nur laili nasuha bt khalid

65
ANTI-THEFT VEHICLE SECURITY USING GPS NUR LAILI NASUHA BT KHALID BACHELOR OF COMPUTER SCIENCE (INTERNET COMPUTING) WITH HONOURS FACULTY OF INFORMATICS AND COMPUTING UNIVERSITI SULTAN ZAINAL ABIDIN 2020 i

Upload: others

Post on 05-Jan-2022

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: NUR LAILI NASUHA BT KHALID

ANTI-THEFT VEHICLE SECURITY USING GPS

NUR LAILI NASUHA BT KHALID

BACHELOR OF COMPUTER SCIENCE

(INTERNET COMPUTING) WITH HONOURS

FACULTY OF INFORMATICS AND COMPUTING

UNIVERSITI SULTAN ZAINAL ABIDIN

2020

i

Page 2: NUR LAILI NASUHA BT KHALID

DECLARATION

I hereby declare that the report of the project titled Anti-Theft Vehicle Security Using GPS is based

on my own investigations and based on information from sources that stated. This dissertation is

submitted to the Faculty Informatics and Computing, University Sultan Zainal Abidin as partial

fulfilment of the requirements for the Bachelor of Computer Science (Internet Computing) with

Honours. I also declare that my work was never be produced by any student of University Sultan

Zainal Abidin.

…………………………………….

Name : Nur Laili Nasuha Bt Khalid

Date :

ii

Page 3: NUR LAILI NASUHA BT KHALID

CONFIRMATION

I have read this report and in my point of view, this project report was prepared and submitted by

Nur Laili Nasuha Bt Khalid (BTCL 18051532) and has been satisfactory in terms of scope, quality

and presentation as partial fulfilment of the condition to be awarded as Bachelor of Computer

Science (Internet Computing) with Honours. I also confirm that the research conducted and the

writing of this report was under my supervisor.

………………………………………..

Name : Prof. Madya Ts. Dr. Mokhairi

Bin Makhtar

Date :

iii

Page 4: NUR LAILI NASUHA BT KHALID

DEDICATION

In the name of Allah S.W.T, Most Gracious, Most Merciful. This final year project, Anti-Theft

Vehicle Security Using GPS is dedicated to my beloved mother and father who is giving me a lot

of moral support to complete this project. also, to my supervisor, Prof. Madya Ts. Dr. Mokhairi

Bin Makhtar that always guides me to complete my final year project. My sincere thank you goes

to all lecturers and Bachelor of Computer Science (Internet Computing) group members who

always help me in many ways to complete this project. Lastly, this project was dedicated to the

Faculty Informatics and Computing of University Sultan Zainal Abidin.

iv

Page 5: NUR LAILI NASUHA BT KHALID

ABSTRACT

Nowadays, a lot of cars have been stolen in the world. Once the vehicle is being stolen, owner

cannot track their vehicle. They do not know where to find the vehicle and the opportunity to get

their vehicle back is very low. It makes so hard to track the vehicle when there is no evidence.

Hereby, this project aims to develop Anti-Theft Vehicle Security using GPS, GSM that will be

more useful for all owner vehicle and more reliable. This system will track and monitor the

vehicle’s location. For this time being, vehicle tracking system has been nominated as one of the

best tracking systems for the losses of vehicle. Generally, GPS tracking uses a system of satellites

orbiting earth to find the actual location. The main objective for this project is to develop a device

to control and prevent vehicle from stolen. Even the vehicle they stole, it can be tracked by using

Global Positioning System (GPS) for navigating through a large building are clear. ATVS can be

divided into two parts which are hardware and software development. The hardware development

includes the GSM modem and GPS receiver. This project will use a GSM as anti-theft application

which is to disable and enable the vehicle engine using system if the vehicle gets stolen integrated

with Google Maps. The GSM modem, GPS receiver will work as locator system. This project being

use Agile Model Methodology to provide software development systems within the specified time

frame and the allocated budget. It is an iterative and incremental approach that focuses on the

involvement of the user. In conclusion, it will increase the chances of recovering the car intact. In

addition to tracking cars in real time and anywhere, the proposed solution aims at providing anti-

theft features such as live tracking, tracing and proximity alerts as well as additional information

about the vehicle.

Keyword: Anti-Theft, GPS, GSM, SMS, Mobile Apps, Google Maps, tracking, reliable

v

Page 6: NUR LAILI NASUHA BT KHALID

ABSTRAK

Pada masa kini, banyak kereta telah dicuri di dunia. Sebaik sahaja kenderaan itu dicuri, pemilik

tidak boleh mengesan kenderaan mereka. Mereka tidak tahu di mana untuk mencari kenderaan

dan peluang untuk mendapatkan kenderaan mereka adalah sangat rendah. Ia membuat begitu

sukar untuk mengesan kenderaan apabila tiada bukti. Dengan ini, projek ini bertujuan untuk

membangunkan Keselamatan Kenderaan Anti Kecurian menggunakan GPS, GSM dan Sistem yang

akan lebih berguna untuk semua kenderaan pemilik dan lebih dipercayai. Sistem ini akan

mengesan dan memantau lokasi kenderaan. Buat masa ini, sistem pengesanan kenderaan telah

dicalonkan sebagai salah satu sistem penjejakan terbaik untuk kerugian kenderaan. Umumnya,

pengesanan GPS menggunakan sistem satelit yang mengorbit bumi untuk mencari lokasi sebenar..

Objektif utama projek ini adalah untuk membangunkan peranti untuk mengawal dan mencegah

kenderaan dari dicuri. Walaupun kenderaan mereka dicuri, ia boleh dijejaki dengan menggunakan

Sistem Penentududukan Global (GPS) untuk menavigasi melalui sebuah bangunan besar yang

jelas. ATVS boleh dibahagikan kepada dua bahagian iaitu perkakasan dan pembangunan perisian.

