A Project Report
'VULNERABILITY SCANNING FOR ENHANCED SAFETY
OF WOMEN & AWARNESS OF VALUABLE'
Neha Singh 130860111053
Kirti Patil 140863111005
Charmi Soni 140863111006
Priyanka Nagargoje 130860111030
In partial fulfillment for the award of the degree
BACHELOR OF ENGINEERING
Electronics and Communication Engineering
Laxmi Institute of Technology, Sarigam
Gujarat Technological University
Laxmi Institute of Technology, Sarigam
At: Sarigam, P.B No-15, P.O : Valsad, Pin:396155
This is to certify that the project reports, submitted along with the project entitled 'Vulnerability Scanning for Enhanced Safety of Women & Awareness of Valuable' has been carried out by Neha Singh (130860111030), Kirti Patil (140863111005),Charmi Soni (140863111006), Priyanka Nagargoje (130860111030) under my guidance in partial fulfillment for the degree of Bachelor of Engineering in Electronics and Communication7th Semester of Gujarat Technological University, Ahmedabad during the academic year 2016-17. These students have successfully completed project activity under my guidance.
Mrs. Siddhi Desai
Mr. Nandlal Dhandhukia
Head of Department
Mrs. Siddhi Desai
Date: External Examiner
DECLARATION OF ORIGINALITY
We hereby certify that we are the sole authors of this IDP/UDP project report and that neither any part of this IDP/UDP project report nor the whole of the IDP/UDP Project report has been submitted for a degree by other student(s) to any other University or Institution. We certify that, to the best of our knowledge, the current IDP/UDP Project report does not infringe upon anyone's copyright nor violate any proprietary rights and that any ideas, techniques, quotations or any other material from the work of other people included in our IDP/UDP Project report, published or otherwise, are fully acknowledged in accordance with the standard referencing practices. Furthermore, to the extent that we have included copyrighted material that surpasses the boundary of fair dealing within the meaning of the Indian Copyright (Amendment) Act 2012, we certify that we have obtained a written permission from the copyright owner(s) to include such material(s) in the current IDP/UDP Project report and have included copies of such copyright clearances to our appendix. We have checked the write up of the present IDP/UDP Project report using anti plagiarism database and it is in the allowable limit. In case of any complaints pertaining to plagiarism, we certify that we shall be solely responsible for the same and we understand that as per norms, University can even revoke BE degree conferred upon the student(s) submitting this IDP/UDP Project report, in case it is found to be plagiarized.
Neha Singh 130860111053
Kirti Patil 140863111005
Charmi Soni 140863111006
Priyanka Nagargoje 130860111030
It's our pleasure to express thanks and gratitude to Mrs. Siddhi Desai Department of Electronics and Communication Engineering, LIT-Sarigam for her valuable guidance and continual encouragement throughout the work. We are heartily thankful to our project guide Mrs. Siddhi Desai for providing time to time suggestions and the clarity of the concepts of the topic that helped us a lot during this work. We own our sincere gratitude to Mr. Nandlal Dhandhukia HOD-ECE, LIT-Sarigam for his continual kind words of encouragement and motivation throughout the work. We are thankful to all faculty members of ECE Department, LIT-Sarigam for their special attention and suggestions towards the work. The blessings of God and family members made the way for completion of Project work. We are very much grateful to our parents for their support and almighty. Without encouragement of them this work would not have achieved success.
