Figure - uploaded by A. Z. M. Tahmidul Kabir
Content may be subject to copyright.
Data visualization of types of technology and recipient.

Data visualization of types of technology and recipient.

Source publication
Article
Full-text available
span>Women have progressed a lot in terms of social empowerment and economics. They are going for higher education, jobs, and many other similar endeavors, but harassment cases have also been on the rise. So, women’s safety is a big concern nowadays, especially in developing countries. Many previous studies and attempts were made to create a feasib...

Contexts in source publication

Context 1
... messages and location information can be via WhatsApp messenger. Table 1 shows different device features. ...
Context 2
... underneath Table 1 visualizes previous safety solutions done in the last few years. The table shows the used technology by the researchers and the targeted people or authority to receive the sent notification. ...

Similar publications

Article
Full-text available
Based on the digital transformation practice of Chinese manufacturing enterprises, this paper sorts out the intrinsic mechanism of digital transformation affecting the performance of manufacturing enterprises systematically, based on the perspective of digital investment, and empirically tests the theoretical hypothesis using an unbalanced panel of...
Article
Full-text available
Kindergarten climate has been reported to be closely associated with teachers' retention intention, yet the underlying mechanism of this association remains unclear in some ethnic minority areas in China. Based on the Personal-Environment Fit Theory and Organizational Support Theory, the research aims to examine the correlation between kindergarten...
Preprint
Full-text available
Introduction: Most students are required to read the same material, write the same tests, and complete the same assignments as all the other students. This traditional pedagogical strategy inherently disadvantages many students, which, in turn, also disengages many students. More than a century ago, Dewey (1916) argued such pedagogical strategies e...

Citations

... The researchers suggest various safety devices in which the different critical situation leads to location tracking of the user. In this article, the advantages and drawbacks of location-tracking methods are broadly discussed [4]. This device will send the videos and images of the surrounding people at the exact location to the emergency contacts. ...
Article
Full-text available
In the present technological developments, the internet of things (IoT) technology connects all interconnected networks. The attacks on women are increasing daily in Indian countries. If the woman is not carrying a mobile phone or device, she cannot contact the police station or other family members. This proposed method will help the women identify the exact location and inform the police station in such a scenario. The Emergencies, the women, can press the button once the location information is tracked. The purpose of this project is to help women in emergencies. Location tracking and short service messages are also sent to the family members and nearby police stations.