Pembangunan perkakasan termasuk modem GSM dan penerima GPS. Projek ini akan

menggunakan GSM sebagai aplikasi anti-kecurian yang melumpuhkan dan membolehkan enjin

kenderaan menggunakan sistem jika kenderaan itu dicuri terintegrasi dengan Peta Google.

Modem GSM dan penerima GPS akan berfungsi sebagai sistem pencari. Projek ini menggunakan

Metodologi Model Agile untuk menyediakan sistem pembangunan perisian dalam tempoh masa

yang ditetapkan dan belanjawan yang diperuntukkan. Ia merupakan pendekatan berulang dan

bertambah yang memberi tumpuan kepada penglibatan pengguna. Sebagai kesimpulan, ia akan

meningkatkan peluang memulihkan kereta secara utuh. Selain mengesan kereta dalam masa nyata

dan di mana saja, penyelesaian yang dicadangkan ini bertujuan menyediakan ciri-ciri anti-

kecurian seperti penjejakan, pengesanan dan peringatan jarak dekat serta maklumat tambahan

mengenai kenderaan.

Kata kunci: Anti-Kecurian, GPS, GSM, SMS, Aplikasi Mudah Alih, Peta Google, pengesanan,

boleh dipercayai

vi

Page 7: NUR LAILI NASUHA BT KHALID

TABLE OF CONTENT

DECLARATION ii

CONFIRMATION iii

DEDICATION iv

ABSTRACT v

ABSTRAK vi

TABLE OF CONTENT vii

LIST OF FIGURES xi

LIST OF TABLES xii

LIST OF ABBREVIATIONS xiii

CHAPTER PAGE

1 INTRODUCTION

1.0 Introduction 1

1.1 Project Background 1-2

1.2 Problem Statement 2

1.3 Project Objectives 3

1.4 Project Scope 3

1.4.1 Owner’s vehicle or third party 3

1.4.2 Administrator 4

1.5 Limitation of Work 4

1.5.1 Internet Connection 4

1.5.2 Environmental Conditions 5

1.5.3 Battery Might Drain Out 5

vii

Page 8: NUR LAILI NASUHA BT KHALID

1.6 Expected Result 6

1.7 Summary 6

2 LITERATURE REVIEW

2.0 Introduction 7

2.1 Criteria from Previous Study (Existing Application) 8

2.1.1 GPS Vehicle Tracking System 8

2.1.2 Trackimo 9

2.1.3 Find My Car- GPS Navigation 10

2.1.4 Car GPS Mileage Tracker App 11

2.2 Research Comparison (Existing Application) 12-13

2.3 Research Comparison (Articles) 14

2.4 Location Tracking Requirements 15

2.4.1 Global Positioning System (GPS) 15-16

2.4.2 Laravel 16-17

2.4.3 Google Maps 17

2.4.4 Blynk 18

2.5 Summary 18

3 METHODOLOGY

3.0 Introduction 19

3.1 Methodology Review 19

3.1.1 Iteration 1 (Planning) 20

3.1.2 Iteration 1 (Analysis & Design) 20

3.1.3 Iteration 1 (Implementation) 21

viii

Page 9: NUR LAILI NASUHA BT KHALID

3.1.4 Iteration 1 (Testing & Evaluation) 21

3.1.5 Iteration 1 (Planning) 21

3.1.6 Iteration 2 (Design) 21

3.1.7 Iteration 2 (Implementation) 22

3.1.8 Iteration 2 (Testing & Evaluation) 22

3.2 System Requirements 22

3.2.1 Software Requirement 22-23

3.2.2 Hardware Requirement 23

3.3 System Design 24

3.3.1 Framework 24

3.3.2 Use Case Diagram 25

3.4 Process Design 26

3.4.1 Context Diagram (CD) 26

3.4.2 Data Flow Diagram (DFD)- Level 0 27

3.4.3 Data Flow Diagram (DFD)- Level 1 28

3.4.3.1 Manage Administrator Profile 28

3.4.3.2 Manage User Information 29

3.4.3.3 Manage GPS Tracker Information 30

3.5 Data Model 31

3.5.1 Entity Relationship Diagram (ERD) 31

3.5.2 Data Dictionary 32-33

3.6 Summary 34

ix

Page 10: NUR LAILI NASUHA BT KHALID

4 IMPLEMENTATION AND TESTING

4.0 Introduction 35

4.1 Interface Design 35

4.1.1 Web Based Interface 36-44

4.1.2 App Based Interface 45

4.2 Summary 46

5 CONCLUSION

5.0 Introduction 47

5.1 Project Constraints 47-48

5.2 Contribution of Projects 48

5.3 Future Project 48

5.4 Summary 48

REFERENCES 49-50

APPENDIX 51-52

x

Page 11: NUR LAILI NASUHA BT KHALID

LIST OF FIGURES

FIGURE PAGE

1.1 GPS Vehicle Tracking System 8

1.2 Trackimo 9

1.3 Find My Car 10

1.4 Car GPS Mileage Tracker App & Vehicle Tracking 11

1.5 Global Positioning System (GPS) 15

1.6 Laravel 16

1.7 Google Maps 17

1.8 Blynk 18

2.1 Agile Model 20

2.2 Framework 24

2.3 Use Case Diagram My-Tracker 25

2.4 Context Diagram (CD) 26

2.5 Data Flow Diagram (DFD) - Level 0 27

2.6 Administrator Profile 28

2.7 User Profile 29

2.8 GPS Tracker Information 30

2.9 Entity Relationship Diagram (ERD) 31

2.10 Login Interface 32

2.11 Proximity Alert Interface 33

2.12 Global Positioning System (GPS) 34

xi

Page 12: NUR LAILI NASUHA BT KHALID

LIST OF TABLES

TABLE PAGE

2.1 Comparison Existing Application 12-13

2.2 Comparison Articles 14

3.1 Software Requirement 22-23

3.2 Hardware Requirement 24

3.3 Data Dictionary For Account 32

3.4 Data Dictionary For Vehicle 32

3.5 Data Dictionary For User 33

3.6 Data Dictionary For GPS Tracker 33

3.7 Data Dictionary For Proximity Alert 33

xii

Page 13: NUR LAILI NASUHA BT KHALID

LIST OF ABBREVIATIONS / TERMS / SYMBOLS

GPS Global Positioning System

GSM Global System for Mobile Communication

ERD Entity Relationship Diagram

CD Context Diagram

DFD Data Flow Diagram

xiii

Page 14: NUR LAILI NASUHA BT KHALID

CHAPTER 1

INTRODUCTION

1.0 INTRODUCTION

The development of Anti-Theft Vehicle Security using GPS called i-Tracker is designed

and developed to accommodate the needs of today’s where a lot of vehicle have been stolen

in the world. It is a very useful device and able to be used by anybody with the need to

track their vehicle. This chapter will briefly discuss the general background of this project,

its concept, the problem statement, objectives and scope.