Neha Singh 130860111053
Kirti Patil 140863111005
Charmi Soni 140863111006
Priyanka Nagargoje 130860111030
CHAPTER 1 1
1.1 INTRODUCTION 2
1.2 OBJECTIVE 2
1.3 PROBLEM SPECIFICATION 3
1.4 LITERATURE SURVEY 3
1.5 WORK PLAN 6
1.6 MATERIAL /TOOLS REQUIRED 7
CHAPTER 2 8
DESIGN: ANALYSIS, DESIGN METHODOLOGY AND IMPLEMENTATION STRATEGY 8
2.1 DESIGN METHODOLOGY 9
2.2.1 BLOCK DIAGRAM 10
2.2.2 FLOW CHART 14
2.3 COMPONENT DETAILS 16
2.3.1 ARDUINO UNO 16
2.3.2 LED - INFRARED 950 17
2.3.3 IC7805 VOLTAGE REGULATOR 17
2.3.4 IR RECEIVER DIODE - TSOP38238 18
2.3.5 MINI PUSHBUTTON SWITCH 18
2.3.6 RESISTOR 330 OHM 1/6 WATT PTH - 20 PACK 19
2.3.7 INFRARED REMOTE CONTROL 19
2.3.8 ARDUINO PRO MINI 168 - 5V/16MHZ 19
2.3.9 RFID 20
2.3.10 RFID TAGS 21
2.3.11 RFID TAG ANTENNA 22
2.3.12 RFID READERS 23
2.3.12 RFID ANTENNA 23
2.4 CANVAS 24
2.4.1 OBSERVATION MATRIX 24
2.4.2 AEIOU CANVAS 25
2.4.3 EMPATHY MAPPING CANVAS 26
2.4.4 IDEATION CANVAS 27
2.4.5 PRODUCT DEVELOPMENT CANVAS 28
CHAPTER 3 29
3.1 IMPLEMENTATION 30
3.2 WORKING 31
3.2.1 IR TRANSRECIEVER 31
3.2.2 RFID 32
CHAPTER 4 33
SUMMARY OF PROJECT 33
4.2 ADVANTAGE 34
4.3 FUTURE SCOPE 34
4.4 REFERENCES: 35
APPENDIX A 35
APPENDIX B 42
List of figures
FIGURE 2.2.1 IR TRANSRECIEVER 10
FIGURE 2.2.2 BLOCK DIAGRAM (DETECTION OF TWO WAY MIRROR) 11
FIGURE 2.2.3 BLOCK DIAGRAM (TRANSMISSION OF IR RAYS) 12
FIGURE 2.2.4 BLOCK DIAGRAM (RFID) 13
FIGURE 2.2.5 ARDUINO UNO 16
FIGURE 2.2.6 LED INFRARED 950 17
FIGURE 2.2.7 MINI PUSH BUTTON 18
FIGURE 2.2.7 ARDUINO PRO MINI 168 - 5V/16MHZ 20
FIGURE 2.2.8 RFID TAGS 21
FIGURE 2.2.9 RFID TAG ANTENNA 22
FIGURE 2.4.1 OBSERVATION MATRIX 24
FIGURE 2.4.2 AEIOU CANVAS 25
FIGURE 2.4.3 EMPATHY MAPPING CANVAS 26
FIGURE 2.4.4 IDEATION CANVAS 27
FIGURE 2.4.5 PRODUCT DEVELOPMENT CANVAS 28
FIGURE 3.1 IMPLEMENTATION 30
FIGURE 3.2 CIRCUIT DIAGRAM OF IR TRANSRECIEVER 31
FIGURE 3.3 CIRCUIT DIAGRAM OF RFID 32
FIGURE 1 OBSERVATION MATRIX CANVAS 37
FIGURE 2 AEIOU CANVAS 38
FIGURE 3 EMPATHY MAPPING CANVAS 39
FIGURE 4 IDEATION CANVAS 40
FIGURE 5 PRODUCT DEVELOPMENT CANVAS 41
List of table
TABLE 1.5 WORK PLAN''''''''''''''''''''''''''''''''6
In section A vulnerability scanning for enhanced safety of women Many unfortunate incidents have been taking place in woman's case. Problems may come from any direction such as women walking on the road after the work, going to super market or many other reasons for which they go alone. People at home are not sure of their return safely. Another factor is woman die without knowing the reason as they attend excursions and industrial trips conducted by the organizations. It happens due to attacks on woman but not suicides. Women are not as physically fit as men, in an emergency situation a helping hand would be assistance for them. The best way to curtail your probability of becoming a dupe of violent crime (robbery, sexual assault, rape, domestic violence) is to recognize, defense and look up resources to help you out of hazardous situation. In section B awareness of valuable main factor which can even be considered for women and in general for all that is fear for theft of valuable.
