child tracking application using geo fencing …greenskill.net/suhailan/fyp/report/037062.pdf ·...
TRANSCRIPT
CHILD TRACKING APPLICATION USING GEO
FENCING TECHNIQUE
ALIM SOLEHIN BIN TARMIZI
BACHELOR OF COMPUTER SCIENCE
(SOFTWARE DEVELOPMENT)
UNIVERSITI SULTAN ZAINAL ABIDIN
2017
CHILD TRACKING APPLICATION USING GEO FENCING TECHNIQUE
ALIM SOLEHIN BIN TARMIZI
Bachelor of Computer Science (Internet Computing)
Faculty of Informatics and Computing
Universiti Sultan Zainal Abidin, Terengganu, Malaysia
MAY 2017
1
DECLARATION
I hereby declare that this work have been done by myself and no portion of the work
contained in this thesis has been submitted in support of any application for any other degree or
qualification of this or any other university.
____________________
ALIM SOLEHIN BIN TARMIZI
Faculty of Information Science & Technology
UNISZA
Date:
2
CONFIRMATION
This is to confirm that:
The research conducted and the writing of this report was under my supervison.
________________________________
Name : ..................................................
Date : ..................................................
3
ACKNOWLEDGEMENT
Firstly and foremost praised to Allah, for giving me the opportunity to complete my final
year project, Child Tracking Application For Safety Using Geo Fencing Technique for give me
the strength and ability to finish this report. I also would like to express my gratitude to my
supervisor, Dr. Mokhairi bin Makhtar for valuable advice, guidance and ideas given through the
development of research until end of my final year project. In addition, thanks for my friend and
family that give courage and motivation during my research.
Finally, special thanks to all lecturers that correct my research during my presentation on
Child Tracking Application Using Geo Fencing Technique.
4
ABSTRACT
Nowadays child security has become a greater issue. Cases of missing children,
kidnapping them between the ages 14 to 17 years old has increased. Thus, this problem creates a
panic and parents become scared to let their children go anywhere. Furthermore, this becomes
serious issue among the problems in Malaysia. So, this paper presents a mobile application based
solution to aid parents track the real time location of their children. Smartphone become an
important gadget to teenagers and this method will decreased this serious issues. The objective is
to provide an alternative for parents to track their children location more efficient and reliable.
Waterfall methodology will be used to formulate this project as to know what suitable utility will
be added to the application. The scope is parents can acknowledge children location and the
route they take. This application not provided with messaging capability as it function to detect
location. The good things on this application is parents can always real time monitoring their
children location, locate and detect if they going to some other places than they usually do and
can prevent kidnapping when they can locate and tell police about their children location.
Outcome that is expected from this project is parents can save their children from becoming
kidnapping victim before it is too late. As for conclusion, security and awareness of our children
safety is most precious than any other things that and this project hopefully can save children and
create a safer country.
5
ABSTRAK
Pada masa kini, keselamatan kanak-kanak telah menjadi isu yang sangat besar. Kes
kanak-kanak hilang, penculikanang berlaku pada yang berumur di antara 14 hingga 17 tahun
telah meningkat. Oleh itu, masalah ini mewujudkan keadaan panik dan ibu bapa menjadi takut
untuk membiarkan anak mereka ke mana-mana. Tambahan pula, ini menjadi isu yang sangat
serius antara masalah dalam Malaysia. Jadi, projek ini membentangkan penyelesaian berasaskan
aplikasi mudah alih untuk membantu ibu bapa mengesan lokasi masa sebenar anak-anak mereka.
Telefon bimbit menjadi alat yang penting untuk remaja dan kaedah ini akan menurunkan kadar
masalah ini. Objektifnya adalah untuk menyediakan alternatif bagi ibu bapa untuk mengesan
lokasi anak-anak mereka lebih cekap dan cepat. Metodologi waterfall akan digunakan untuk
merangka projek ini untuk mengetahui apa utility yang sesuai dan akan ditambah dalam aplikasi.