1.1 PROJECT BACKGROUND

Vehicle theft has become a matter of concern these days. In most of the cases the vehicle which

is stolen is not traceable by the owner of the vehicle. So, there is a demand for better security

system with developed ‘Anti-Theft Vehicle Security using GPS’ called i-Tracker to

accommodate the needs of today’s where a lot of vehicle have been stolen in the world.

Development of Anti-Theft Vehicle Security using GPS is a project that contains electronic

device installed on a vehicle so that the vehicle can be detected by the owner or a third-

1

Page 15: NUR LAILI NASUHA BT KHALID

party user. i-Tracker uses Global Positioning System (GPS) to get an accurate reading in term

of latitude and longitude of the vehicle and can be used to locate people or objects inside

buildings, typically via a mobile device such as a smartphone or tablet. The signals from GPS

satellites are available free of cost which enable the GPS receivers to determine the location,

the time, along with the velocity. The tracking sensitivity of GPS receivers is -160dBm and it

allows position coverage in all environments continuously. In addition, GSM modem will be

used to send the position of the vehicle to remote user. The GSM modem transmits the GPS

parameters of the latitude and longitude values whenever the security mode is ON and

whenever there are varying values. Vehicle’s information from GPS and GSM can be viewed

by using a application or Google map on a smartphone.

i-Tracker is commonly can be used by those who want to prevent their vehicle from being

stolen. In some case police can follow the signal emitted by the i-Tracker and locate the

stolen vehicle. Other applications are to know our exact location by a parent with a teen

driver. The existence of i-Tracker then can be used to decrease the insurance cost. It is

because the loss-risk of the vehicle drops significantly.

1.2 PROBLEM STATEMENT

Nowadays, a lot of cars have been stolen in the world. Once the vehicle is being stolen, owner

cannot track their vehicle. They do not know where to find the vehicle and the opportunity to

get their vehicle back is very low. It makes so hard to track the vehicle when there is no

evidence. In this work, we propose the design and implementation of a vehicle tracking anti-

theft security system that will protect, secure vehicles. GSM and GPS can be used to prevent

the vehicle from stolen. The GSM can also be used to enable and disable the vehicle engine.

The GPS receiver are used to identify the vehicle position in term of latitude and longitude and

then forwards to the microcontroller. After that, microcontroller will send an SMS to user with

the help of GSM modem. GPS have proven so effective in tracking and determining the

location of a vehicle or asset over a decade.

2

Page 16: NUR LAILI NASUHA BT KHALID

1.3 PROJECT OBJECTIVES

The main objective for this project is to design and develop a device to prevent vehicle

from stolen. This project includes the research and study on how the GPS receiver and

GSM modem would works. The objectives of this project are:

• To analysis how the web-based work based on the user requirement

• To design a system of a vehicle tracking anti-theft security system that can be

used to prevent the vehicle from stolen using GPS and GSM modem.

• To develop Vehicle Anti-Theft Security System with hardware of GSM and GPS

modem and gain programming skills to track the vehicle’s location and disable or

enable the vehicle by owner or a third party.

1.4 PROJECT SCOPE

The project scopes for this project are identified to make the development process more

systematically and easier through the entire development phase that will interact directly

with this system are user (owner’s vehicle), administrator and mobile application. The

scopes for each type of the users are as follows:

1.4.1 Owner’s vehicle or third party

• Sign Up

• Log In

• Update Profile

• Set Proximity Alert

• Log Out

3

Page 17: NUR LAILI NASUHA BT KHALID

1.4.2 Administrator

• Sign Up

• Log In

• Update Profile

• Add new GPS tracker

• Log Out

The scope for this project is:

i. The system focuses on to develop a device to control and prevent vehicle

from stolen.

ii. The target users of this system are the staff and owner’s vehicle.

iii. The system records the details of the vehicle information.

iv. The system using GSM network as a medium of communication.

1.5 LIMITATION OF WORK

The limitation of work in this Anti-Theft Vehicle Security System as below:

1.5.1 Internet Connection

The limitation for this system only works if there is an internet connection either a

Wi-Fi connection. It was internet of things (IOT), so internet connection is a vital

to make this system run. While Internet offline, this application is useless.

4

Page 18: NUR LAILI NASUHA BT KHALID

1.5.2 Environmental conditions

Environmental conditions might turn drastic. For example, in case of solar flares,

the satellite signals might get affected. However, governmental agencies announce

them early so that those with the GPS units can take precautionary steps to

overcome this difficulty. It might be wiser for you to carry a map in those days.