According to the reports of WHO, NCRB Social government organization 35% Women over the world are facing problems in public places. Considering this as a major issue, we have taken up on along with awareness of losing valuable things women security for trial room mishap. Since prediction of mishap is not possible hence to minimize the possibility of physical violence (Robbery, Sexual assault) by keeping all the alert tools ready to safe escape from violent Situation. This will reduce risk and bring assistance when needed. The social networking is the part of our life and also a source for women harassment by uploading the offensive photograph taken by hidden camera or stolen mobile phones. We are proposing project in which we will develop device for checking safety in trial room by firstly testing mirror and secondly checking whether video is been recorded. Along with it we are also developing a master slave based RFID device which will alert if our valuable like mobile phone or wallet are forgotten or left behind.
The Main objective of our project is to make safety trial rooms for women and to aware people for their valuables. Our first device vulnerability scanning for enhanced safety of women will help women to detect the mirror whether it is two way mirror or not. So safety issues related to women in trial rooms will be decrease .We are also trying to propose one of the technique which detects the clock frequency when video is been recorded so if video is being captured in trial room this device will be useful for detection of it and women will get alert. Our second device is awareness of valuable things will help people if something is forgotten by them. So in several distance of meters they will get notification that they forgot the valuable. Through our First device women will not be victim of such unsafe trial rooms. Second device will help common people in such a way that if they forget things than anyone can do misuse of their valuables.
1.3 PROBLEM SPECIFICATION
' Currently, Tags for awareness of valuable things are not used by common people.
' Presently, women safety issues are increased in malls, washrooms etc.
' Detection of two way mirror is not done by the use of technology.
1.4 LITERATURE SURVEY
1) K Abdul Rahman - '2007, Reichardt, Adelson and Bergen, Chubb & Sperling, 1988; Cavanagh & Mather, Ledgeway & Smith, Eagleman ;Wade & Verstraten, Sandia. Research and investigation on definition of infrared sensors.
' They introduced us about Sensor or transducers which define as a device that receives energy from one system and transmit it to another, like physical variable into signal variable. Broadly defined, the sensor is a device which capable of being actuated by energizing input from one or more transmission media and in turn generating a related signals to one or more transmission systems. It provides a usable output in response to specified input measured, which may be physical or mechanical quantity, property, or conditions. The energy transmitted by these systems may be electrical, mechanical or acoustical. The nature of electrical output from the transducers depends on the basic principle involved in the design. The output may be analog, digital or frequency modulated.
2) Aysegul SARAC, Nabil ABSI, St''phane dauzere-peres Impact of RFID technologies.
' They cleared that RFID technologies may improve the potential benefits of supply chain management through reduction of inventory losses, increase of the efficiency and speed of processes and improvement of information accuracy. Various RFID systems can be obtained by combining different tags, readers, frequencies and levels of tagging, etc. The cost and potential profit of each system change in a wide range. In this paper, a state-of-the-art on RFID technology deployments in supply chains is given in order to analyze the impact on the supply chain performance.
3) Bernhard Riedl , Gernot Goluch , Stefan Pochlinger , Edgar Weippl . ACM Portal, IEEE Xplore, Springer Link , Goggle's scholar search.
' Their research and work focuses mainly on the PRIME program and SBA trainings as well as concepts of software security and development life cycle topics. Additionally he is still involved and working on topics and research regarding security analysis and testing as well as advanced malware protection.
4) Wireless ID tags will soon be everywhere. We need a manifesto! By simsongarfinkel.
