Prof.P.S.Bangare Student of Information Technology SAE,Kondhwa,Pune SAE,Kondhwa,Pune [email protected]

Prof.

P.S.BangareFaculty of Information TechnologySAE,Kondhwa,Punepallavi.

[email protected]    PareshPatil                                                             Quresh  KabadawalaStudent of Information Technology                           Student ofInformation Technology       SAE,Kondhwa,Pune                                                      SAE,Kondhwa,Pune [email protected]                                           [email protected]                                                                        Sharayu Rajenimbalkar                                                  NikitaRaikarStudent of Information Technology                           Student ofInformation TechnologySAE,Kondhwa,Pune                                                       SAE,Kondhwa,[email protected]                                                [email protected]                 Abstract—In current scenario, mobile and information technologyhave become an integral part of our lives. A new area where mobile is usefulfor gathering hazardous locations, of public area, information as they are notreadily accessible at any point. Thus, using cloud, the system will make allthe information related to the hazardous areas available on the AndroidApplication to the various organization like Police, Municipal Corporation,News Papers, etc.

during their investigation which would speed-up the entire processof tracking down the hazardous problems. A mobile application is made availableto the common people in order to update the hazardous problems by capturing theimage and the location of the area and is sent to the server and theresponsible authority is informed. This systemencourage people to take action on hazardous areas and solve hazards problem assoon as possible from responsible authority. Keywords— hazard reporting, hazardous locations,hazard problems,waste management.                       1.INTRODUCTIONThe goal is to workon the problems such as dustbin overflow in public areas, potholes on roads.Now-a-days mobile and information technology have become an essential part ofour lives.

Best services for writing your paper according to Trustpilot

Premium Partner
From $18.00 per page
4,8 / 5
4,80
Writers Experience
4,80
Delivery
4,90
Support
4,70
Price
Recommended Service
From $13.90 per page
4,6 / 5
4,70
Writers Experience
4,70
Delivery
4,60
Support
4,60
Price
From $20.00 per page
4,5 / 5
4,80
Writers Experience
4,50
Delivery
4,40
Support
4,10
Price
* All Partners were chosen among 50+ writing services by our Customer Satisfaction Team

A new area where mobile is useful for gathering injurious locations,of public area, statistics as they are not readily accessible at any point.Thus, using cloud, the system will makeall the information related to the perilous areas available on the AndroidApplication to the various organization like Police, Municipal Corporation,News Papers, etc.  People can compliantregarding hazard problem to responsible organization using android application.By catching the image and the location of the area  sent to the server responsible authority. Thenthe respective authority allocating the problems to their respective employeesand solved by their teams. The notification of the problem solving is sent tothe mobile of the operator and authorities. The System generates the ratingsNegative and Positive according to work solved within days.                                2.

  OBJECTIVEIn incident reporting system two modules are designed for common user(android application) and organization (web portal). They have established withsome explicit function. When it has to be happen that circumstances will befulfilled by sub common user.If common user submits any vulnerability compliant onandroid application.

System send user that compliant to on association webportal. System according to compliant fixed duty to particular departmentthrough employee and complete procedure in certain time limit. If work is thoroughin period. System inform to common user ask to generates feedback.                  3.Literature SurveyIdentifying a vulnerability or incident, Recognize and Respond,Completing a hazard and incident report are the goals of this paper. The GUI was developed in Extensive Mark-up Language (XML) which is analysedto a graphical representation in Android. To avoid ‘blocking’ GUI operation,time consuming Operations are run in background services resulting in a very responsiveapplication.

Techniques to analyze the presence and level of threats have greatlyevolved in recent years.Responding to countless emergency situations has given him a passion for safetyand perspective on the role of human behavior in preventing these events. A Systemwhich we use is modified form of MIRS system proposed by VI Tlali1. Typically, a reportis initiated by a user and  then transmittedto a server. The Authority onwards the message to a set of responsibleorganization available which can be transmitted to a certain location. Thesesystems include of both hardware and software and can be quite costly.

A LBS-baseddisaster management system which proposed from which we  relies on wireless and satellitecommunications, which uses our Incident response System through satelliteinformation.  Some systems which achievethis have been proposed and some are commercially available. We again providefew guidance from  South Africanuniversity where two theorem from systems include  by the Sysman Group 4 which consists of bothhardware and software and one delivered by Aurecon3 , which is computer based.The clear benefit of the system proposed in this paper is the fact that it trackson a smartphone and is much more flexible in terms of process as it does notrequire any extra/committed hardware.By seizinglocational requests by other applications installed on the same smartphone, itis also possible to update the user’s current location submissively. For theemergency component of the system, the user’s current location can be determinedactively or submissively. Alternatively the user can be driven to tap his/herlocation from a map with the map view centered on the user’s last knownlocation.

