2016 IEEE International Conference on Recent Trends in Electronics, Information &Amp; Communication Technology (RTEICT) 2016
DOI: 10.1109/rteict.2016.7808003
|View full text |Cite
|
Sign up to set email alerts
|

Design and development of an IOT based wearable device for the safety and security of women and girl children

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 46 publications
(19 citation statements)
references
References 9 publications
0
16
0
Order By: Relevance
“…Machine learning is the most popular research technique for data processing with 100 publications. This technique is used for data prediction [218,219], activity recognition [220,221], and data classification [222,223]. Next, data mining appears with 89 documents, with distributed data mining [224], and applications such as event detection [225,226] as sub-techniques.…”
Section: Software Processing Techniquesmentioning
confidence: 99%
“…Machine learning is the most popular research technique for data processing with 100 publications. This technique is used for data prediction [218,219], activity recognition [220,221], and data classification [222,223]. Next, data mining appears with 89 documents, with distributed data mining [224], and applications such as event detection [225,226] as sub-techniques.…”
Section: Software Processing Techniquesmentioning
confidence: 99%
“…Goodwin et al [23] also presented a remarkable way to detect violence by using cardiovascular, electrodermal activity and motion (accelerometry) but focused on people with autism spectrum disorder, so the circumstances are not exactly similar to a IPV context. Therefore, although being some proposal very complete [24], previous proposals have a lack of completeness, this is, relying in a couple of features and other works with a more complete monitoring in order to continuously monitor daily activities (which could include an assault) like the exposed ones in the review done by Kumari et al [25] are not specifically designed for IPV survivors monitoring.…”
Section: Existing Proposals For Violence Detection Based On Biosensorsmentioning
confidence: 99%
“…In the figure, we have tired to figure out how the SOS button properly worked, if the mobile headphone is conncected or not. We use headphone power up button as a SOS button [8][9][10][11][12][13]. First connect headphone to app.…”
Section: Working Principle 21 Block Diagram Of Proposed Systemmentioning
confidence: 99%