A Mobile Application for the Immediate Detection and Response to Violent Attacks in Urban Environments Utilizing Speech-to-Text and Natural Language Processing
Received: 5 July 2025 | Revised: 27 August 2025 | Accepted: 2 September 2025 | Online: 8 December 2025
Corresponding author: Lenis Wong
Abstract
The increase in violent attacks in urban environments has generated growing social concern about improving emergency response speed, considering that a large portion of the population has experienced some form of violence in public spaces. This study aims to build a mobile application for the immediate detection and response to violent situations using advanced technologies such as Speech-to-Text (STT) and Natural Language Processing (NLP). The development was carried out in four phases: (1) selection of STT service, (2) selection of NLP service, (3) Implementation of STT and NLP, and (4) application development. Additionally, an experiment was conducted in two simulated scenarios representing armed assaults, evaluating reaction times, Help Request Time (HRT), and total response time, both with and without the use of the application. The results showed a significant reduction in total response time, 50.35% in the first scenario and 43.92% in the second. Moreover, the application was evaluated by users and security experts, obtaining highly favorable scores in effectiveness, efficiency, and overall satisfaction. It is concluded that this technological solution represents an effective and practical tool for substantially improving speed and safety in critical situations, enabling more timely and efficient intervention.
Keywords:
Speech-to-Text (STT), speech recognition, mobile application, public safety, violent attacks, Natural Language Processing (NLP)Downloads
References
J. Inquilla Mamani, M. López Cueva, E. Catacora Vidangos, and E. Flores Mamani, "La morfología de la criminalidad urbana en el Perú: un análisis de tendencias, niveles y factores de riesgo," Andamios, vol. 21, no. 55, pp. 411–435, Aug. 2024. DOI: https://doi.org/10.29092/uacm.v21i55.1110
"Estadísticas de Criminalidad, Seguridad Ciudadana y Violencia. Julio-Setiembre 2024," Instituto Nacional de Estadística e Informática. [Online]. Available: https://www.gob.pe/institucion/inei/informes-publicaciones/6334643-estadisticas-de-criminalidad-seguridad-ciudadana-y-violencia-julio-setiembre-2024?utm_source=chatgpt.com.
A. Swaminathan et al., "Natural language processing system for rapid detection and intervention of mental health crisis chat messages," NPJ Digital Medicine, vol. 6, Nov. 2023, Art. no. 213. DOI: https://doi.org/10.1038/s41746-023-00951-3
A. Bakhshi, J. García-Gómez, R. Gil-Pita, and S. Chalup, "Violence Detection in Real-Life Audio Signals Using Lightweight Deep Neural Networks," Procedia Computer Science, vol. 222, pp. 244–251, Jan. 2023. DOI: https://doi.org/10.1016/j.procs.2023.08.162
A. S. M. Mohsin and M. A. Muyeed, "IoT based smart emergency response system (SERS) for monitoring vehicle, home and health status," Discover Internet of Things, vol. 4, no. 1, Oct. 2024, Art. no. 22. DOI: https://doi.org/10.1007/s43926-024-00073-6
N. Hasan and M. F. Ahmed, "Wearable Technology for Elderly Care: Integrating Health Monitoring and Emergency Alerts," Journal of Computer Networks and Communications, vol. 2024, no. 1, Nov. 2024, Art. no. 5593708. DOI: https://doi.org/10.1155/jcnc/5593708
Y. Obuchi and T. Sumiyoshi, "Intentional Voice Command Detection for Trigger-Free Speech Interface," IEICE Transactions on Information and Systems, vol. E93.D, no. 9, pp. 2440–2450, Jan. 2010. DOI: https://doi.org/10.1587/transinf.E93.D.2440
E. Veltmeijer, M. Franken, and C. Gerritsen, "Real-time violence detection and localization through subgroup analysis," Multimedia Tools and Applications, vol. 84, no. 7, pp. 3793–3807, Feb. 2025. DOI: https://doi.org/10.1007/s11042-024-19144-5
S. C. Venkateswarlu, S. R. Jeevakala, N. U. Kumar, P. Munaswamy, and D. Pendyala, "Emotion Recognition From Speech and Text using Long Short-Term Memory," Engineering, Technology & Applied Science Research, vol. 13, no. 4, pp. 11166–11169, Aug. 2023. DOI: https://doi.org/10.48084/etasr.6004
M. D. Vu, H. Wang, Z. Li, G. Haffari, Z. Xing, and C. Chen, "Voicify Your UI: Towards Android App Control with Voice Commands," Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, vol. 7, no. 1, Mar. 2023, Art. no. 44. DOI: https://doi.org/10.1145/3581998
H. Tolle et al., "From voice to ink (Vink): development and assessment of an automated, free-of-charge transcription tool," BMC Research Notes, vol. 17, no. 1, Mar. 2024, Art. no. 95. DOI: https://doi.org/10.1186/s13104-024-06749-0
C. M. G. Villame and S. Guirnaldo, "Design and implementation of voice-command controller for fixed-wing unmanned aerial vehicles using automatic speech recognition and natural language processing techniques," Sustainable Engineering and Innovation, vol. 6, no. 2, pp. 199–212, Oct. 2024. DOI: https://doi.org/10.37868/sei.v6i2.id309
Z. Li, "Leveraging AI automated emergency response with natural language processing: Enhancing real-time decision making and communication," Applied and Computational Engineering, vol. 71, pp. 1–6, Aug. 2024. DOI: https://doi.org/10.54254/2755-2721/71/20241629
A. Tundis, H. Kaleem, and M. Mühlhäuser, "Detecting and Tracking Criminals in the Real World through an IoT-Based System," Sensors, vol. 20, no. 13, Jul. 2020, Art. no. 3795. DOI: https://doi.org/10.3390/s20133795
Downloads
How to Cite
License
Copyright (c) 2025 Andrés Doig, Nicolas Abanto, Lenis Wong

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.