' They proposed the idea of using RFID technology for positioning. Preliminary results on RFID communication speed and tag database access time were shown. For the communication speed, the experiment showed that 18 milliseconds were needed to complete a reading transaction. With the result, it was computed that the communication speed is 7.11Kbps as opposed to 64Kbps in the specification. It can be concluded that it is feasible to retrieve bits for ID of a tag at high velocities provided that operational tags in harsh conditions are installed. We also argued that a database for information corresponding to tags on roads is necessary. The performance study on the tag database showed that the access time is insignificant compared to a reading transaction.
5) Mary Barnish on domestic violence, September 2004
' This literature review was prepared to accompany the HMIP thematic inspection of probation supervision of domestic violence perpetrators. Alongside the inspection report it aims to contribute to the development of effective probation and wider criminal justice practice in reducing domestic violence by enhancing knowledge, understanding and awareness of the experiences of victims/survivors, the behaviour of perpetrators, the extent of the harm done by domestic violence, and the effectiveness of interventions to reduce it. In line with the inspection remit, the review focuses on domestic violence perpetrated against partners and ex-partners.
6) Pedro M. Reyes, Alfred P. Sloan Foundation Industry Studies, 2007.
' This literature review concludes that RFID has been flying below the business innovation and best practice radar. RFID as a new direction for supply chain management theory and practice. RFID not a new technology, but new spark for improving supply chain performance.
7) Y. Zare Mehrjerdi , International Journal of Industrial Engineering & Production Research June 2014, Volume 25, Number 2.
' The purpose of this article is to review some of the most prominent applications of RFID in industries and to provide a comprehensive review of the work done from 1985 through 2012 and the research trend on that. The effectiveness of RFID and the challenges facing with are also discussed. Some applications of radio frequency identification in supply chain are briefly discussed. Articles are classified by the year of publications and each case is discussed very briefly.
8) Sliney, David H.; Wangeman, Robert T.; Franks, James K.; Wolbarsht, Myron L
' For this project, an active infrared motion detector is constructed. Originally, both IR and an ultrasonic detector is want to build, but the problem is the ultrasonic detector would require too much time for a three week project. However, building an IR motion detector would probably be a trivial exercise. So, to expand on the concept by building an ambient light ignoring motion detector.
1.5 WORK PLAN
1 Identify the purpose of Work Plan 20/6/2016 29/6/2016
2 Determine objective of project 16/7/2016 23/7/2016
3 Literature survey 25/7/2016 01/7/2016
4 Patent Search 27/7/2016 05/8/2016
5 Finalization of Components 06/8/2016 13/8/2016
6 Making Block Diagram 12/8/2016 20/8/2016
7 Making Presentation 20/8/2016 27/8/2016
8 Making of Canvas 25/8/2016 03/9/2016
9 Making Components list and Purchasing 03/9/2016 07/9/2016
10 Testing Components 08/9/2016 08/9/2016
14 Coding in Arduino Uno 10/9/2016 15/9/2016
15 Implementation of hardware and software 14/9/2016 15/9/2016
16 Testing System 16/9/2016 17/9/2016
17 Uploading of Patent Search and Analysis Report (PSAR)
18 Making of 7th Semester Project Report 28/09/2016 03/10/2016
TABLE 1.5 WORK PLAN
1.6 MATERIAL /TOOLS REQUIRED
' Arduino uno
' LED 16*2
' LM35 temperature sensor
' IC7805 voltage regulator
' Crystal oscillator
' DC motor
' SIP pocket
2.1 DESIGN METHODOLOGY
In section A purpose is detection of two way mirror for women safety issues in trial rooms, shops, etc for these we are using Infrared sensor we can call it as an IR sensor so the basic concept of IR sensor is to transmit IR signal in a direction and a signal is received at IR receiver. Then IR radiation bounces back from the mirror. So the object is mirror therefore IR LED transmits signal on mirror and signal is reflected back from the mirror. The reflected signal is received by IR receiver. This IR sensor is module which decode the signal. After decoding signal if mirror is two way mirror the signal will reflect back and LED will blink. In this way we will come to know whether mirror is two way or not. So once transmitter and receiver is complete both should be placed at certain angle so that mirror detection happens in proper way. This angle is nothing but direction of angle which is +/- 45 degree. So we are implementing IR transmitter using timer IC 7555 and also using Arduino uno. Implementation of IR receiver will be done by using LED as an indicator.
