Skip to playerSkip to main content
  • 5 months ago
CFSL ਅਤੇ PU ਦੁਆਰਾ ਵਿਕਸਤ ਕੀਤਾ ਗਿਆ ਸਨੈਚਿੰਗ ਡਿਟੈਕਟਰ 'ਰਕਸ਼ਾ ਸੂਤਰ' ਔਰਤਾਂ ਦੀ ਸੁਰੱਖਿਆ ਦੇ ਖੇਤਰ ਵਿੱਚ ਕ੍ਰਾਂਤੀ ਲਿਆ ਸਕਦਾ ਹੈ

Category

🗞
News
Transcript
00:00In the CSFL, there is a director of the CSFL meeting.
00:07Our students are Punjab University,
00:10who have worked with a new device
00:13with the snatching of the machines.
00:18Let's talk about this device.
00:23First, tell us about this device.
00:26What was the motive for creating?
00:29Actually, this device is designed
00:32because there is a lot of need for women's security.
00:36What is its name?
00:38Its name is a woman's security device.
00:41We have given it an unofficial name,
00:44but officially it is Raksha Sutra, Surakshha and Surankshha.
00:48Yes, ma'am.
00:49How do you work with this device?
00:53Basically, the device that we work with,
00:58we have a lot of USB.
01:02The other devices,
01:05we have to turn on the button
01:07and turn on the device.
01:09But when there is any incident,
01:11people are not in that situation.
01:13They are not so responsive,
01:15so they can press the button
01:17so they can be on the device.
01:19In that case,
01:20we have the USB device.
01:23If someone is chasing you,
01:26you are feeling uncomfortable,
01:28and you are suddenly moving,
01:29or running fast,
01:30or running fast,
01:31then the device will turn on,
01:33or activate.
01:34Because if you are screaming,
01:37then the device will turn on the device.
01:40Besides,
01:41if the device will turn on the device,
01:43then the device will turn on the device,
01:45then the device will turn on the device,
01:47and it will collect evidence.
01:48Or if you are in a crowded area,
01:49then there is a motion.
01:51outside of the device.
01:52Let us warn the device of the device,
01:54with the device that you have to have
01:55as a provider.
01:56As you first get into the device,
01:57the device will come into the device,
02:00the device will come into the device,
02:01and any kind of device,
02:02that you have to work in the device.
02:04So let us tell this.
02:06Please tell the device,
02:07Dr. S.K. Jain sir,
02:08who is presently the DCFSS director,
02:11and he contacted Prof. Navin Agrawal sir,
02:13he has a team form.
02:15He started to form a team,
02:18They formed a team form for teachers and students and we took them to the team and we took them to the project.
02:28They saw that there is a gap between women's security and evidence collection.
02:34There is an incident but there is no evidence.
02:36And the accused or guilty of it is no penalty.
02:40This topic is given to women's security.
02:45It has been given data to you about what challenges come from a company
02:51and its protection.
02:54So, as you can see, you have made this detector.
02:57It is made possible to work in five ways.
03:00So, what are those five ways?
03:03So, if you want to use the device,
03:05in that case, there is a push button that you feel like you are not feeling safe.
03:11So, we can manually use the device.
03:14And if your device is connected to the internet,
03:19then the police API will send your close relatives to your close relatives or contact them.
03:23So, all the data, audio, video, images or your GPS location,
03:28they will share their quick response team or parents.
03:34So, you can help them.
03:35Secondly, this is the time when you are showing consciousness,
03:38and you are feeling insecure,
03:40that you are also feeling insecure.
03:42But...
03:43You don't have the device.
03:44You don't have the hand.
03:45Yes.
03:46And the second part?
03:51So, the rest of the triggering methods,
03:53we have automatic.
03:55So, in automatic, there is one method that
03:58if someone is chasing you,
04:00and you are suddenly running,
04:02and running and running,
04:04you will be able to run.
04:05So, the device will be able to run.
04:06We have recorded the same things.
04:08We are saying that the data will be recorded
04:10and it will be able to run with your relatives.
04:12There will be all things.
04:13Moreover, if you are screaming,
04:15if you don't have the opportunity to run,
04:17but you are calling,
04:18then the evidence will be able to collect the evidence.
04:21Moreover,
04:22if I will be able to run this device,
04:23I will be able to escape from you.
04:24I will be able to escape from you.
04:25If I am able to escape from you,
04:26I have seen that this incident,
04:28most of the incidents
04:29most of the incidents
04:30are being able to escape from you.
04:31The first of the attacks
04:32will be able to escape from you.
04:33Then, the other accessories are coming up,
04:35the smartwatches and the other things.
04:36So, in this case,
04:37we have designed the design,
04:38as well as the one's jewelry,
04:40or the ornament is in the shape.
04:43So, it is very wearable.
04:44So, anyone can wear this.
04:46I mean, women can wear it in any way.
04:49So if you scream at that time, the device will be on.
04:54What is the 5th point?
