2019
DOI: 10.11591/ijece.v9i5.pp4355-4363
|View full text |Cite
|
Sign up to set email alerts
|

Manifesting a mobile application on safety which ascertains women salus in Bangladesh

Abstract: This paper reflects on the indemnity of women in our society. The proposed model ensures the embodiment of a mobile application. The algorithm, we developed for this model focuses the safety issues which is applicable to both inside as well as outside of the house for the women in Bangladesh. The solution of this problems can be done through some interrelated features such as i) SOS button pressing which ensures automatic calling, instant location tracking system through GPS of the phone and sending tracked lo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…The adopted methodology is drive testing, post processing and data analysis. The authors conclusion were that most of the network problems are caused by increasing subscribers and the changing environment and also that RF optimization should be carried out frequently in order to improve the network performance with the existing resources [14][15]. CST can be estimated by drive test through the calculation from L3 messages.…”
Section: Related Workmentioning
confidence: 99%
“…The adopted methodology is drive testing, post processing and data analysis. The authors conclusion were that most of the network problems are caused by increasing subscribers and the changing environment and also that RF optimization should be carried out frequently in order to improve the network performance with the existing resources [14][15]. CST can be estimated by drive test through the calculation from L3 messages.…”
Section: Related Workmentioning
confidence: 99%
“…Besides, several setups and researchers collaborating with technological experts are concentrating on the improvement of identity methods such as Evernym, Uport [8], [20], Shocard [21], Civic [22], Jolocom [23], Bitnation [24] and Sovrin [8] to solve the digital identity problem. We also propose PKI based DDSSI identity system where we use a Bitcoin system along with the combination of privacy [25] and reputation with the collaboration of BC [26].…”
Section: Blockchain and Bitcoinmentioning
confidence: 99%
“…Thus, the main contribution of this paper is to propose supervised machine learning approach for detecting and preventing cyberbullying words used in the social media tweets. [1] Instances of abduction or kidnapping are highest for young children or senior citizens; they are the most commonly targeted demographic for abduction and kidnapping. It is presumed that young children and senior citizens are less capable of self-defense and are unaware of possible recourse for them to keep themselves safe from such danger, the same is true in case of women who may not possess the physical strength to defend themselves in such situations.…”
Section: Introductionmentioning
confidence: 99%