In section B awareness of valuable things let's take an example of students as we carry some valuable things like Identity card, mobile, laptops, assignment books etc. so if we gone out from the home and forgot to carry identity card then this device will be used as master slave. Master device will be with us and slave means chip stick to our valuable things. Under 10-20 meter range we will get notification that we forgot identity card. Now for this device we are using RFID (radio frequency identification) which can track movement of objects through a network of radio enabled scanning device over a distance of several meter. It consist of transponder , transreciever and back end database that stores records associated with chip contents and for programming and coding we are using arduino to upload new codes to it without use of external hardware programs.
2.2.1 BLOCK DIAGRAM
FIGURE 2.2.1 IR TRANSRECIEVER
FIGURE 2.2.2 BLOCK DIAGRAM (DETECTION OF TWO WAY MIRROR)
FIGURE 2.2.3 BLOCK DIAGRAM (TRANSMISSION OF IR RAYS)
FIGURE 2.2.4 BLOCK DIAGRAM (RFID)
2.2.2 FLOW CHART
2.3 COMPONENT DETAILS
2.3.1 ARDUINO UNO
This is the new Arduino Uno R3. In addition to all the features of the previous board, the Uno now uses an ATmega16U2. We are using this device in our project for scaning the ir rays using leds. This allows for faster transfer rates and more memory. No drivers needed for Linux or Mac and the ability to have the Uno show up as a keyboard, mouse, joystick, etc. The Uno R3 also adds SDA and SCL pins next to the AREF. In addition, there are two new pins placed near the RESET pin. One is the IOREF that allow the shields to adapt to the voltage provided from the board. The other is a not connected and is reserved for future purposes. The Uno R3 works with all existing shields but can adapt to new shields which use these additional pins. Arduino is an open-source physical computing platform based on a simple i/o board and a development environment that implements the Processing/Wiring language. Arduino can be used to develop stand-alone interactive objects or can be connected to software on your computer.
2.3.2 LED - INFRARED 950
This is a very simple, clear infrared LED. These devices operate between 940-950nm and work well for generic IR systems including remote control and touch-less object sensing. Pair the LEDs are all around us: In our phones, our cars and even our homes. Any time something electronic lights up, there's a good chance that an LED is behind it. They come in a huge variety of sizes, shapes, and colors, but no matter what they look like they have one thing in common: they're the bacon of electronics. They're widely purported to make any project better and they're often added to unlikely things .LEDs are a particular type of diode that converts electrical energy into light. In fact, LED stands for 'Light Emitting Diode with any of our IR receivers. 1.5VDC forward voltage and 50mA max forward current.
FIGURE 2.2.6 LED INFRARED 950
2.3.3 IC7805 VOLTAGE REGULATOR
A regulated power supply is very much essential for several electronic devices due to the semiconductor material employed in them have a fixed rate of current as well as voltage. The device may get damaged if there is any deviation from the fixed rate. The AC power supply gets converted into constant DC by this circuit. By the help of a voltage regulator DC, unregulated output will be fixed to a constant voltage. The circuit is made up of linear voltage regulator 7805 along with capacitors and resistors with bridge rectifier made up from diodes. From giving an unchanging voltage supply to building confident that output reaches uninterrupted to the appliance, the diodes along with capacitors handle elevated efficient signal convey.
2.3.4 IR RECEIVER DIODE - TSOP38238
With low power consumption and an easy to use package, it mates well with embedded electronics and can be used with common IR remotes. The TSOP382 is a miniaturized receiver for infrared remote control systems. A PIN diode and a preamplifier are assembled on a lead frame while the epoxy package acts as an IR filter. The demodulated output signal can be directly decoded by a microprocessor. The TSOP382 is compatible with all common IR remote control data formats.
