The advent of AI-powered wearables and devices has revolutionized personal safety, offering women innovative tools to enhance their security and well-being. This chapter aims to explore the role of AI in wearables designed specifically for women's safety, discussing their features, benefits, challenges, and ethical considerations. It also helps to explore the emerging landscape of AI-driven wearable technology designed specifically to address women's safety concerns. It will delve into the various types of wearables and devices, their functionalities, user experiences, and the impact they have on women's safety. It will emphasize the transformative potential of these technologies in empowering women and enhancing their security. Additionally, it will highlight the ongoing need for collaboration between technology developers, policymakers, and users to address challenges and ensure the responsible and effective use of AI in wearables for women's safety.
TopLiterature Survey
To discuss previous research that had been done in a manner, a literature survey is conducted. These articles cover wearables like wristbands, pendants, footwear, etc., as well as papers on smart phone applications and papers on communication channels that could be used in an emergency.
After getting the concept from these papers, we can changed with adding some features as to improve the system. The data from the literature review considered as a foundation for improving our safety system. To protect the user from harm or danger, the authors have created a fully electronic glove with the circuitry housed inside the glove and suitably insulated from the outside. When any violent behaviour is encountered, the user merely needs to activate the conducting layer on the glove's palm side.
The bully is given a scary shock when the conductive layer is activated, which has a severe effect on the muscles' ability to contract and extend, giving the wearer an easy advantage over the oppressor. The suggested system offers a wearable fingerprinting device via machine learning that enables countering cyberattacks, provides cyber threat intelligence, and also shows the viability of the suggested method in order to deliver reliable cyber threat intelligence.
It focuses on the Bluetooth protocol, which is widely utilized by wearables and other Internet of Things (IoT) devices. The authors have undertaken a thorough analysis of research prototypes and wearable devices that are currently on the market (also known as “wearables”). They have categorized the wearables, researched the ones that are already on the market, and made comparisons between them. It was suggested to create a somewhat portable device for women's rescue. The authors have made an effort to develop a safety system that combines the advantages of android phone applications with wearable clothing or accessories. The Arduino Uno board, GPS module, GSM module, Raspberry Pi, and Webcam are all components of the authors' prototype (Helen et al., 2017; Lee et al., 2018; Opika & Rao, 2020; Seneviratne, 2017).