CFSL और PU की ओर से विकसित स्नैचिंग डिटेक्टर 'रक्षा सूत्र' महिला सुरक्षा के क्षेत्र में क्रांति ला सकता है.
Category
🗞
NewsTranscript
00:00In the CSFL, a director is going to meet with Punjab University students
00:10who have worked on a new device with snatching of a new device.
00:18Let's talk about this device.
00:23First, tell us what was the motive of making this device?
00:29I have actually made this device because the need of women's security has failed.
00:36What is its name?
00:38Its name is Women's Security Device.
00:41We have given it an unofficial name,
00:44but officially it is Raksha Sutra, Surakshha and Surankshha.
00:48Yes, ma'am.
00:49If you talk about this device, how does this device work?
00:54Basically, the device works, we have some USB.
01:01The other devices, we have to press the button and turn on the device.
01:09However, when there is such an incident, people are not in that situation.
01:14They are not so responsive that they can press the button and turn on the device.
01:19In that case, our device has a USB.
01:23It is that if someone is chasing you or you are feeling uncomfortable,
01:28and you are starting to move on,
01:30and you are starting to move on or running or running,
01:32then the device will turn on and activate.
01:34Because if you are screaming,
01:37it will also activate the device.
01:40Besides that, if the device is on,
01:44then the device is on,
01:46and it will collect evidence.
01:47Or if you are in a crowded area,
01:49then there will be a motion.
01:51First of all,
01:53we need to know this product,
01:56this detector,
01:57we need to know how this idea is.
02:00How did you represent this idea?
02:02How did you have to represent it?
02:04How did you have to work on it?
02:06First of all,
02:07tell us.
02:08So this idea,
02:09Dr. S.K. Jain sir,
02:11who is currently the director of DFSS,
02:14came from him,
02:15and he contacted Professor Naveen Agrawal sir.
02:18He formed a team for teachers and students,
02:21and we took the team.
02:24And we took the project from there.
02:28He saw that there is a gap
02:31in which women's security and evidence collection.
02:34There is an incident,
02:35but there is no evidence.
02:36And the one who is accused or guilty,
02:38is the one who is guilty.
02:39There is no evidence.
02:40Another question,
02:41which is the topic of women's security,
02:44you have given data from this topic,
02:47which is related to your data,
02:48which is the challenges of a company,
02:51and the protection of its own,
02:53which is the same.
02:54So,
02:55while you see this detector,
02:57you have made this detector,
02:58you have made it in 5 ways.
03:00So,
03:01in which 5 ways,
03:02which is the same way?
03:03If you have to do the device,
03:05in that case,
03:06there is a push-button
03:08that you feel the vibration
03:09that you are not feeling safe.
03:11So,
03:12we can manually use the device.
03:14And if your device is connected to the internet,
03:18then the police API
03:20will send your close relatives
03:21to your close relatives,
03:22and then contact them.
03:23So,
03:24all the data,
03:25audio, video, images,
03:26or your GPS location,
03:28live location,
03:29they will share it.
03:30So,
03:31the quick response team
03:32or your parents,
03:33they can help you.
03:34Secondly,
03:35this is the time
03:36when you are showing consciousness
03:38and you are feeling insecure,
03:39that you are feeling insecure.
03:41you are feeling insecure.
03:42But,
03:43you have to take the device,
03:44your hands,
03:45take the device,
03:46take the device.
03:47Yes.
03:48And the second part?
03:50So,
03:51the other triggering methods
03:53we have are automatic.
03:54So,
03:55in automatic,
03:56there is one method
03:58that if someone is chasing you
04:00and you are suddenly running,
04:01you are trying to run,
04:02you are trying to run,
04:03you are trying to run.
04:04So,
04:05that device will happen
04:06which we have recorded
04:07the same things.
04:08We are saying
04:09that this data will be recorded
04:10and it will be recorded
04:11with your relatives.
04:12So,
04:13all the things will happen.
04:14In addition,
04:15if you are screaming,
04:16you don't get the chance
04:17to run,
04:18but you are calling,
04:19you are trying to run,
04:20you are trying to run,
04:21and you are trying to run.
04:22And,
04:23if you are trying to run,
04:25if you are trying to run,
04:26like,
04:27in this incident,
04:28we have seen
04:29that phones
04:30are being targeted
04:31to you,
04:32and you are trying to run.
04:33Then,
04:34there are other accessories,
04:35smart watches,
04:36there are other things.
04:37So,
04:38we have used the design
04:39that is basically
04:40in a jewelry shape,
04:41or ornament shape.
04:42So,
04:43it is wearable,
04:44so anyone can wear this.
04:46I mean,
04:47women can wear it.
04:48So,
04:49if you are screaming,
04:50then the device will be on.
04:51So,
04:52if you are screaming,
04:53then the device will be on.
04:54What is the 5th point?