1.5.3 Battery might drain out

Power stoppage can result in malfunctioning of the GPS unit, especially the GPS

systems which work with solar power or those with a good battery life. A passive

GPS unit consumes lots of power even when the vehicle is idle. Some of the

commercial GPS units switch over to sleep mode when the vehicle is idle or parked

so that the battery duration gets longer. Or you can resort to versions for which

batteries are easily replaceable.

1.6 EXPECTED RESULT

Based on the objective of this development for this project, Anti-Theft Vehicle Security

will be run as below:

i. Among very common features anti-theft vehicle security system is theft prevention.

This feature sends alert and notification whenever a suspicious behavior occurs and

allows a quick reaction to this behavior. This feature can also avoid excessive costs

of acquiring new vehicle.

ii. All the information gained from anti-theft vehicle security system can lead into better

management of all business processes. That also includes better service for the user, as

it is possible to see the route, stops, idle time and possible arrival time.

iii. Smartphone and tablets are virally in use these days. One of the most excellent

features of using anti-theft vehicle security application is that it is compatible with

smartphone, and is as easy to use as other applications on a mobile phone.

5

Page 19: NUR LAILI NASUHA BT KHALID

1.7 SUMMARY

This report contains four chapters. The summary of each chapter will be explained as follow.

Chapter 1 will describe about introduction of the automated visual system quality inspection,

problem statement that describe the reason for developing the project, objective of the project,

scope of work, significant study of the project and thesis organization. Chapter 2 is about

review on previous research by other researcher in foreign country. Various methods and

approaches that related to our project have been discussed and reviewed. Chapter 3 explains

about method that will be used in this project. Android system, hardware and rule-based

classifier will be applied in this project. Chapter 4 shows overall conclusion for the project.

There are some issues in recommendation or suggestion rises about this field of study of project

is discussed in this chapter.

6

Page 20: NUR LAILI NASUHA BT KHALID

CHAPTER 2

LITERATURE REVIEW

2.0 INTRODUCTION

In this chapter discusses the literature review, research about the system that has similar in

functionality with the Anti-Theft Vehicle Security using GPS Based Platform and

comparing with existing application to review the techniques that have been proposed by

the result from many researches. Hence, by this information, it can be used to develop a

new system that can provide better function comparing with the existing system. Related

works for this project will be discussed as well.

7

Page 21: NUR LAILI NASUHA BT KHALID

2.1 CRITERIA FROM PREVIOUS STUDY (EXISTING APPLICATION)

2.1.1 GPS Vehicle Tracking System (VTS System Pro, 2019)

Figure 1.1: GPS Vehicle Tracking System

GPS Vehicle Tracking System - GPS, Fleet & Vehicle Tracking is an advanced

Vehicle tracking, fleet management and Anti-theft Security application which

makes it easy for transport companies to manage their vehicles. This app can also

be used to track personal cars, truck, bus, people and other important assets for their

live physical location. Vehicle can be tracked from anywhere remotely and also can

turn off vehicle's ignition if it is running unauthentically. Parents can also use this

application to keep an eye on their children while they are driving or travelling

elsewhere. This application is only meant for Fortune Telematics clients and only

they will be able to login and others won't.

8

Page 22: NUR LAILI NASUHA BT KHALID

2.1.2 Trackimo (Trackimo Inc, 2019)

Figure 1.2: Trackimo

Trackimo is a complete car tracking platform, complete with a downloadable app

and a tracking device that fit into the car, capable of providing with location data

no matter where are in the world.

The strength of Trackimo is it can set a GEO fence on the device, which is a virtual

barrier/boundary, the person with dementia can go for their daily walks within their

usual route and if person go beyond their route, a person (their care provider/family

member) will be notified via SMS and Email. The device connects with the app on

the care provider’s device (either cell phone/laptop) and it does not work with data,

it works with GSM and GPS connections, which is worldwide and provides an

accurate position of where the person is.

The weakness of Trackimo is the battery needs to be charged every 3-4 days, depending

on use. Based on the strength and weakness of Trackimo, it is more convenient to their

user can sent message to the care provider/family member when the battery becomes

flat. There are car chargers available as well for the device.

9

Page 23: NUR LAILI NASUHA BT KHALID

2.1.3 Find My Car - GPS Navigation (DS Software, 2019)

Figure 1.3: Find My Car

Find My Car is powerful car finder app that does not require maps or a network connection.

Using phone's GPS capabilities to navigate back to the car or any other location previously

visited. This application can use the navigation system including:

• A dynamic destination-pointing compass. Simply follow the arrow to locate a car.

Internet not required.

• Maps showing the route back to the parked vehicle.

• Pulse Wave front Radar. A pseudo radar pulse illuminates the position of the car.

When the car is at the center of the target it will founds the car.

Find My Car is used to find the car after parked it in unfamiliar areas, large parking lots

or elsewhere. Cannot find the lost car if it has been stolen.

10

Page 24: NUR LAILI NASUHA BT KHALID

2.1.4 Car GPS Mileage Tracker app & Vehicle Tracking (WorkInField, 2019)

Figure 1.4: Car GPS Mileage Tracker app & Vehicle Tracking

The app AUTO starts GPS tracking every mile, speed, trip duration & location of the

vehicle(s) when connected to Power or Bluetooth. Manual start is an option too.

Immediately view the driving routes on live map. Vezma helps to track multiple vehicles,

multiple tax categories (business, medical, charity, etc.). The mileage log is not the only

reimbursement to deduct. Vezma helps to record all other related vehicle expenses such as

fill-ups, tolls, maintenance, parking to maximize the tax deduction amount.

All vehicle trip & expense logs are synced to secure online account for easy management

& report generation. Easily generate professional reports on the fly (word, excel, pdf) for

mileage reimbursement or IRS deduction. Export the trip logs to Excel (CSV, XML, GPX

format).