Skop ibu bapa adalah boleh mengetahui lokasi anak dan laluan yang mereka ambil. Aplikasi ini
tidak disediakan dengan keupayaan mesej kerana ia berfungsi untuk mengesan lokasi. Kelebihan
aplikasi ini adalah ibu bapa boleh sentiasa memantau lokasi anak-anak mereka, mencari dan
mengesan jika mereka pergi ke beberapa tempat-tempat lain daripada mereka biasanya pergi dan
boleh mencegah penculikan apabila mereka boleh mencari dan memberitahu polis mengenai
lokasi anak-anak mereka dengan segera. Hasil yang dijangka daripada projek ini adalah ibu bapa
boleh menyelamatkan anak-anak mereka daripada menjadi mangsa penculikan sebelum ia
terlambat. Sebagai kesimpulan, keselamatan dan kesedaran tentang kanak-kanak adalah perkara
yang paling berharga dan projek ini diharap dapat menyelamatkan kanak-kanak dan mewujudkan
negara yang lebih selamat.
6
TABLE OF CONTENT
DECLARATION 1
CONFIRMATION 2
ACKNOWLEDGEMENT 3
ABSTRACT 4
ABSTRAK 5
TABLE OF CONTENT 6
DIAGRAM LIST 8
CHAPTER 19 INTRODUCTION 9
1.1 OVERVIEW 9
1.2 PROBLEM STATEMENT 12
1.3 PROJECT OBJECTIVES 13
1.4 PROJECT SCOPE 13
1.4.1 User Scope 14
1.4.2 System Scope 14
1.4.3 Device Scope 14
1.5 LIMITATION OF WORK 15
1.5.1 Not provide online messaging and call capabilities 15
1.5.2 Mobile phone is shutdown 15
1.6 SUMMARY 16
CHAPTER 2 LITERATURE REVIEW 17
2.1 INTRODUCTION 17
2.2 GLOBAL POSITIONING SYSTEM 19
2.3 ANDROID OPERATING SYSTEM 21
2.4 GEO FENCING 22
2.5 SUMMARY OF LITERATURE REVIEW 24
1. Android Parental Tracking 26
2. Child Tracking System on Mobile Terminal 27
3. GPS and SMS-Based Child Tracking System Using Smart Phone 28
7
4. Child Tracking Application Using Geo Fencing Technique 28
2.6 SUMMARY 29
CHAPTER 3 METHODOLOGY 30
3.1 INTRODUCTION 30
3.2 SYSTEM DEVELOPMENT LIFE CYCLE (SDLC) 31
3.3 SYSTEM DEVELOPMENT METHODOLOGY/SOFTWARE 32
3.3.1 Initial Planning Phase 32
3.3.2 Planning 32
3.3.3 Analysis 32
3.3.4 Design 33
3.3.5 Implementation 33
3.4 SOFTWARE AND HARDWARE REQUIREMENT 33
3.4.1 Hardware Requirement 34
3.4.2 Software Requirement 34
3.5 SUMMARY 35
3.6 INTRODUCTION 36
3.7 CONTEXT DIAGRAM 37
3.8 DATA FLOW DIAGRAM (DFD) 38
3.9 ENTITY RELATIONSHIP DIAGRAM (ERD) 40
3.10 DATABASE DESIGN SPECIFICATION 41
3.11 FRAMEWORK 42
3.12 INTERFACE DESIGN 45
8
DIAGRAM LIST
Page Numbers
Chapter 2: LITERATURE REVIEW
Table 2.1: Summary of literature review 24
Table 2.1: Summary of literature review 25
Chapter 3: Methodology
Figure 3.1: System Development Life Cycle 31
Table 3.1: Hardware Requirement 34
Table 3.2: Software Requirement 34
Figure 3.2: Context Diagram 37
Figure 3.3: Data Flow Diagram 38
Figure 3.4: Entity Relationship Model 39
Table 3.3: Table Parent 41
Table 3.4: Table Children 41
Table 3.5: Table Location 41
Figure 3.5: Framework 42
Figure 3.6: Tracking Architecture 43
Figure 3.7: Geo Fencing Architecture 44
Figure 3.8: Login Interface 45
Figure 3.9: Register Interface 46
Figure 3.10: Main Menu Interface 47
Figure 3.11: Add Child Interface 48
Figure 3.12: Settings Interface 49
9
CHAPTER 1
INTRODUCTION
1.1 OVERVIEW
For thousands of years, humans found their way by looking to the sky. Sailors used the
constellations, sun, and moon to navigate to distant shores. Today, all that's needed is a device
called a GPS receiver. GPS stands for Global Positioning System, and it lets us know where we
are and where we are going anywhere on Earth.
