Wearable Computing - Women Become Warriors by Wearing This Watch
Abstract
Today in the current global scenario, the prime question in every girl’s mind, taking into account the ever rising increase of issues on women harassment in recent past, is only about her safety and security. The only thought haunting every girl is when they will be able to move freely on the streets even in odd hours without worrying about their security. This paper suggests a new perspective to use technology to protect women. The system resembles a normal WATCH which when activated, tracks the location of the victim using GPS (Global Positioning System) and sends emergency messages using GSM (Global System for Mobile Communication), to contacts and the police control room. The system also incorporates a screaming alarm that uses real-time clock, to call out for help. The main advantage of this system is that the user does not require a Smartphone unlike other applications that have been developed earlier. The use of sophisticated components ensures accuracy and makes it reliable. The WATCH provides with all the features which will leave no stone unturned to help the victim in any kind of emergency situations
Full Text:
PDFReferences
Cliff Randell, Department of computer science, University of Bristol, U.K., Wearable computing: A review, www.cs.bris.ac.uk / Publication/ Papers/2000487.pdf.
DARPA, Proceedings of the Wearables in 2005Workshop,www.darpa.mil/MTO/Displays/Wear2005/, (1996).
Lind, E.J., Jayaraman, S. Rajamanickam, R., Eisler, R. and McKee, T., A sensate liner for personnel monitoring applications, First International Symposium on Wearable Computers, (1997), pp 98-105.
Mann, S., Mediated reality, Technical Report 260, MIT Media Lab, Perceptual Computing Group, (1994).
Body media Incorporate,4, Smithfied –Street , 11 Floor, Pittsburgh PAAI5222, USA, Bodey media, product literature, http://www.bodymedia.com
en.wikipedia.org/wiki Wearable technology
http://www.wearitatwork.com/home/discovering-ubiquity/
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.