11

Page 25: NUR LAILI NASUHA BT KHALID

2.2 RESEARCH COMPARISON (EXISTING APPLICATION)

Feature Similarities

• Location information in real-time

• Push notification

• Emergency button

• Create geo-fence

Differences

Product/ Positioning Overview Unique Capability

Application Technique

GPS Vehicle GPS, GSM GPS Vehicle Tracking System - GPS, Fleet & • Can turn off vehicle's

Tracking System Vehicle Tracking is an advanced Vehicle ignition if it is running

(VTS System Pro, tracking, fleet management and Anti-theft unauthentically.

2019) Security application which makes it easy for • Parents can also use this

transport companies to manage their vehicles. application to keep an eye

This app can also be used to track personal on their children while they

cars, truck, bus, people and other important are driving or travelling

assets for their live physical location. elsewhere.

Trackimo Geo-Fence Trackimo is a complete car tracking platform, • The device connects with

(Trackimo Inc, complete with a downloadable app and a the app on the care

2019) tracking device that fit into the car, capable of

12

Page 26: NUR LAILI NASUHA BT KHALID

providing with location data no matter where provider’s device (either

are in the world. cell phone/laptop)

• It does not work with data,

it works with GSM and

GPS connections,

Find My Car - GPS GPS, Pseudo- radar, Find My Car is powerful car finder app that • To navigate back to the car

Navigation (DS does not require maps or a network or any other location

Software, 2019) connection. previously visited.

• A dynamic destination-

pointing compass. Simply

follow the arrow to locate a

car. Internet not required.

Car GPS Mileage GPS, Bluetooth The app AUTO starts GPS tracking • Helps to track multiple

Tracker app & every mile, speed, trip duration & location of vehicles, multiple tax

Vehicle Tracking the vehicle(s) when connected to Power or categories (business,

(WorkInField, 2019) Bluetooth. Manual start is an option too. medical, charity, etc.

Immediately view the driving routes on live • Helps to record all other

map. related vehicle expenses.

Table 2.1: Comparison Existing Application

13

Page 27: NUR LAILI NASUHA BT KHALID

2.3 RESEARCH COMPARISON (ARTICLES)

No. Author/Title/Year Positioning Drawback

Technique

1. Akshatha S.A, “GPS • GPS • Only the comparison result can

based vehicle tracking technology. be displayed by the display

and monitoring • RaspberryPi unit, no map was shown.

system”, Volume: 04 technology. • Need more input for

Issue: 04 | Apr 2017. comparison.

2. Hazza Alshamisi, • GPS • Fully web-based

Veton Këpuska, technology. • Unable to see location in case

“Real Time GPS • GSM of internet failure.

Vehicle Tracking technology. • Difficult in hardware

System”, Volume 6, • Web implementation.

Issue 3, March 2017. technology.

3. Jessica Saini, Mayank • GPS • Due to a certain limitation in

Agarwal, Akriti technology. hardware, app location on the

Gupta, Dr. Manjula • GSM apphasanerrorof

R, “Android app technology approximately 10 meters.

based Vehicle • Micro- • Hardware requirement costly.

tracking using GPS Controller

and GSM”, volume 6,

issue 09, September

2017.

Table 2.2: Comparison Articles

14

Page 28: NUR LAILI NASUHA BT KHALID

2.4 LOCATION TRACKING REQUIREMENTS

Generally, tracking device is a device that commonly used to determine the precise location

of a vehicle, person or others things which allows monitoring the location by using satellite

signal or radio signal. Naturally, tracking device build base on some factor such as the

environment of the tracked object, the information needed, accuracy, budget to build up

the application and others. It can be divides into two categories; a locally and globally.

Locally is based on local technologies such as Bluetooth, RFID, and Wi-Fi while globally

require satellite, the technology that cover the world wide area. The most effective tracking

application for outdoor and indoor with a high scale of accuracy is the GPS and IPS that

will be the core thing for developing this project.

2.4.1 Global Positioning System (GPS)

Figure 1.5: Global Positioning System (GPS)

Stands for "Global Positioning System." GPS is a satellite navigation system used to

determine the ground position of an object. It uses to tracking works via a network of

15

Page 29: NUR LAILI NASUHA BT KHALID

satellites in orbit to determine the location user and time through the device. In order for a GPS

device to work correctly, it must first establish a connection to the required number of satellites.

This process can take anywhere from a few seconds to a few minutes, depending on the strength

of the receiver. For example, a car's GPS unit will typically establish a GPS connection faster

than the receiver in a watch or smartphone. Most GPS devices also use some type of location

caching to speed up GPS detection. By memorizing its previous location, a GPS device can

quickly determine what satellites will be available the next time it scans for a GPS signal.

Triangulation by multiple satellites locates the device, making GPS become the most accurate

method for finding locations. However, drawbacks include the lack of user accessible GPS

capabilities in most personal cell phones and the scarce availability of built-in GPS technology

in commercial laptops. Additionally, GPS can be battery intensive and inconsistent or

unavailable indoors.

2.4.2 Laravel

Figure 1.6: Laravel

Laravel is a free, open-source PHP web framework, created by Taylor Otwell and intended

for the development of web applications following the model–view–controller (MVC)

architectural pattern and based on Symfony. Some of the features of Laravel are a

16

Page 30: NUR LAILI NASUHA BT KHALID

modular packaging system with a dedicated dependency manager, different ways for

accessing relational databases, utilities that aid in application deployment and maintenance,

and its orientation toward syntactic sugar. The source code of Laravel is hosted on GitHub

and licensed under the terms of MIT License.