We still need objects in the sky to know where we are and how we get to other places, but
now we use satellites instead of stars. Over 30 GPS navigation satellites are whizzing around the
world, orbiting at an altitude of 12,000 miles, to help us find our way. The very first GPS system
was developed in the 1960s to allow ships in the US Navy to navigate the oceans more
accurately. The first system had five satellites and allowed ships to check their location once
every hour. Today, portable Navigation device devices can give drivers their precise location to
within a few meters, which is accurate enough to navigate roadways. In pursuing current
modernization, technology has successfully facilitated a variety in our daily life activities.
10
GPS satellites are owned by the United States government. A few other countries are
working on new systems of their own, but right now the U.S. system is the only one used widely
around the world. The way how it works is a GPS receiver determines its location by analyzing
signals it receives from GPS satellites orbiting around Earth. Signals from satellites that are
farther away take longer to reach the GPS receiver. Distances to several satellites are calculated
based on the amount of time their signals took to reach the receiver. After determining its
distance from at least three satellites, the GPS receiver can calculate its own position using
triangulation.
One of the most amazing found in technology is Geo Fencing technique that nowadays
mostly used in security national defense. It is a feature in software program that uses the global
positioning system (GPS) or radio frequency identification (RFID) to define geographical
boundaries. While the technology is growing rapidly, the technique also now used in locate a
location of someone or vehicle that can be used for public.
Meanwhile, the Child Tracking Application for Safety Using Geo Fencing Technique is a
mobile application that developed to help track the problem of the missing children that occur
now days due to the unpredictable crime. Deputy Home Minister Datuk Masir Kujat said "Based
on police statistics, a total of 2015 children was reported missing in 2014, 1,782 cases reported
in 2015 and 140 cases was reported as of Jan this year," during Question Time with media(THE
STAR ONLINE) .
11
This application is an android based application developed mainly for parents to pinpoint
and monitor their child location so that parents can always monitor their child location. Next, it is
real-time monitoring system embed in this application for better user experience. This
application also will alert parents if child out of parameter which already has been set by parents
using mobile phone.
12
1.2 PROBLEM STATEMENT
A total of 3,937 children, aged between 6 to 18 years old, have been reported missing
between 2014 until Jan 2015 with no chance of finding them back.
The problem is parents had no alternative on how to monitor their own kids. From this,
the children realize that parents did not know their where about thus the children act on their own
to go wherever they want. This could lead them easily become prey to kidnapping crime because
the children is own their own outside their parents supervision.
Furthermore, no fast action can be taken to prevent kidnapping before it too late for
parents to save their child. Parents can only call the authority and report about their missing
children without any possible lead about the location. This actually makes the investigation or
the process to locate and finding their children difficult thus time-consuming. An early
preparation or security measure is needed to avoid this kind of problem from occur.
