prof. (Dr.) G.P.Vadodaria, for the facilities provided to accomplish this internship.
I am extremely grateful to our Head of Department Prof.A.P.Patel and other faculty members for their inspiration and encouragement.
At this moment of accomplishment, I’m presenting my work with great pride and pleasure, I would like to thank Prof. A. P. Patel for helping me in the successful accomplishment of my study and for his valuable suggestions. I would also like to thank my parents any friends for their over whelming support and encouragement.
Chirag Bipinbhai Chavda
190210116013
190210116013Abstract **
ABSTRACT
The “Guardian Angel” is specially made for the safety and security purpose of individual who may get stuck in danger and want help from their loving ones. There will be single user only in this app who wants to seek help under the threat. Firstly, one will fit the data into system that whom to ask for help then when she is under threat she will use predefined gesture to alert her contacts through SMS and call. SMS will contain her nearly accurate GPS location link which individual can track and reach there to help. Apart from SMS, Call will also be made by system automatically to alert individuals. This application is handy so one can easily use it even one is illiterate cause all user need is to do predefined gesture to alert her contacts. As the crimes are getting increase day by day, this application can emerge as a solution to seek help and prevent the act to be done. In future, one can also add some more functionalities to this app like calling Police and many more.
Chirag Bipinbhai Chavda
190210116013
190210116013List of Figures
190210116013List of Table
List of Figures
Figure Number | Description | Page Number |
---|---|---|
Figure 2.1.1 | Waterfall Model | 5 |
Figure 3.5.1 | ER Diagram | 12 |
Figure 3.5.2 | DFD level 0 | 12 |
Figure 3.5.3 | DFD level 1 | 13 |
Figure 3.5.4 | DFD level 2.1 | 13 |
Figure 3.5.5 | DFD level 2.2 | 14 |
Figure 3.5.6 | Use Case Diagram | 15 |
Figure 6.1.1 | Splash Screen | 22 |
Figure 6.1.2 | Main Screen | 22 |
Figure 6.1.3 | Adding Contacts | 23 |
Figure 6.1.4 | Viewing Stored Contacts | 23 |
Figure 6.1.5 | Deleting Contacts | 24 |
Figure 6.1.6 | Emergencies Button For Testing Purpose | 24 |
Figure 6.1.7 | Calling and SMS | 25 |
**
List of Table
Table Number | Description | Page Number |
---|---|---|
Table 2.1.1 | Timeline Table | 6 |
Table 2.1.2 | Timeline Chart | 7 |
Table 4.2.1 | Contacts Database | 17 |
Table 5.2.1 | Test Cases | 20 |
** | ||
190210116013Introduction |
Chapter 1: Introduction
1.1 Project Details
1.1.1 Project Profile
1.1.2 Project Definition
1.2 Purpose
1.3 Scope
1.4 Technology and Literature Review **
- PROJECT DETAILS
1.1.1 Project Profile **
**
This project “Guardian Angel” is aimed to seek help from the near and dear ones under the situation of threat to one’s life. Mainly made for women travelling during late night or passing by some crucial areas where one cannot get help easily.
This application will be very helpful as it is so handy that even an illiterate person can use it and seek for help when she’s in danger. She just need to press power button 3 times and automatically her current location link will be sent through SMS to previously fitted mobile numbers and also call to the top most mobile number will be made automatically. Hence, her near and dear ones can track the location and reach out to her to help.
1.1.2 Project Definition
** When one passes by some areas alone and find herself under the threat of social mob then she can alert her near ones that she is under the threat and they can help her out but sometimes it is not possible to call them or tell the location and all and may be if she is in emergency situation then it’s the worst solution to call manually. So this help is made in such a way that user needs to do some predefined gesture and call will be made automatically with SMS containing link of her actual current location.
- PURPOSE
As the crimes are increasing day by day, to prevent it and protect one for being a victim of crime by seeking help and alerting her dear ones that she’s at this particular location and needs your help is the main purpose for developing Guardian Angel. By this application, one can safely roam at midnight as she knows that Guardian Angel is always with her to protect. **
- SCOPE
At this stage, Guardian Angel provides facility to call and alert only contacts but in future facilities like calling police and sending them location of individuals can also be done as an extension of current version.