2.4.3 Google Maps

Figure 1.7: Google Maps

Based on Asynchronous JavaScript and XML (AJAX), a new type of client/server

interaction was introduced in Google Maps to maintain a continuous connection between

the client and the server for immediate downloading of additional map information. In

addition, Google also provides programmers its extensive sources of code called the

Application Programming Interface (API). The API consists of a set of data structures,

object classes or functions that can be used by a programmer using JavaScript, PHP or

another scripting language. With the current version 3, it is not required to register the API

key to use the Google Maps.

17

Page 31: NUR LAILI NASUHA BT KHALID

2.4.4 Blynk

Figure 1.8: Blynk

Blynk is a Platform with IOS and Android apps to control Arduino, Raspberry Pi and the

likes over the Internet. It’s a digital dashboard where you can build a graphic interface for

your project by simply dragging and dropping widgets.

2.5 SUMMARY

In this chapter, review of related works and it will convey the information about previous

study of tracking application or system, data transmission and current application on

conference. This chapter focus to understanding more about the project development.

18

Page 32: NUR LAILI NASUHA BT KHALID

CHAPTER 3

METHODOLOGY

3.0 INTRODUCTION

This chapter explains about Agile Model shown in figure 3.1 which include the

steps in integrated GPS implemented in this project. Besides, the design of context

diagram and data flow diagram to understand the system flow and entity

relationship diagram and data dictionary to understand the database design are

discussed.

3.1 METHODOLOGY REVIEW

Agile methodology is an alternative to traditional project management, usually used in

software development. It helps team to respond to unpredictability through

incremental, iterative work cadences, known as sprint. Agile methodology is an

alternative to waterfall, or sequential development. Based on Figure 2.1, the scope is

planning, design, implementation and testing & evaluation.

19

Page 33: NUR LAILI NASUHA BT KHALID

Figure 2.1: Agile Model

3.1.1 Iteration 1 (Planning)

In this phase the development environment is being set. The web-based

platform is being set up. Through this phase the login module is also being

developed. This module will be developed for all users which are admin and

user. This module is important since it is the first process must be passed

before the other module could be proceeded.

3.1.2 Iteration 1 (Analysis & Design)

The designing of Entity Relationship Diagram (ERD), Enhanced Entity

Relationship Diagram (EERD) is begin. In the ERD design, the entities for

this system consisted of users, officer and admin. Besides, Data Flow

Diagram (DFD) and framework also started in this phase. The DFD process

shows the flow of each process in the proposed system.

20

Page 34: NUR LAILI NASUHA BT KHALID

3.1.3 Iteration 1 (Implementation)

The process of writing coding begins at this phase. The login module for

the web-based system is written using PHP language while the system is

written in PHP language.

3.1.4 Iteration 1 (Testing & Evaluation)

The login module is tested by inserting several inputs that are both valid and

invalid into database to check the response received from each of those inputs.

If there is any problem occur during the testing, correction will be done right

away to fix the problem. The overall module is presented to the user and user

feedbacks are recorded for further improvement.

3.1.5 Iteration 2 (Planning)

In this phase, the implementation for managing and viewing officer and user

is begins. One of the basic functions is by allowing admin to manage the i-

Tracker report involving the function for adding, updating or deleting the

information or data.

3.1.6 Iteration 2 (Design)

The designing for Graphic User Interface (GUI) is began at the early of this

phase. The design will cover for add, update and delete module for the

report where the admin will able to assign the i-Tracker report submitted by

the user. The input form is based on material information that is stated in

user report.

21

Page 35: NUR LAILI NASUHA BT KHALID

3.1.7 Iteration 2 (Implementation)

As usual, back-end coding will be implemented through all the modules.

Any data and inputs will be carefully implemented and ensure any data that

related to database is executed correctly and ensure the codes working from

what the function should be.

3.1.8 Iteration 2 (Testing & Evaluation)

Once the implementation phase is done, testing phase will take place to

ensure what have been done are correct. All the inputs will be tested and

recorded for any enhancement afterward.

3.2 SYSTEM REQUIREMENTS

When it comes to software development, the standard requirement would be

software and hardware. Each of these requirements relate to one and another to

enable the system done smoothly.

3.2.1 Software Requirement

Software requirement for this project are:

No. Software Description

1. Apache Web Server As a local server to test and run the system and

application.

2. MySQL System database system and application.

3. Google Chrome Browser used to open the system.

4. Notepad ++ Used for writing coding for the system.

22

Page 36: NUR LAILI NASUHA BT KHALID

5. Clicks Chart & E-Draw Max Used to draw Entity Relationship Diagram

(ERD), Data Flow Diagram (DFD), Use Case,

Context Diagram (CD).

6. Microsoft Word 2016 Used for documentation of report.

7. Arduino Sketch Used for coding the Arduino and it connections.

8. Windows 10 Single Language Laptop Operating System.

Table 3.1: Software Requirement

3.2.2 Hardware Requirement

Hardware requirement for this project are:

No. Hardware Description

1. Asus Vivo Book Laptop used to run the system and application.

2. Printer Used for printing the report.

3. Raspberry PI Micro-controller work as CPU for GPS/GSM

4. GPS Module Device used for collecting coordinate.

5. GSM Module Device used for transferring coordinate to

server.

Table 3.2: Hardware Requirement

23

Page 37: NUR LAILI NASUHA BT KHALID

3.3 SYSTEM DESIGN

3.3.1 Framework

Figure 2.2: Framework

Figure 2.2 shows the framework of i-Tracker. User must fill-in the form, share their

location using GPS. User can view current location after GPS receiver and GSM modem

detect the coordinate and send through GSM Tower via SMS or notification to the user.

24

Page 38: NUR LAILI NASUHA BT KHALID

3.3.2 Use Case Diagram

Figure 2.3: Use Case Diagram My-Tracker

The use case diagram below represents the interaction between the different actors of the

system including the end user, the administrator and the GPS tracker, and identifies the

different system requirements.