13
1.3 PROJECT OBJECTIVES
Basically, the objective of this system is to develop new system that replace the manual and
older system that fully depend on command line and request response system, which eventually
not efficient in today technology environment. The objectives of this project as follows:
1. To propose an alternative for parents to track their children location more efficient
and reliable using geo fencing
2. To design an application that alert parents about their own child movements
3. To develop a system that monitoring the child location besides respond to an alert
1.4 PROJECT SCOPE
The project scopes for this project are identified to make the development process more
systematically and easier through the entire development phase. Project scope as below:
14
1.4.1 User Scope
Parents
o User must first register account before using the application
o User must insert children details before setting the application
o Add children account for parents that have more than one child
o Monitor child movement
1.4.2 System Scope
System
o Android based system and not support IOS
o Real-time data monitoring
1.4.3 Device Scope
Device
o Android phone only and not support Apple product
15
1.5 LIMITATION OF WORK
Several limitations had been decided so that this system would not lead to process that
waste of time. These limitations in conducting this study are:
1.5.1 Not provide online messaging and call capabilities
This application will not have the capabilities for messaging and call capabilities. It will
focus only on monitoring real time and sending an alert to parent when their child is out from
boundary. As my project name, the application will only have capabilities to monitor and set
condition for alert thus calls and messaging capabilities will not include like many other tracking
applications.
1.5.2 Mobile phone is shutdown
Shut down or the mobile phone is off neither because of battery or the mobile phone user
do it itself will not allow the application to work. This is because all of the information or the
utility is application based not web based so user can only use it when the mobile phone is one.
16
1.6 SUMMARY
In this chapter, the purpose for this project is to identify problems and find a ways to
overcome the problems that happen in our environment. Furthermore, this project functionality
and it limit were already identified thus will make the development phase more clearly and much
easier.
17
CHAPTER 2
LITERATURE REVIEW
2.1 INTRODUCTION
A literature review discusses published information in a particular subject area, and
sometimes information in a particular subject area within a certain time period. It can be just a
simple summary of the sources, but it usually has an organizational pattern and combines both
summary and synthesis. People can use it as a guideline or a sample to upgrade or to develop a
new better system compared to the old one.
The main objective of literature review is:
It presents the literature in an organize way.
It surveys the literature in your chosen area of study.
It synthesis the information in that literature into a summary.
It critically analyses the information gathered by identifying gaps in current knowledge;
by showing limitations of theories and points of view; and by formulating areas for
further research and reviewing areas of controversy.
18
Nowadays, there are many ways technologies and technique can be used to monitor and
track movement from afar. The efficiency depend on the technology used and what environment
to use so that the decision making is perfect and suitable. Furthermore, cost, coverage, and any
other factor plays an important role to the success of the project. Below are some of the research
and development that has been carried out by certain developer and also different approach
between them to complete their project.
19
2.2 GLOBAL POSITIONING SYSTEM
It is a worldwide navigation satellite system that provides geo-location and time
information to a GPS receiver anywhere on or near the Earth where there is an unobstructed line
of sight to four or more GPS satellites. It operates independently of any telephonic or internet
reception, though these technologies can enhance the usefulness of the GPS positioning
information. The Global Positioning System (GPS) was conceived in the 1970s but not fully
operational (a minimum constellation of 24 satellites) until 1995. Receivers were close to five-
time as expensive to operate in the early days as now. The United States Navy conduct an
experiment in the mid 1960 to track US submarine carrying nuclear missiles.
In the early 1970's, the Department of Defense (DoD) wanted to ensure a robust, stable
satellite navigation system would be available. The GPS project was launched in the United
States in 1973 to overcome the limitations of previous navigation systems, integrating ideas from
several predecessors, including a number of classified engineering design studies from the 1960s.
Embracing previous ideas from Navy scientists, the Department of Defense decided to use
satellites to support their proposed navigation system. DoD then followed through and launched
its first Navigation System with Timing and Ranging (NAVSTAR) satellite in 1978. From
NASA website, they say that the 24 satellite system became fully operational in 1993.