For example, right now the person who received the SMS containing location link, tracks it and reaches to the spot but in future, SMS to the police can also be made and can seek the help quickly.
- TECHNOLOGY AND LITERATURE REVIEW
1.4.1 Technology
**
XML: It is used for developing GUI of application.
JAVA: Used for handling GUI events of controls.
SQLite: SQLite database is used to store the contact nos.
Android Studio: Functionalities of APIs is used through Android Studio.
1.4.2 Literature Review **
**
The newspapers and articles contain the heading of brutal rape cases or murder cases on each other day. One of them was blowing mind of everyone that a girl became victim of rape and though the spot area was near her house she could not found help though had having phone.
Many a times it’s been seen that the woman passing by some desolate area and became the quarry of one’s bad will as she could not seek help. It is not only about woman it is about children too. Like It has also been seen that children became the victim of kidnapping.
By observing these types of problems, I thought that, how one can seek the help easily of their loving ones, how one can feel secure while roaming at late night, how one can feel safe while going to school or tuition, Then I got the idea of using smartphone as a background service which can alert loving ones about one’s location while he or she is under the threat of his or herself.
Gujarat Technological University | 29 | GEC, BHAVNAGAR |
---|
190210116013About System
Chapter 2: About System
2.1 Project Planning
2.1.1 Project Development Approach
2.1.2 Timeline chart/Gantt Chart
2.2 Feasibility Study
2.2.1 Technical Feasibility
2.2.2 Economical Feasibility
2.2.3 Operational Feasibility
2.3 Process in New System
2.4 Features of New System
2.1 PROJECT PLANNING
2.1.1 Project Development Approach
This project is developed using specific software development lifecycle. Software development approach is best suited for the project depends on the requirement and other factors. For this project, All the requirements were predefined like storing contacts and sending SMS containing location Link and also calling to topmost mobile number. Hence, I used the easiest SDLC model which is Waterfall Model.
Figure 2.1.1 Waterfall model
Requirements: The main requirement to work this application is one smart phone containing sim card and balance to make call and send SMS containing location of individual.
Design: The goal of design phase is to turn requirements into actual implementation scenarios. In technical, during the design phase the software architecture is derived from the SRS document.
Implementation: During this phase, Code is generated with the help of design models. In nutshell, the coding part is done during this phase.
Testing: The application undergoes through some test cases to check its functionality and the error and correction part is made if any. This phase helps to identify the bug and resolve it.
Deployment: After the successful completion of testing phase, the application is deployed to use.
Maintenance: The main and longest phase is maintenance of any application, which is a lifelong phase because user may face some vulnerabilities while using the application hence, it is necessary to maintain the application.
No. | Task | Timeline |
---|---|---|
1. | Problem identification | 20 June |
2. | Requirement Elicitation& planning | 20 June |
3. | System Design | 21 June |
4. | UML and Database design | 22 June |
5. | Coding / Implementation | 23 June – 5 July |
6. | Requirement validation | 6 July |
7. | Testing | 7 July |
8. | Deployment | 8 July |
Table 2.1.1 Timeline Table |
2.2 FEASIBILITY STUDY
Feasibility study is carried out when there is a complex problem or opportunity. It is considered as the primary investigation which emphasizes on “Look before You Loop” approach to any project. A Feasibility study is undertaken to determine the possibility of either improving the existing system or developing a completely new system.
We are going to developed the new system which is feasible as our application is very user friendly and easy to understand.
In this type of study, the current technology in used in an organization is checked such as the existing software, hardware, and personnel staff to determine whether it will work for the proposed system or completely new ones is to be used. The proposed system is capable of adding, changing, enhancing functionality, features etc. The back-end and front-end technology has greater important for providing an accurate, error-free, frequencies of data to be used.
This project is technically feasible in terms of current technology. This project will provide latest platform like android technology.
For proving that system developed is economical, the economic feasibility study takes place to check the cost of developing a system against the benefits that it provides. If the cost is less and benefits are more than we can define our system to be economically developed.
In terms of economic feasibility this application is very reasonable in cost. So application is economically feasible.
The operational feasibility is concerned with the operability of the system after it has been installed. That is, some programmer may not like changes in their routine method of work or has fear that they will lose their peer group. The following areas will have the operational feasibility in the proposed project.
- The organization has approved this system as their working system.