' Very low supply current
' Photo detector and preamplifier in one package
' Internal filter for PCM frequency
' Improved shielding against EMI
' Supply voltage: 2.5 V to 5.5 V
' Improved immunity against ambient light
' Insensitive to supply voltage ripple and noise
2.3.5 MINI PUSHBUTTON SWITCH
These Miniature Single Pole Single Throw switches have a good click to them and are breadboard friendly. Perfect as a tactile reset switch. These buttons are rated up to 50mA.
FIGURE 2.2.7 MINI PUSH BUTTON
2.3.6 RESISTOR 330 OHM 1/6 WATT PTH - 20 PACK
It is a 1/6 Watt, +/- 5% tolerance PTH resistors. Commonly used in breadboards .these 330Ohm resistors make excellent LED current limiters and are great for general use.
2.3.7 INFRARED REMOTE CONTROL
Infrared remotes are still the cheapest way to wirelessly control a device. We have designed the remote to be small, very simple, and low-cost. Our infrared remote control offers buttons for four directions, power, select, and three optional use buttons (labled 'A,' 'B,' and 'C')..a stands for IR light is transmitted and we will indicate IR light is received. And c indicates that IR light is not received.
RFID (radio frequency identification) technology has already proved its use in various areas such as security, library, airline, military, animal forms, sports and other areas. RFID is being used for various applications in many industries. For example, equipment tracking, access controls including personal and vehicle, logistic, baggage, items security in departmental store. The main advantages RFID provide is resource optimization, quality customers' care, enhanced accuracy, efficient business processes, and effective business and healthcare processes. RFID can help is recognizing contextual knowledge and can help to improve objects predictability for certain processes. Components are antennas, tags and readers. The investigation of these components provides an understanding of its use in healthcare settings and integration in healthcare processes. This chapter studies the RFID components such as Antenna and reader the RFID active and passive tags, and compare these tags including advantages and disadvantages of RFID system. RFID applications are explored and technical model is analyzed. It also considers the healthcare perspectives and RFID use within healthcare settings.
2.3.9 RFID TAGS
An RFID tag is comprised of an integrated circuit (called an IC or chip) attached to an antenna that has been printed, etched, stamped or vapor-deposited onto a mount which is often a paper substrate or PolyEthylene Therephtalate (PET). The chip and antenna combo, called an inlay, is then converted or sandwiched between a printed label and its adhesive backing or inserted into a more durable structure. We are attaching RFID id tags to the valuable .
FIGURE 2.2.8 RFID TAGS
2.3.10 RFID TAG ANTENNA
Tag antennas collect energy and channel it to the chip to turn it on. Generally, the larger the tag antenna's area, the more energy it will be able to collect and channel toward the tag chip, and the further read range the tag will have. Tags that have only a single antenna are not as reliable as tags with multiple antennas. A tag with dual antennas is able to eliminate these dead zones and increase its readability but requires a specialized chip.RFID tag antenna receives and transmit the signal that the valuable thing is left behind and also gives it reminders to us with in some meters range .
FIGURE 2.2.9 RFID TAG ANTENNA
2.3.11 RFID READERS
An RFID reader, also known as an interrogator, is a device that provides the connection between the tag data and the enterprise system software that needs the information. The reader communicates with tags that are within its field of operation, performing any number of tasks including simple continuous inventorying, filtering (searching for tags that meet certain criteria), writing (or encoding) to selected tags, etc.The reader uses an attached antenna to capture data from tags. It then passes the data to a computer for processing. Just like RFID tags, there are many different sizes and types of RFID readers. Readers can be affixed in a stationary position in a store or factory, or integrated into a mobile device such as a portable, handheld scanner.
