Intelligent System-Based Stun Gloves for Women's Protection

Subham Kumar Verma*, Khadim Moin Siddiqui**, Udai Raj Tiwari***, Sandhya Shrivastava****, Utkarsh Rai*****, Jayati Vaish******
*-****** Department of Electrical Engineering, Shri Ramswaroop Memorial College of Engineering and Management, Lucknow, India.
Periodicity:January - June'2023
DOI : https://doi.org/10.26634/jaim.1.1.19167

Abstract

In recent times, the security of women and girls has become a major concern in urban areas in many countries. To assist with settling this issue, this paper proposes a Global Positioning System (GPS)-based Stun Gloves for women with many safety techniques. The basic operation of this prototype design is that whenever women detect danger, they can simply press the gadget's ON button. When the gadget becomes active, it will track the online position of women using GPS and send an emergency message using the Global System for Mobile Communications (GSM) to the currently enlisted portable number and the police control room. These security Stun Gloves have both an alarm and a shock provider circuit. The heartbeat rate and temperature are also shown on a connected Liquid Crystal Display (LCD). The heartbeat sensor can detect any unusual heart rate patterns and send the woman's current location via GPS to the rescue team or pre-registered mobile number in the form of a Short Message Service (SMS). Likewise, in the case of self-protection, this gadget is incorporated with a shock generator. This safety precaution can be taken by women in case of any emergency crisis, which a female can use against a person. The main benefit of the design of Stun Gloves is that this gadget is compact and easy to use by any woman.

Keywords

Women Protection System, Emergency Pushbutton, GPS Tracker, Self-Defense, Stun-Gloves, Buzzer, Temperature Sensor, Heart Rate Sensor.

How to Cite this Article?

Verma, S. K., Siddiqui, K. M., Tiwari, U. R., Shrivastava, S., Rai, U., and Vaish, J. (2023). Intelligent System-Based Stun Gloves for Women's Protection. i-manager’s Journal on Artificial Intelligence & Machine Learning, 1(1), 28-33. https://doi.org/10.26634/jaim.1.1.19167

References

[2]. Bennet, M. A., Babu, G. S., & Natarajan, S. (2015a). Reverse room techniques for irreversible data hiding. Journal of Chemical and Pharmaceutical Sciences, 8(3), 469-475.
[3]. Bennet, M. A., Sankaranarayanan, S., & Babu, G. S. (2015b). Performance & analysis of effective iris recognition system using independent component analysis. Journal of Chemical and Pharmaceutical Sciences, 8(3), 571-576.
[4]. Ghoshal, S. (2009). Embedded Systems & Robots: Projects Using the 8051 Microcontroller. Cengage Learning.
[6]. Karri, V., & Lim, J. D. (2005, November). Method and device to communicate via SMS after a security intrusion. In 1st International Conference on Sensing Technology, (pp. 664-668).
[7]. Miriyala, G. P., Sunil, P. V. V. N. D. P., Yadlapalli, R. S., Pasam, V. R. L., Kondapalli, T., & Miriyala, A. (2016). Smart intelligent security system for women. International Journal of Electronics and Communication Engineering & Technology (IJECET), 7(2), 41-46.
[10]. Supe, A., Tajne, K. P., Bakade, A., Mali, N. S., & R. Kubal, (2018). Design and implementation of smart home security system based on GSM technology. International Journal of Computer Science and Engineering, 6(4), 452-456.
[11]. Vahini, S. (2017). Efficient tracking for women safety and security using IOT. International Journal of Advanced Research in Computer Science, 8(9), 328-330.
[12]. Zhao, Y., & Ye, Z. (2008). A low cost GSM/GPRS based wireless home security system. IEEE Transactions on Consumer Electronics, 54(2), 567-572.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 40 40 300
Online 40 40 300
Pdf & Online 40 40 300

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.