ABSTRACT
Most crimes being committed around the streets are left unreported, despite the presence of various acts enacted by the government. There is also an issue of the police not being able to respond on time as there are lots of people who may be reporting, and not every emergency may be attended. With that, the researchers have decided to devise a quick emergency response system that can help citizens of Taguig City, Philippines send an emergency call to the police fast and record it automatically. A research on related tools and frameworks has been conducted to support the system. It was tested by the citizens of Taguig to assess if the system has improved the emergency response times. Based on the results, a large percentage of citizens believed that the system created is much more intuitive compare to calling the policemen via phone.
- Y. CNN P. Morales, "One person raped per hour in PH - report," CNN Philippines, Metro Manila, p. 1, 08-Mar-2017 [Online]. Available: http://cnnphilippines.com/news/2017/03/07/One-person-raped-per-hour-in-PH.html.Google Scholar
- Casino, T. (2018). Android Fingerprint APIs: An Overview for Android App Developers. [online] Willowtreeapps.com. Available at: https://willowtreeapps.com/ideas/android-fingerprint-apis-an-overview-for-android-app-developers/Google Scholar
- Linphone.org. (2018). Liblinphone: Cross-platform SDK - open source video sip phone, voip software. [online] Available at: http://www.linphone.org/technical-corner/liblinphone/overviewGoogle Scholar
- R. Unit and C. C. Care, "Republic Act 9262," no. 2.Google Scholar
- L. Fridman, S. Weber, S. Member, R. Greenstadt, and M. Kam, "Active Authentication on Mobile Devices via Stylometry, Application Usage, Web Browsing, and GPS Location," vol. 11, no. 2, pp. 513--521, 2017.Google Scholar
- H. Ghafghazi, A. ElMougy, H. T. Mouftah, and C. Adams, "Location-aware authorization scheme for emergency response," IEEE Access, vol. 4, pp. 4590--4608, 2016.Google Scholar
- Exelixis Media P.C, "Android Programming Cookbook," p. 143, 2016.Google Scholar
- Y. N. Zhang, H. Y. Ning, J. Bai, B. C. Chen, P. C. Zhou, and X. L. Zhao, "Elderly safety early-warning system based on android mobile phones," 2014 10th Int. Conf. Nat. Comput. ICNC 2014, pp. 1126--1130, 2014.Google Scholar
- S. T. Zeng and C. M. Lee, "Personal emergency notification application design for mobile devices," 2014 Int. Symp. Next-Generation Electron. ISNE 2014, pp. 5--6, 2014.Google ScholarCross Ref
- M. Romano, T. Onorati, I. Aedo, and P. Diaz, "Designing Mobile Applications for Emergency Response: Citizens Acting as Human Sensors," 2016.Google Scholar
- ABS-CBN K.Sabillo, "Barangay sa Valenzuela, app and sagot sa mga krimen, emergency," ABS-CBN News, Valenzuela, Philippines, p. 1, 08-Nov-2017 [Online]. Available: http://news.abs-cbn.com/life/11/08/17/barangay-sa-valenzuela-app-ang-sagot-sa-mga-krimen-emergency.Google Scholar
- R. Unit and C.C. Care, "Republic Act 8353," no. 3815Google Scholar
- tutorialspoint, "Mobile Computing Brief Overview," tutorialspoint, 2018 [Online]. Available: https://www.tutorialspoint.com/mobile_computing/mobile_computing_overview.htm.Google Scholar
- M. Rouse, "What is Internet of Things (IoT)?" IoT Agenda, 2018 [Online]. Available: http://internetofthingsagenda.techtarget.com/definition/Internet-of-Things-IoT.Google Scholar
- I. Staff, "Decision Support System - DSS," Investopedia, 2018 [Online]. Available: https://www.investopedia.com/terms/d/decision-support-system.aspGoogle Scholar
- N. Yildrim and A. Varol, "Android based mobile application development for web login authentication using fingerprint recognition feature," in 2015 23nd Signal Processing and Communications Applications Conference (SIU), Turkey, May 2015.Google Scholar
- C. S. Ntshangase and B. S. Meshack, "Encryption using finger-code generated from fingerprints," in 2018 Conference on Information Communications Technology and Society (ICTAS), 2018.Google Scholar
- A. Nada, M. Nasr and M. Salah, "Service oriented approach for decision support systems," in Information Technology and Artificial Intelligence Conference (ITAIC), Chongqing, China, 2015.Google Scholar
- R. Olanrewaju, N. Ali and T. Islam, "An Empirical Study of the Evolution of PHP MVC Framework," Department of Electrical and Computer, Kulliyyah of Engineering, Kuala Lumpur, Malaysia, 2015.Google Scholar
- D. Kumar, "Best Practices for Building RESTful Web services," Infosys Digital, 2017.Google Scholar
- "Sensors Overview", Android Developers, 2018. [Online]. Available: https://developer.android.com/guide/topics/sensors/sensors_overview. [Accessed: 6-June-2018]Google Scholar
- A. Al-Fuqaha, M. Guizani and M. Mohammadi, "Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications," IEEE COMMUNICATION SURVEYS & TUTORIALS, vol. 17, no. 4, 2015.Google Scholar
- Hermendra, "Be Prepared: 5 Android Apps You Must Have in Case of Emergency - Best Android Apps", Best Android Apps, 2018. [Online]. Available: http://bestandroidapps.com/be-prepared-5-android-apps-you-must-have-in-case-of-emergency/Google Scholar
- "Firebase", Google Developers, 2011. [Online]. Available: https://firebase.google.com/?gclid=Cj0KCQiA1NbhBRCBARIsAKOTmUv1Q2EufHs1OOFzVomOdPKR3DPuwa10tuOJj2mecS-Bk4TjKhco4G8aAgkcEALw_wcB. [Accessed: 10-January-2019]Google Scholar
- "OneSignal", OneSignal, 2018. [Online]. Available: https://onesignal.com/about. [Accessed: 10-January-2019]Google Scholar
- "Android Studio", Android Developers, 2018. [Online]. Available: https://developer.android.com/studio/index.html. [Accessed: 10-January-2019]Google Scholar
Index Terms
- E-Ligtas: A Life-Saving Application Using Fingerprint Biometrics with Analysis for the People Who are in an Emergency
Recommendations
China's Emergency Management Mechanisms for Disaster Prevention and Mitigation
ICEE '10: Proceedings of the 2010 International Conference on E-Business and E-GovernmentEmergency management mechanisms for disaster prevention and mitigation mainly include three parts: disaster prevention mechanism, disaster guarantee mechanism, and post-disaster relief, rehabilitation, and reconstruction mechanisms. Prevention mechanism ...
Data that matter: opportunities in crisis informatics research
WSDM '14: Proceedings of the 7th ACM international conference on Web search and data miningIn an increasingly global society and on a planet experiencing effects of climate change, large-scale emergencies both instigated by humans and arising from nature can devastate human life and our tightly- woven social fabric. With a promise of improved ...
LifeKey: Emergency Communication Tool for the Deaf
CHI EA '16: Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing SystemsEmergency situations pose a particular challenge for Deaf individuals. Deaf people experience difficulties both when contacting emergency call centers and when emergency personnel arrive on-scene. The ability to communicate with emergency dispatch via ...
Comments