A GPS receiver's job is to locate four or more of these satellites, figure out the distance to
each, and use this information to deduce its own location. This operation is based on a simple
20
mathematical principle called trilateration. Trilateration in three-dimensional space can be a little
tricky, so we'll start with an explanation of simple two-dimensional trilateration.
To determine the location of the GPS satellites two types of data are required by the GPS
receiver: the almanac and the ephemeris. This data is continuously transmitted by the GPS
satellites and your GPS receiver collects and stores this data.
The almanac contains information about the status of the satellites and approximate
orbital information. The GPS receiver uses the almanac to calculate which satellites are currently
visible. The almanac is not accurate enough to let the GPS receiver get a fix. If the GPS receiver
is new, or has not been used for some time, it may need 15 minutes or so to receive a current
almanac. In older GPS receivers, an almanac is required to acquire the satellites, but many newer
models are able to acquire the satellites without waiting for the almanac.
To get a fix, your GPS receiver requires additional data for each satellite, called the
ephemeris. This data gives very precise information about the orbit of each satellite. Your GPS
receiver can use the ephemeris data to calculate the location of a satellite to with a metre or two.
The ephemeris is updated every 2 hours and is usually valid for 4 hours. If your GPS receiver has
been off for a while, it may take up to several minutes to receive the ephemeris data from each
satellite, before it can get a fix.
21
2.3 ANDROID OPERATING SYSTEM
Android was founded in Palo Alto, California in October 2003 by Andy Rubin, Rich
Miner, Nick Sears and Chris White who work at “Google” to develop. It is an open source
mobile operating system and designed primarily for touchscreen mobile devices such
as smartphones and tablets. In 2005, Android was purchased by the GOOGLE for 50 million.
The open handset alliance, a group of several companies was formed in5 November 2007 and
Android beta released on 12 November 2007.
Android's user interface is mainly based on direct manipulation, using touch gestures that
loosely correspond to real-world actions, such as swiping, tapping and pinching, to manipulate
on-screen objects, along with a virtual keyboard for text input. Because it is developed as a
Google product, Android users are given the opportunity to link their mobile device to other
Google products, such as cloud storage, email, and video services.
All Android phones share some common features. They are all smartphones, meaning
that they can connect to Wi-Fi, have touchscreens, can access a range of mobile apps, and can be
customized. The similarities stop there, however, because any manufacturer can produce a
device with its own "flavor" of Android, stamping its look and feel over the basics of the OS.
22
2.4 GEO FENCING
A geo-fence also known as geozone, a virtual perimeter for a real-world geographic area
that uses the global positioning system (GPS). A geo-fence could be dynamically generated as in
a radius around a store or point location, or a geo-fence can be a predefined set of boundaries.
For geo-fencing to work correctly, usually an application will need to have an integrated SDK or
plugin.
The use of a geo-fence is called geo-fencing, and one example of usage involves a
location-aware device of a location-based service (LBS) user entering or exiting a geo-fence.
This activity could trigger an alert to the device's user as well as messaging to the geo-fence
operator. This info, which could contain the location of the device, could be sent to a mobile
telephone or an email account.
Geo-fencing also combines awareness of the user's current location with awareness of the
user's proximity to locations that may be of interest. To mark a location of interest, we may
specify its latitude and longitude. To adjust the proximity for the location, add a radius. The
latitude, longitude, and radius define a geo-fence, creating a circular area, or fence, around the
location of interest.
While geo-fencing has historically relied on cellular data, modern geo-fencing combines
has moved to using GPS and Wifi data more. This allows users to opt-in for things like location
23
services and can receive push notifications to keep updated. For instance, while active geo-
fencing can let you track individual customers by latitude and longitude through GPS by
contacting a satellite, it consumes so much power that it devastates the user's battery. By
contrast, passive geo-fencing works in the background and consumers very little power, but it
gives less data about the customer and gives fewer opportunities to reach out to customers and
gather data.