25

Page 39: NUR LAILI NASUHA BT KHALID

3.4 PROCESS DESIGN

3.4.1 Context Diagram (CD)

Figure 2.4: Context Diagram

Figure 2.4 above shows the context diagram for the My-Tracker Apps. The context

diagram consists of three entities which are the administrator, user and Raspberry

Pi. Administrator and user entities are required to login to access full features of

the application. Administrator can manage the user details and their profiles. Any

tracking feedback from user, administrator can see it.

26

Page 40: NUR LAILI NASUHA BT KHALID

3.4.2 Data Flow Diagram (DFD) - LEVEL 0

Figure 2.5: Data Flow Diagram – Level 0

Figure 2.5 shows a data flow diagram that consists of four processes and four data

stores. There are processes that involved administrator in this level which are

registration, manage GPS tracker. There are also three processes involved user

which are registration, set proximity alert and track location.

27

Page 41: NUR LAILI NASUHA BT KHALID

3.4.3 Data Flow Diagram (DFD)- LEVEL 1

Data flow diagram (DFD) level 1 shows the system is divided into the sub-system

and each subsystem explains more about each of module.

3.4.3.1 Manage Administrator Profile

Figure 2.6: Administrator Profile

Figure 2.6 above shows DFD level 1 for administrator manage profile. In this level,

admin can manage their profile details into Administrator (D1) data store. They can

manage profile details such as adding and updating their information.

28

Page 42: NUR LAILI NASUHA BT KHALID

3.4.3.2 Manage User Information

Figure 2.7: User Profile

Figure 2.7 above shows DFD level 1 for user manage profile. In this level, admin

also can manage user profile details into User (D2) data store. They can manage

profile details such as adding and updating their information.

29

Page 43: NUR LAILI NASUHA BT KHALID

3.4.3.3 Manage GPS Tracker Information

Figure 2.8: GPS Tracker Information

Figure 2.8 above shows DFD level 1 for admin manage GPS Tracker. There are

three processes which is adding, retrieve and deleting GPS Tracker. GPS Tracker

data can only be retrieved by administrator.

30

Page 44: NUR LAILI NASUHA BT KHALID

3.5 DATA MODEL

3.5.1 Entity Relationship Diagram (ERD)

ERD is the common technique for drawing a data model to representing the data

that are used and created. ERD for My-Tracker Apps is as shown in Figure 2.9. It

consists of six (6) entities. The entities are account, admin, user, vehicle, zone,

proximity alert.

Figure 2.9: Entity Relationship Diagram (ERD)

31

Page 45: NUR LAILI NASUHA BT KHALID

3.5.2 Data Dictionary

Data dictionary for My-Tracker Apps was created. There are 5 tables that are

involving in storing data of the application.

Account

No. Attribute Type Length Key Description

1. username Varchar 45 Primary ID for login

2. password Varchar 45 Password for login

3. account_type Varchar 3 Differentiate user type

Table 3.3: Data Dictionary for Account

Vehicle

No. Attribute Type Length Key Description

1. vehicle_platenumber Varchar 10 Primary Plate number of vehicles

2. vehicle_brand Varchar 45 Brand of vehicles

3. vehicle_model Varchar 45 Model of vehicles

4. vehicle_user Varchar 45 Foreign Name of user

5. zone_id Int ID for tracker

Table 3.4: Data Dictionary for Vehicle

32

Page 46: NUR LAILI NASUHA BT KHALID

User

No. Attribute Type Length Key Description

1. user_cin Varchar 8 Primary ID of user

2. user_firstname Varchar 45 First name of user

3. user_lastname Varchar 45 Last name of user

4. user_phone Int Telephone number

5. username Varchar 45 Foreign ID for login

Table 3.5: Data Dictionary for User

GPS Tracker

No. Attribute Type Length Key Description

1. zone_id Int Primary ID for tracker

2. description Varchar 45 Description for alert

3. latitude Double Latitude for coordinate

4. longitude Double Longitude for coordinate

5. radius Double Radius for coordinate

Table 3.6: Data Dictionary for GPS Tracker

Proximity Alert

No. Attribute Type Length Key Description

1. alert_id Int Primary ID for alert proximity

2. alert_time Datetime 45 Timestamp the alert created

3. vehicle_platenumber Varchar 45 Foreign Plate number of vehicles

4. zone_id Int ID of tracker

Table 3.7: Data Dictionary for Proximity Alert

33

Page 47: NUR LAILI NASUHA BT KHALID

3.6 SUMMARY

In this chapter, we discuss the methodology specification used for development this

application with hardware and software required to develop this mobile application. The

methodology used by i-Tracker is Agile Model. All the phases involved in this

methodology had been clearly defined in this chapter. It also explains about data model,

process design, proof of concept, system requirement and techniques that are used in this

project that will guide to successful of this project.

34

Page 48: NUR LAILI NASUHA BT KHALID

CHAPTER 4

IMPLEMENTATION DESIGN AND RESULT

4.0 INTRODUCTION

This implementation s the process of carrying out, execution, or practice of the method,

design or model according to the specification given by the user requirement. To get

main objective of the system, few testing approaches have been done. System testing

and result are discussed. All tests and result performed on a system are reported clearly

in this chapter.

4.1 IMPLEMENTATION AND OUTPUT

This section will discuss about how the interface of this system will look alike and

explanation of each interface that may have function. Interface design allows the user

to explore and browse the entire system smoothly. It is done very carefully. Menu

design must be user friendly by using the appropriate color. Attractive features

graphics help the user do not get bored using the system.

35

Page 49: NUR LAILI NASUHA BT KHALID

4.1.1 WEB BASED INTERFACE

Figure 4.1: Index or Log in Page

Figure 4.1 above shows the first page or log in page for admin and user before they enter to the

system. Id number and password are required.