            4. SYSTEM ARCHITECTURE  5. DESCRIPTION OF ARCHITECTURE:·        GPSModule:Ø  Gives the location of user.Ø  Location is sent to particularauthority.·        The web Portal using Mongo DB:Ø  User registration and assigning theuser roles e.g.

police, News Paper, Higher authority.Ø  Show the complaints related to theuser.Ø  Assign the work to the particularemployee.Ø  Change the status of the complaints.·        DatabaseMongodb:Ø  Images location, objections and thedetails about the user is stored in database.·        Android application and SQLite:Ø  User registration using SQLite.Ø  User Login.Ø  Send the report which contains the image,data, audio to the explicit departments.

Ø  Edit the report.Ø  Maximum 3 times in a day user allowto send the report. 6.  OVERALL  DESCRIPTION 6.1 PRODUCT PERSPECTIVE:          The perspective of the proposed system is that the common user send hazardcompliant to system.

System send hazard compliant to particular organizationwith time limit. Organization solve compliant then system generatespositiveegative rate. System send message to user when compliant solve. 6.2 REQUIREMENTS: · SOFTWARE REQUIREMENTS:1)  Eclipse2)  JDK 83)  Mongo DB4)  Apache Tomcat · HARDWARE REQUIREMENTS: 1)  8 GB RAM2)  500 GB HDD 7.

MATHEMATICAL MODEL        S={s,e,X,Y,T,Fmain,NDD,DD,Success,Failure}· S(System) = Is our proposed system which includes following tuple.  · s (initialstate at time T ) = GUI of searchengine. The GUI provides space to enter a query/input for user. · X (input tosystem):- Input Query. The user has to first enterthe query. The query may be ambiguous or not. The query also represents whatuser wants to search.· Y (output ofsystem):- List of URLs with Snippets.

User has toenter a query into search engine then search engine generates a result whichcontains relevant and irrelevant URL’s and their snippets. · T (No. ofsteps to be performed):- 4. These are the total number of stepsrequired to process a query and generates results. · fmain(mainalgorithm):- It contains Process P.

Process Pcontains Input ,Output and subordinates functions. It shows how the query willbe processed into different modules and how the results are generated.· DD(deterministic data):- It containsDatabase data.

Here the have considered MongoDB which contains number ofqueries. Such queries are user for showing results. Hence, MongoDB is our DD.· NDD(non-deterministic data):- No. ofinput queries. In our system, user can enter numbers of queries so that thecannot judge how many queries user enters into single session. Hence, Number ofInput queries are our NDD.

· Memory shared: – MongoDB. MongoDB will store information like UserAuthentication, Performing Operationslike Show the complaints related to the user. Assign the work to the particular employee.

Change the status of the complaints. Since it is the only memory shared in our system, the haveincluded it in the MongoDB.· CPUcount: – 1. In our system, the require 1 CPU for server.

· Success = successfully recommended best system as per user’sinterest · Failure = If application will not send the notification to user itwill fail.Subordinate functions:S={s,e,X,Y,Fmain,NDD,DD,Success,Failure}Where         s=Start State         e=End State         X={Set OfInputs}            = {x1,x2}Where x1= UserRegistration Data, Add Employees for the particular users.x2= Reporton the basis of date selection                Y={Set ofOutputs}            = {y1,y2}         Where y1= Complaints shown using reporty2 = Report on the basis of date selection, Complaint solvedstatus on mobile number                           Fmain = {Set of procedure}                  = {f1,f2,f3,f4}Where                     f1=Take x1 Input                     f2=Give y1 Output                     f3=Take x2 input                     f4=Give y2 output            State Transition Diagram:           Fig:  State Transition Diagram Where,s=input statex=query          q1= User Registration Data, Add Employees for the particularusers          q2= Complaintsshown using report          q3= Reporton the basis of date selection          q4= Report on the basis of dateselection, Complaint solved status on mobile number Explanation:· The q1 state accept the ambiguousquery ‘x’ from the state ‘s’ which is our initial state.· The q2 state is meant for UserRegistration Data, Add Employees for the particular users which stores the query x which is accept in state q1. Thequery stores in state q2 Complaintsshown using report and send to stateq3.

· In q4 state, Report on the basis of dateselection, Complaint solved status on mobile number.    8. Conclusion            This incident reporting system provide facility to commonuser for compliant to organization about any incident. System takes quickaction regarding harmful areas and solvehazard problem which is reported by any user. In contrast with other available systems which consistof committed hardware and software, this system runs on Android mobile phones,it’s easy to format and simple to operate.

                         9.REFERENCES  1 VI Tlali, GP Hancke and BJSilva, “A Smartphone-based Mobile Incident Response System for Indoor andOutdoor Scenarios”University of Pretoria, South Africa. 2 Robert S. LeRoyLeRoy, “Hazard of Risk Analysis,Overcoming the Human Factor” Electrical Enterprizes Inc.

Lakeland,Florida USA. 3Aurecon, “Intelligent Incident and Emergency Management using the GlobalEmergency Management Command and Control Centre” (GEMC³). Online. 4The Sysman Group,”Disaster & Incident Management Solution”. Online.Available: www.sysman.co.za/drm.aspx.