- The User of the system has accepted the proposed system as their new working system and realized the benefits of it.
- The system will work in a proper way after it has been installed and the installation process is easy to use.
- This application is that much handy that even illiterate person can use it and seek for the help when required.
2.3 PROCESS IN NEW SYSTEM
As per the name Guardian Angel, this application can be emerged as an angel when one is under the threat and seeking help to protect herself.
The first of all, user will fit the data of contacts whom she wants to send location through the SMS and call too when she feels herself under the threat.
Similarly, user can also have access to view the data she fitted into system and also have rights to do CRUD operations on that data.
Now after this task, when user is under the threat, she will just press the power but 3 times and let the screen on and off 3 times then automatically the SMS containing the link of her location will be sent to the fitted contacts into database and call will also be made to the mobile number which she fitted first.
- Handy to use
- Can send location to more than one person
- Call automatically
- SMS automatically
- May use police siren to scare the criminals
190210116013Analysis
3
Chapter 3: Analysis
3.1 Problem and Weaknesses of Current System
3.2 Study of Current System
3.3 Selection of Hardware / Software Algorithms / Methodology / Techniques
3.4 Study of Proposed System
3.5 E-R Diagram/ Data Flow Diagram/ Use Case Diagram
3.1 PROBLEM AND WEAKNESSES OF CURRENT SYSTEM:
- The weakness of current system is that one has to manually enter the mobile number to seek the help and tell the guardians about the location by themselves. It would be very hectic task for one if she is under the threat and at times one may not be aware about her actual location.
3.2 STUDY OF CURRENT SYSTEM
Though current system is having the option for emergency dialing but one can only call to emergency numbers like police or ambulance but not her guardians. And apart from that, Device must contain the higher version of android (recommended Android 12 or higher).
The whole article can be found at URL: https://support.google.com/android /answer/9319337?hl=en#zippy=%2Cadd-emergency-info-on-your-lock-screen
The proposed system is capable to run on any android device, no restriction on android versions user can able to run on any android versions. Apart from that, User is able to send location and make a call automatically hence she can aware guardians about her location and situation in short period of time without any kind of trouble.
3.4 SELECTION OF HARDWARE / SOFTWARE ALGORITHMS
3.5 E-R DIAGRAM/ DATA FLOW DIAGRAM/ USE CASE DIAGRAM
3.5.1 ER Diagram
Figure 3.5.1 ER Diagram
Figure 3.5.2 DFD level-0 Diagram
Figure 3.5.3 DFD level-1 Diagram
Figure 3.5.4 DFD level-2.1 Diagram
Figure 3.5.5 DFD level-2.2 Diagram **
190210116013Design
4
Chapter 4: Design
4.1 System Design
4.2 Database Design
4.1 SYSTEM DESIGN
4.2 DATABASE DESIGN
7600371998 |
190210116013Implementation and Testing
5
Chapter 5: Implementation and Testing
5.1 Environment
5.2 Test Results and Analysis
5.1 ENVIRONMENT
Android:
**
A Linux-based operating system designed primarily for touch screens mobile devices such as smartphones and tablet computers. It supports a large number of applications on Smartphones. These applications are more comfortable and advanced for users.
Android Studio:
Android Studio is the official Integrated Development Environment (IDE) for Android app development, based on IntelliJ IDEA. On top of IntelliJ's powerful code editor and developer tools, Android Studio offers even more features that enhance your productivity when building Android apps.
Java:
Java is a general-purpose, class-based, object-oriented programming language designed for having lesser implementation dependencies. It is a computing platform for application development. Java is fast, secure, and reliable, therefore. It is widely used for developing Java applications in laptops, data centers, game consoles, scientific supercomputers, cell phones, etc.
SQLite Database:
SQLite is an open-source relational database i.e. used to perform database operations on android devices such as storing, manipulating or retrieving persistent data from the database.
**
**
5.2 TEST RESULTS AND ANALYSIS
Software testing is a critical element of software quality Assurance and represents the ultimate review of specification, design and code generation. Testing is an internal part of any system or project. If a system is implemented without being tested it may lead to an erroneous working and dissatisfaction on part of the customer. It will also prove disastrous to the reputation of the organization or the person who developed the system and lead to loss in business.