Geo-fencing used widely in daily life like in other countries such as used in applications
with locationized firearms can allow those firearms to fire only in locations where firing is
permitted and used in human resource department to monitor employees working in special
locations especially those doing field works. Using a geo-fencing tool, an employee is allowed to
log his attendance using a GPS-enabled device when within a designated perimeter.
Geo-fencing, in a security strategy model, provides security to wireless local area
networks. This is done by using predefined borders, example an office space with borders
established by positioning technology attached to a specially programmed server. The office
space becomes an authorized location for designated users and wireless mobile devices.
24
2.5 SUMMARY OF LITERATURE REVIEW
Author Title Year Model Advantageous Disadvantages
Tejal D.
Katore
Android
Parental
Tracking
2015 i) Sms
Messaging
request
Allow the
system to work
without the
need of internet
connection
Repeatedly
need to send
request in order
to check
location
Rohit N. Bhoi Child
Tracking
System on
Mobile
Terminal
2015 i) Use GPS and
GSM
ii) Use ARM &
Board and GSM
Board
iii) Microphone
sensor
i) System
immediately
react to
application if
heard cry voice
ii) User friendly
iii) No battery
backup is
required
i) High cost to
setup.
ii) Setup of the
network is
complex
Al-Mazloum GPS and
SMS-
Based
Child
2013 i) Android
based solution
ii) GPS and
GSM service to
i)Application
not need an
internet
connection
Location on the
map not
updated
25
Tracking
System
Using
Smart
Phone
detect the
location.
iii) Implement
the use of Short
Messaging
System(SMS)
ii) Works on
mobile phone
that does not
support the
GPRS,2G and
3G.
iii) Parents
control all of
the functions of
the application
Muhammad
Syahir
Child
Tracking
Application
Using Geo
Fencing
Technique
2015 i) Android
based solution
ii) Using Geo
Fencing
technique
iii) Using GPS
i) Real time
application
ii) Show
location on map
iii) Save cost
i) Cannot add
multiple child
user
26
1. Android Parental Tracking
This paper presents a mobile application based solution to aid parents to track the real
time location of the children. Smartphones today provide the facility of location service and most
of kids today use mobile phones. The application uses the GPS and SMS services found in
Android phones. It allows the parents to get their child’s location on Google Maps and also their
browsing history. The main responsibility of parents device is to send a request location SMS to
child’s device to get location of child while the responsibility of child’s device is to reply the
GPS position to the parents device upon request. A program called Listener will be executed at
the backend. The communication between the parent side and the child applications is done
using Short Message Service (SMS). SMS offers the system unique features. It will allow the
system to work without the need of internet connection thus allows the application to be
implemented on smart phones that don’t support GPRS. First is the parent side which acts as a
server for the system though it is not actually a server. It is basically an Android phone owned by
the parent of the child to be tracked. The parent’s side that is server uses SMS for
communicating with the child and maps to view the location of the child on a map. Second is the
child side which acts as a client side for the system. The child side is also another Android smart
phone but owned by the child to be located. The child side uses SMS for communicating with the
parent side and location providing services that is GPS or Network, to get the respective
locations of the child in form of coordinates.
27
2. Child Tracking System on Mobile Terminal
The proposed system includes a child module which have GPS, GSM, and ARM7 and
voice playback circuit and parent module which includes mobile phone (which supports internet
connectivity) for getting the information about the missed child on periodical basis. Addition to
the proposed system is that parents no need to continuously monitor the location of child, if child
is going outside of define area then alert message will be given to parents. Also if child is crying
then also alert message will be send to parents. Child module has one panic switch, with the help
of which child can alert parents. The child tracking system will track movement of their child
while going to school and coming from school to home. Also it will alert the parents if their child
is crying and if child requires emergency help through the text message. In this tracking system
particular area will be defined by using geo-fencing. This system is using autonomous clustering
technique. It consists of tags which collect the information of child group, each child is given one
android terminal and server which stores tracking information. Tag consist of wireless LAN
which construct a mesh network and also receives and transmit the information regarding to
position of child from one tag to another and finally given to computer server which is located at
school control room. This system will alert the school that one of the children is missing but its
fails to tell where the child is at the current moment. Also it does not concentrate whether child is
crying or not.