2.3.12 RFID ANTENNA
FID readers and reader antennas work together to read tags. Reader antennas convert electrical current into electromagnetic waves that are then radiated into space where they can be received by a tag antenna and converted back to electrical current. The two most common antenna types are linear- and circular-polarized antennas. Antennas that radiate linear electric fields have long ranges, and high levels of power that enable their signals to penetrate through different materials to read tags. Linear antennas are sensitive to tag orientation; depending on the tag angle or placement, linear antennas can have a difficult time reading tags. Conversely, antennas that radiate circular fields are less sensitive to orientation, but are not able to deliver as much power as linear antennas. Choice of antenna is also determined by the distance between the RFID reader and the tags that it needs to read. This distance is called read range. Reader antennas operate in either a "near-field" (short range) or "far-field" (long range). In near-field applications, the read range is less than 30 cm and the antenna uses magnetic coupling so the reader and tag can transfer power. In near-field systems, the readability of the tags is not affected by the presence of dielectrics such as water and metal in the field. In far-field applications, the range between the tag and reader is greater than 30 cm and can be up to several tens of meters. Far-field antennas utilize electromagnetic coupling and dielectrics can weaken communication between the reader and tags.
2.4.1 OBSERVATION MATRIX
FIGURE 2.4.1 OBSERVATION MATRIX
In observation matrix,
We have listed top 21 problem related to the vulnerability scanning for enhanced safety of women and awareness of valuable like loss of life, stealing of money, making banking transaction. From that we have short listed 11 problems from top 21. From 11 problems we have again shortlisted 7 problem from that only 4 problem in which our focusing is more. The final problem on which we are focusing more is video scandal, forgetting valuable, stealing of valuable, if two way mirror is in trial room or washroom person sitting in other room can easily watch. In the last block we have write the problem in which are focusing and try to solve the main problem in existing system.
2.4.2 AEIOU CANVAS
FIGURE 2.4.2 AEIOU CANVAS
In AEIOU canvas,
It has been given the brief idea about the activities, environment, users, interactions, objectives regarding this project. In environment we have listed environment at observing site where our project can be used. Activities are the activities done by the people at observing site. In user we have write the people which will use our project.
2.4.3 EMPATHY MAPPING CANVAS
FIGURE 2.4.3 EMPATHY MAPPING CANVAS
In empathy mapping canvas,
We have written the users which will use our project. Stake holders are direct or indirectly related to the user. In people we have written stake holder and people. Here happy story problem and sad story are stories that are related to our project. We are creating an environment for women safety which the main concern nowadays . Thus here is some stories related to this concern also given how our project is helpful for the society .
2.4.4 IDEATION CANVAS
FIGURE 2.4.4 IDEATION CANVAS
In ideation canvas,
We have written the people who are going to use our project and the activities done by the people that we observe at observation site. In situation/location we have written location at which project can be used like trial room, washroom, home etc. We also list the component that will be use in our project like IR transmitter, IR reciever, IR Led source, clock signal catcher etc.n Our projects helps in many situations which are listed in the canvas given.
2.4.5 PRODUCT DEVELOPMENT CANVAS
FIGURE 2.4.5 PRODUCT DEVELOPMENT CANVAS
In product development canvas,
We have described the purpose to make this project that is to make feel women safety and also secured valuables if forgotten. We have listed the device detects through infrared rays and Bluetooth range is 10-15 meter .we have listed components used in project. We have discussed our project to commercial shops which has taken the review for our project. We are also going to use RFID if possible in place of Bluetooth for more convenient result.
FIGURE 3.1 IMPLEMENTATION
We are using TSOP1738 for receiver, so we need to generate the modulated IR of 38 kHz. You can use any TSOP, but you need to generate IR of respective frequency as TSOP. We are using timer for detecting if there is any video is capturing or not. So we are using 555 timer in Astable mode to oscillate the IR at 38KHz frequency. As we know oscillation frequency of 555 timer is decided by resistor R1, R2 and capacitor C1. We have used 1k R1, 20K R2 and 1nF capacitor to generate the frequency of approx. 38 KHz. It can be calculated using this formula: 1.44/((R1+2*R2)*C1).Output Pin 3 of the 555 Timer IC has been connected to IR LED using 470 resistor and a push button switch. Whenever we press the button, circuit emits modulated IR at 38 KHz. A 100uF capacitor is connected across the supply to provide the constant supply to the circuit, without any ripple.