04:55So,
04:56if you are going to be in a crowded place,
04:57and you are thinking
04:58that you are not safe,
04:59then,
05:00the camera will see
05:01that the whole field of view
05:02will see how many people are in the field.
05:04And,
05:05if they are crowded.
05:06Yes.
05:07So,
05:08this is in the center.
05:09Yes.
05:10So,
05:11this is the whole device.
05:12Yes.
05:13Yes.
05:14Yes.
05:15Yes.
05:16Yes.
05:17Yes.
05:18Yes.
05:19Yes.
05:20Yes.
05:21Yes.
05:22Yes.
05:23Yes.
05:24Yes.
05:25Yes.
05:26Yes.
05:27Yes.
05:28Yes.
05:29Yes.
05:30Yes.
05:31Yes.
05:32Yes.
05:33Yes.
05:34Yes.
05:35Yes.
05:36Yes.
05:37Yes.
05:38Yes.
05:39Yes.
05:40Yes.
05:41Yes.
05:42Yes.
05:43Yes.
05:44Yes.
05:45Yes.
05:46Yes.
05:47Yes.
05:48Yes.
05:49Yes.
05:50Yes.
05:51Yes.
05:52Yes.
05:53Yes.
05:54Yes.
05:55Yes.
05:56Yes.
05:57Yes.
05:58Yes.
05:59If there is no internet service and this device is broken from somewhere,
06:03it will be broken from somewhere, but it will be collected from data.
06:07So, what kind of work is that?
06:09Actually, we have made this device by using this way,
06:13that if there is a case of emergency,
06:15that the device is broken from there,
06:17or the ornament is broken from there,
06:18we have also a triggering method,
06:22that the device can activate the device,
06:25and at the time it is broken, it will continue to feed the device,
06:30audio, video, recording, GPS location, everything,
06:34it will reach the server,
06:37and it will also be stored in the local store.
06:39You have told me that,
06:42you are demanding that,
06:44the government will give this device free,
06:49so that their safety measures will be collected.
06:53So, do you have requested this?
06:56Or do you have made a protocol?
06:58For example, we have also done some training,
07:02because this device is also in the testing phase.
07:05Since this is over 3 years,
07:09we will take it to the final stage.
07:12And as we have told you,
07:14that it is in collaboration with CFSL and Punjab University,
07:18so both organizations will take a collaborative decision,
07:21whether they have to provide it freely,
07:23or whatever they will provide.
07:26But personally, I feel,
07:28that they should be available in free,
07:32because it is a necessity for every woman.
07:35You have told me that,
07:38when this device was created,
07:40it was quite big,
07:41the remote size.
07:42And now it will be a chip size,
07:45but you also want to bring it in a smaller shape.
07:48So, what was the first thing in the beginning?
07:51Initially, the device was quite big.
07:57And as we have seen that,
07:59in the survey,
08:00which is mostly the breastplate,
08:02or ring shape,
08:04women's robe,
08:05and their safety device is in the smallest form.
08:08So, as we target it,
08:10we have reached this form factor to this form factor.
08:15This form factor?
08:17Yes, we have reached this form factor.
08:19And further, we will try this,
08:21that we will minimize it,
08:24and bring it into the form form.
08:26But for the time being,
08:28we have kept it in a pendant shape.
08:31Because if there is an emergency situation,
08:35it is very difficult to capture the evidence from a ring.
08:39Because the movement of the arms,
08:41the movement of the arms,
08:42the movement of the arms,
08:43the movement of the arms,
08:45we do not do so much movement.
08:47And if we look at the stability of the point of view,
08:50we have kept the device in this pendant shape.
08:54So, if we talk about this device,
08:56what is the copyright of this device,
08:58or what is the copyright of this device,
09:00has been given to the government?
09:01Or you have also sent the proposal?
09:03Ma'am, we have already filed a patent.
09:08It is not publicly available.
09:10It is publicly available.
09:12It is published?
09:13Yes, ma'am.
09:14Basically, we have filed it in 2023,
09:17and it is still in the public domain.
09:19It is published.
09:20So, we will soon get the granted patent.
09:22From the Government of India.
09:24This is our team of Punjab University Engineering Department.
09:30They have been working with CSFL.
09:39They have made a detector with snatchers,
09:43especially with the machines,
09:47where the devices have been captured.
09:50So, the factory members have got their back,
09:52how their phones are put out,
09:53how their phones take out.
09:55In that period the location,
09:57the audio can be captured.
09:57This device is so much work,
09:59that no one can wear it,
10:01and carry it to me.
10:03So, that we hope that the device will make more little size.
10:06So that if independent of this device,
10:08device will make a smaller size so that every one of them can carry this detector
10:15wherever they have any doubt or any kind of trouble, that the way they are going,
10:27they may be dangerous from there, so this detector will work very well for those areas.
10:35Camera person kitchen के साद नगमा सिंह की lipoort, E TV भारत