28
3. GPS and SMS-Based Child Tracking System Using Smart Phone
Combination of two components of GPS satellites and GSM telephony service are used
in order to develop this system. Parents have to send a request to the child side to retrieve the
child location and parents will get the information by map display. On the other hand,
application on the child side will gather information needed to locate the child smartphone. This
process will be done using Short Messaging System (SMS). This is one of the advantages of this
system that will not require the internet connection thus allows this system implemented on
smart phone that not support GPRS, 2G or 3G.
4. Child Tracking Application Using Geo Fencing Technique
This project objective is to control the activities and the child movement. It is design for
parent to pinpoint their child location and position before going to the authority to make report.
The next objective is to test on how the application will function in tracking and control the
activities of child. Two components used in this application is Global Positioning System and
Geo-Location techniques are used in order to track the child mobile phone by using their parent
cell phone. Furthermore, this application is an Android based application and parent also has the
right to control allowed area using the geo fence method. A notification is pop up to the parent
mobile phone if their child is out from the boundaries created by the parents.
29
2.6 SUMMARY
From this chapter, the main function and tools needed of the project had been explained
such as the Global Positioning System and Geo Fencing technique on how it can be used and
enhance the application. Moreover, some of the analysis from related work also is used to
develop this project thus give a clear picture of more compatible to mobile phone and suitable
new application in this era to counter child missing problems.
30
CHAPTER 3
METHODOLOGY
3.1 INTRODUCTION
This chapter will explain the specific details on the methodology being used in order to
develop this project. In order to make sure the project is in the right path, methodology plays an
important role as a guide for the project to complete and working well as plan. There is different
type of methodology that is used for different type of application. It is important to choose the
right and suitable methodology for the development of an application thus it is necessary to
understand the application functionality itself.
31
3.2 SYSTEM DEVELOPMENT LIFE CYCLE (SDLC)
Figure 3.1: System Development Life Cycle
For the project methodology, the System Development Life Cycle had been chosen. Each
development may differ due to user requirements from time to time. This methodology is
common and widely used to develop, maintain and replace older system.
Planning
Analysis
Design
Implementation
32
3.3 SYSTEM DEVELOPMENT METHODOLOGY/SOFTWARE
For the objective of the project to be achieved, a well plan and suitable method choose is
very important. System Development Life Cycle has been chosen as the methodology for this
project.
3.3.1 Initial Planning Phase
This phase started by the proposed title of the project to the supervisor and rough
discussion on the project specific to add a new utility or upgrade some features on the old
system. All of this is planned by a given period of time.
3.3.2 Planning
Before continue to the next step in develop a system, system requirements are identified
and the development of the system based on the requirement so that the development of the
system follow the project flow. Geo Fencing has been decided as the technique in this project as
the technique is the most suitable for this kind of application.
3.3.3 Analysis
In this phase, the system requirements are studied and had been structured for the system
to work well with the Geo Fencing technique so that there is no problem in the future.
Furthermore, all of the requirements that has already analyze are being used as the project
guideline in order to meet the user requirements. Because of that, a simple interface that suitable
33
to the use of Geo Fencing technique and the user requirement is design to make the application is
user friendly and ease of use.
3.3.4 Design
The design of the interface will cover the map, user login and many more. This phase is
also important to make the application look simple but nice for the user. Developer must
remember that the development of the application is user based requirement not from the
developer itself. Other than that, the interface should be more user friendly look than the old
system. The navigation of the system also will be more neat and nice.