3.2.1 IR TRANSRECIEVER
FIGURE 3.2 CIRCUIT DIAGRAM OF IR TRANSRECIEVER
For IR Receiver circuit we need to connect a LED to the output of the TSOP1738, to test the receiver. We have used BC557 transistor, to reverse the effect of TSOP, it means whenever the output is HIGH the LED will be OFF and whenever it detects IR and output gets low, LED will be ON. PNP transistor behaves opposite to the NPN transistor , it acts as open switch when a voltage applied to its base and acts as closed switch when there is no voltage at its base. So normally TSOP output remains HIGH and Transistor behaves as open switch and LED will be OFF. As soon as TSOP detects Infrared, its output becomes low and transistor behaves as closed switch and LED will be ON. A 10k resistor is used for provide proper biasing to transistor and a 470ohm resistor is used at LED for limiting the current. So whenever we press the Button at IR transmitter, it is detected by TSOP1738 and LED will glow.
FIGURE 3.3 CIRCUIT DIAGRAM OF RFID
In 16x2 LCD there are 16 pins over all if there is a back light, but if there is no back light there will be 14 pins. We have option to power or leave the back light pins. Now in the 14 pins there are 8 data pins , 2 power supply pins, 3rd pin for contrast control and 3 control pins .we are taking only two control pins as it gives the flexibility of better understanding. The contrast bit and READ/WRITE are not often used so they can be shorted to ground. This puts LCD in highest contrast and read mode. We just need to control ENABLE and RS pins to send characters and data accordingly.
The (section A) vulnerability scanning for enhanced safety of women finds its applications in the present commercial scenario at:
' Wherever trial room is available
The (section B) awareness of valuable finds its applications in the present scenario used by:
' Used by all human being
' Section A can detect whether the mirror is two way or not so women will be aware of getting captured in mirror. By the use of this device women will be safe during changing clothes in malls or using washroom.
' Section B will give notification of valuable things so if people forgot their valuable our device will notify under distance of 10-15 meter. So by the use of this device steal of valuable things can be stopped and misuse of valuable can be tress by these device.
4.3 FUTURE SCOPE
' In section A vulnerability scanning for enhanced safety women we are trying to purpose a feature like detection of video capturing by clock signals.
' In section B awareness of valuable we are going to make a RFID master which will notify us if valuable is forgotten under the range 10-15 meter and also trying to purpose feature of navigation like GPS so it will give Exact position where valuable is forgotten by people.
1) Sliney, David H.; Wangeman, Robert T.; Franks, James K.; Wolbarsht, Myron L. (1976).
2) Lynch, David K.; Livingston, William Charles (2001)
3) Gerald F. Marshall Handbook of Optical and Laser Scanning, Marcel Dekker, Inc., 2004, 4.Emil Bloch, "Transparent mirror", published 1903-02-17, assigned to Emil Bloch
4) Gannsle, Daniel J (December 2008), "How to Protect Yourself from High-Tech RFID Identity Theft", How To Do Just About Everything
5) The New York Times, retrieved 2009-03-14 (on how deliberately corrupted RFID tags could introduce viruses into computer systems).
6) Bharadwaj, V., Raman, R., Reddy, R. & Reddy, S., (2001), Empowering mobile healthcare providers via a patient benefits authorization service, WET ICE 2001. Proceedings. Tenth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, IEEE.
FIGURE 1 OBSERVATION MATRIX CANVAS
FIGURE 2 AEIOU CANVAS
FIGURE 3 EMPATHY MAPPING CANVAS
FIGURE 4 IDEATION CANVAS
FIGURE 5 PRODUCT DEVELOPMENT CANVAS
...(download the rest of the essay above)