Keeping all these things in view, I left no stone unturned in testing our systems. It was tested keeping in view the different possibilities on part of the user. As human beings are prone to commit errors under different working conditions, we had to keep our vigil on different possibilities that can occur on part of the user.
Test Cases
Test case ID | Test Scenario | Test Steps | Expected Results | Actual Results | Pass/ Fail |
---|---|---|---|---|---|
T1 | Storing contacts into the SQLite Database. | Open the app and Go to Add Contacts button. Fill the field and click Add. |
Contact must be added to the SQLite database. | Stored Success-fully | Pass |
T2 | Viewing stored contacts | Just click the View button to see the stored contacts so far.. | User should able to see the stored contacts. | Viewed Success-fully | Pass |
T3 | Delete contact | Fill the contact number to delete and press delete button. | User should be able to delete the contact. | Deleted Success-fully | Pass |
T4 | Fetch Location | Go to second screen and long press Emergencies button to test the application. | User should able to see the location and SMS and call should be made automatically. | Showed Success-fully | Pass |
T5 | Test the motto of application | User should background the application and press the power button 3 times and let the screen on and off. | SMS containing the location will be sent and call to top most number will be made. | Success-fully worked | Pass |
Table 5.2.1 Test cases |
190210116013Screenshot
6
Chapter 6: Screenshot
6.1 User Interface
6.1 User Interface
Figure 6.1.1 Splash Screen
Figure 6.1.2 Main Screen
Figure 6.1.3 Adding Contacts Screen
Figure 6.1.4 Viewing stored contacts
Figure 6.1.5 Deleting Contact
Figure 6.1.6 Emergencies Button for Testing purpose
Figure 6.1.7 Calling and SMS
190210116013Appendix A
Appendix A
ATTENDANCE SHEET
Name & Address of Organization
Government Engineering College, Bhavnagar
Near Sir BPTI Campus, Vidhyanagar, Bhavnagar, Gujarat 364002
Name of Student | Chirag Bipinbhai Chavda |
---|---|
Roll. No | 190210116013 |
Name of Course | BE |
Date of Commencement: | 20th June, 2022 |
Date of Completion of Internship: | 8th July, 2022 |
Initials of the student
Month and Year |
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Prof. A.P. Patel
Internal Guide
Department of IT
GEC Bhavnagar
STUDENT’S DAILY DIARY/ DAILY LOG
**
DAY: 1 to 7 | Date | 20/06/2022 – 28/06/2022 |
---|---|---|
Time of arrival | 10:45 AM | Time of Departure |
Dept./Division | IT | Name of finished Project |
Name of HOD/ Supervisor With e-mail id | Prof. A. P. Patel |
anoop.p.patel@gmail.com |
Main points of the day | Done front-end of project |
|
I could Able to learn about the functionalities of XML and how to bind It with Java in android studio.
|
DAY: 8 to 15 | Date | 29/06/2022 – 08/07/2022 |
---|---|---|
Time of arrival | 10:45 AM | Time of Departure |
Dept./Division | IT | Name of finished Project |
Name of HOD/ Supervisor With e-mail id | Prof. A. P. Patel |
anoop.p.patel@gmail.com |
Main points of the day | Done back-end of project |
During this period, I developed the methods to call and SMS directly to relatives and define the background service for the application through which the application can able to work in background. After the binding of all the methods and developing back-end, I also tested the functionalities of application by trying at different locations. By the end of this internship period, I also learnt about the location functionalities android is providing through the google APIs. |
---|
Signature of Supervisor
**
190210116013Appendix B
Appendix B
LIMITATIONS AND FUTURE ENHANCEMENT
CONCLUSION
This application will be emerged as an angel to seek the help easily when someone is under the threat.
When one is roaming at late night and specially around the desolate areas where no one is there to help and listen, one can use the gestures to call and send location if feels insecure about herself from the social evils and protect herself from being victim of one’s bad will.
**
190210116013References/Bibliography
References / Bibliography
Books
[1] Android Studio Development Essentials Book by Neil Smith
[2] An Introduction to Database Systems Book by Christopher J. Date
Websites
- https://developer.android.com
- https://www.researchgate.net/publication/352386903_Android_App_for_Women_Safety
- https://stackoverflow.com/questions/22241705/calling-a-activity-method-from-broadcastreceiver-in-android
- https://ijsrcseit.com/CSEIT1217368