3.3.5 Implementation
For the implementation phase, this is where the analyzed and the phase before this are
implemented. The system is coded, installed and tested to implement what has been agreed
before to complete the system. The project will develop as an open source application and
anyone can use and get the system.
3.3 SOFTWARE AND HARDWARE REQUIREMENT
Hardware and software is an important component the development in a system. The
specification of the two components specifications should be identified to ensure the system
functionality working without any conflict, either in term of the hardware or the software. Table
below shows the software and hardware used in order to develop the system.
34
3.4.1 Hardware Requirement
No Hardware Description
1 Notebook Intel® Core™ i5-5200U CPU
@ 2.20GHz 2.20 GHz
2 Mobile Phone Xiaomi Redmi Note 3 Pro
3 Printer Print the report
4 Flash Drive Used to back up the project
Table 3.1: Hardware Requirement
3.4.2 Software Requirement
No Software Description
1 MySQL System database application
2 Android Operating system to run the
application
3 Android Studio To develop the application
4 Xampp As the database
5 Notepad++ Connection with the database
Table 3.2: Software Requirement
35
3.5 SUMMARY
In conclusion, in this chapter there are the critical development processes that need to be
done carefully. As mention before, the chosen software and hardware were to make sure the
process smoothly work without any upcoming problems.
36
SYSTEM DESIGN AND MODELLING
3.6 INTRODUCTION
In this chapter, the flow of the system application is created to enable developer
understand the whole application itself before continue into the next phase. This would create a
clear path to ease of work according to the specific design and model that already made to help
the development process.
37
3.7 CONTEXT DIAGRAM
Figure 3.2: Context Diagram
Based on this context diagram, user can register to the application. After that, user can
add his or her username and password before login to the main menu of the system. Besides, user
also can add his or her child details in the system. Moreover, user can view, update and delete
list of her or his child list that had been add before. Next, the application will show the location
details thus user can view the location of his or her child.
38
3.8 DATA FLOW DIAGRAM (DFD)
Figure 3.3: Data Flow Diagram (DFD)
39
From the Data Flow Diagram (DFD) above, User will register into the application by
insert the user details such as username and password. Then, the details will be stored into the
user database details. Authentication happens when user want to login to the system, application
will validate if the username and password entered are valid or not. After login, the next interface
is the main menu of the application where user can add child details where the details also will
be stored into the database but in child database. Moreover, user can also view child location on
the application by selecting which child user want to view. Child location is shows differently
based on which child the users choose from the list of child.
40
3.9 ENTITY RELATIONSHIP DIAGRAM (ERD)
Figure 3.3: Entity Relationship Diagram
41
3.10 DATABASE DESIGN SPECIFICATION
Attribute Description Type Size Remark
parentID Parent
Identification
Varchar 12 PK
username Parent Name Varchar 50 NN
userPassword Parent Password Varchar 10 NN
Table 3.3: Parent table
Attribute Description Type Size Remark
childrenID Children
Identification
Varchar 12 PK
childrenName Children Name Varchar 50 NN
Table 3.4: Children table
Attribute Description Type Size Remark
locationID Location
Identification
Varchar 12 PK
childrenID Children Name Varchar 50 FK
parentID Parent
Identification
Varchar 12 FK
Table 3.5: Location table
42
3.11 FRAMEWORK
Figure 3.5: Framework
Receiving location request
Give location details
Add child number and detail
Set the child location
Give location details
View location
Add details
Application
Database
User Child
Track location
GPS satellite
43
Figure 3.6: Tracking Architecture
1) Parent sent a request to track
child phone number
5) Receive location details
4) Reply location details
2) Receive location request 3) Tracking
44
Figure 3.7: Tracking Architecture
45
3.12 INTERFACE DESIGN
Figure 3.8: Login Interface
46
Figure 3.9: Register Interface
47
Figure 3.10: Main Menu Interface
48
Figure 3.11: Add Child Interface
49
Figure 3.12: Settings Interface