04:55The 5th point is that if you are going to be in crowded places and you feel unsafe,
05:00then the camera will see how many people are in the field of view.
05:05If they are crowded.
05:06Yes.
05:07So this is the center.
05:09So this is the circuit.
05:11This is the whole device and the camera will see the crowd.
05:15Yes.
05:16So it will see how many people are in the field of view.
05:20And on that basis, the device will be on.
05:23If we want to see the actual device, what is the actual device?
05:29The main device is the main device.
05:34There is a camera module, a mic, a video recording, a microcontroller, a antenna.
05:41And we have the option that we can insert a SD card in it.
05:47So it will be a local storage.
05:49If our internet is not able to connect with us,
05:52then at least our data will be saved locally for evidence.
05:57So you have told us that if there is no internet service,
06:02and this device is broken from somewhere,
06:04and it will be broken from somewhere,
06:05but then it will be collected data.
06:07So what do you do?
06:09Actually, we have made this device in this way.
06:13If there is a case of emergency,
06:15the device is broken or the ornament is broken.
06:18So this is also a triggering method.
06:22The device can also be activated.
06:25And at the time it is broken,
06:27it will continue to feed it.
06:30Audio, video recording, GPS location, everything.
06:34It will be reached to the server.
06:37And locally, it will also be stored.
06:39You have told us that you have to demand
06:43that those cases are in this situation
06:46that the government will give this device free.
06:49So that their safety measures will be completed.
06:53So do you have requested this?
06:57Or do you have made some protocols?
06:59For example, we have done some training.
07:02Because this device is also in the testing phase.
07:05And since this is over 3 years,
07:09we will take it to the final stage.
07:12And as we have told you,
07:15that it is in collaboration with CFSL and Punjab University.
07:18So both organizations will take a collaborative decision
07:21whether they have to provide it freely or
07:25whatever they will provide.
07:27But personally, I feel that
07:29they should be available in free
07:33because it is a necessity for every woman.
07:36One of you have told me
07:38that when this device was created,
07:40it was a remote size.
07:42And now it will be a chip size.
07:45But you also want to take it in a smaller shape.
07:48So what was the first thing in the beginning?
07:51How was the first thing in the beginning?
07:52Initially, the device was also quite big.
07:57And as we have seen,
07:59that in the survey,
08:00the women's breastplate or ring shape
08:03is in the shape of the woman's robe.
08:05The safety device is in the smallest form.
08:08So as we target that,
08:10we have reached this form factor.
08:13We have reached this form factor.
08:16We have reached this form factor.
08:19And we are trying to optimize it
08:22in the form of the ring.
08:25But for the time being,
08:28we have kept it in a pendant shape.
08:31Because if there is an emergency situation,
08:34if there is an emergency situation,
08:35then it is very difficult
08:36that we capture the evidence from a ring.
08:39Because the movement of the hands
08:41is a lot of movement.
08:42And the upper part is not so much movement.
08:46And if we look at the stability point of view,
08:49we have kept the device in this pendant shape.
08:54So if we talk about this device,
08:57what is the copyright of this device
08:59or the copyright of this device
09:00has been given to the government?
09:02Or you have also sent the proposal?
09:04Ma'am, we have already filed the patent.
09:08This is not publicly available.
09:10Is it publicly available?
09:12Is it published?
09:13Yes ma'am.
09:14Basically, we have filed it in 2023.
09:17And it is still in the public domain.
09:19It has been published.
09:21So we will soon get the granted patent
09:24from the government of India.
09:26Yes.
09:27These were the people of Punjab University Engineering Department
09:31who have been working with CSFL
09:36and worked with CSFL.
09:39They have made such a detector
09:42with snatchers,
09:44especially with the manufacturers
09:47who have been working with the devices
09:49and they have been working with the capabilities
09:50or phones.
09:51In that period,
09:52we will know the location
09:54and the audio
09:55and the video
09:56can be captured.
09:58This device is so used
10:00that someone can use it,
10:02who can carry it.
10:04This device is also possible,
10:07that someone can carry it.
10:09So this device will be made smaller,
10:10so that every customer
10:12can carry it.
10:13can carry this detector
10:15wherever there is a doubt or a doubt
10:21that the way they are going to go and where they are going
10:27they may be afraid of them
10:29so this detector will work very well for those areas.
10:34Camera person Kishin, Nagma Singh, report, ETV, Bharat.
Be the first to comment
Add your comment

Recommended