36

Page 50: NUR LAILI NASUHA BT KHALID

Figure 4.2: Success Log in

Figure 4.2 shows a home page or main menu for admin of the system when the admin is

successfully log in with the correct id number and password.

37

Page 51: NUR LAILI NASUHA BT KHALID

Figure 4.3: Display All user

Figure 4.3 shows the overview all user. This section only can view by admin. The admin also can

delete and edit the user.

38

Page 52: NUR LAILI NASUHA BT KHALID

Figure 4.4: Add new GPS tracker

Figure 4.4 shows the add new GPS tracker to the system. The admin is required to add GPS

tracker to the system.

39

Page 53: NUR LAILI NASUHA BT KHALID

Figure 4.5: My Tracker

Figure 4.5 shows the manage my tracker. This page will be able to delete or edit a GPS tracker

by the admin.

40

Page 54: NUR LAILI NASUHA BT KHALID

Figure 4.6: Edit Tracker

Figure 4.6 shows the page for editing tracker. This section the admin will be able to edit tracker

id number and description how the GPS tracker working while using it.

41

Page 55: NUR LAILI NASUHA BT KHALID

Figure 4.7: User’s Profile

Figure 4.7 shows the page for user to edit their profile. This section user can edit their profile and

delete their account.

42

Page 56: NUR LAILI NASUHA BT KHALID

Figure 4.8: Edit User’s Profile

Figure 4.8 shows the user’s profile that will be able to edit their profile. This section user can

edit their name, id number, vehicle plate number, email and password.

43

Page 57: NUR LAILI NASUHA BT KHALID

Figure 4.9: Add proximity Alert

Figure 4.9 shows the add proximity alert. This section user will set the alert radius and the

proximity alert is set and enabled to use.

44

Page 58: NUR LAILI NASUHA BT KHALID

4.1.3 APP BASED INTERFACE

Figure 4.10: Tracking Locatio

Figure 4.10 shows the direction a location. This section user will able to trace their vehicle’s

location real-time on the Google Maps.

45

Page 59: NUR LAILI NASUHA BT KHALID

4.2 SUMMARY

Implementation and result are an interrelated process were each of implementation

modules need to be tested in order to achieve less errors and meets requirement

specified. The main process and modules flow are discussed. Lastly, the functionality

of the module had been tested and evaluated.

46

Page 60: NUR LAILI NASUHA BT KHALID

CHAPTER 5

CONCLUSION

5.1 INTRODUCTION

Nowadays, there is a lot of tracking system for vehicle protection or security that

sale at the market. The specification of the system is depending to the user’s

convenience and every system may have advantages or disadvantages. For the

overall system development, Anti-Theft Vehicle Security Using GPS is suitable for

many security services. By developing this system, the system will be more

efficient and increasing the security level of the security van that will prevent from

theft activities. Project constraints will state all the difficulties that have been faced

throughout the development if the system.

5.2 PROJECT CONSTRAINTS

During the implement and testing the device and system, there are several problem

and limitations that occurred.

47

Page 61: NUR LAILI NASUHA BT KHALID

• Connection between Raspberry PI board for GPS|GSM.

• Coding for functionality of tracking device.

• Writing programming for the system (php) especially for generate

automatic alert.

• Lack of documentation of information about the device that choose for

build the tracking system.

5.3 CONTRIBUTION OF PROJECT

Anti-Theft Vehicle Security Using GPS is a system that developed to help people

to ease their day. The major contributions can be concluded. The device will be

embedded with sensor that can track their vehicle.

5.4 FUTURE PROJECT

In future, this system can be improved in several ways. Firstly, notification through

WhatsApp. Current system only can notify through system. So, it will be easier for user

to get the notification because nowadays everyone used WhatsApp at anytime and

anywhere. Secondly, make an improvement the system to application.

5.5 SUMMARY

As a summary Anti-Theft Vehicle Security Using GPS is develop to increase the

security level of vehicle and provide an efficiency monitory and tracking system.

Besides that, the saved coordinate can be analyzed fir increasing performance of

security vehicle works. This leads to the objective of this project.

48

Page 62: NUR LAILI NASUHA BT KHALID

REFERENCES

Anjan T L, Nikhil Satish, Abhinandan Kumar, Abhinav Narayan, Kiran S M, “Anti-Theft Security

System for Vehicles”, 2018 International Research Journal of Engineering and Technology

(IRJET), Volume: 05 Issue: 05 | May-2018.

Mohammed F. Alrifaie, Norharyati Harum, Mohd Fairuz Iskandar Othman, Irda Roslan, Methaq

Abdullah Shyaa, “Vehicle Detection and Tracking System IoT based: A Review”, 2018

International Research Journal of Engineering and Technology (IRJET), Volume: 05 Issue: 08 |

Aug 2018

Chen, H., Chiang “REAL TIME VEHICLE CEASING AND TRACKING USING GSM AND

GPS TECHNOLOGY” Volume 2 Issue 1.

H.V.DADWANI, R.B.BUKTAR, “VEHICLE TRACKING AND ANTI-THEFT SYSTEM

USING INTERNET OF THINGS”, 2017 International Journal of Advances in Electronics and

Computer Science, ISSN: 2393-2835.

Kunal Maurya , Mandeep Singh, Neelu Jain, “Real Time Vehicle Tracking System using GSM

and GPS Technology- An Anti-theft Tracking System,” International Journal of Electronics and

Computer Science Engineering. ISSN 2277-1956/V1N3-1103-110

Vikram Kulkarni & Viswaprakash Babu, “embedded smart car security system on face detection’,

special issue of IJCCT, ISSN(Online):2231-0371, ISSN(Print):0975-7449,volume-3, issue-1

49

Page 63: NUR LAILI NASUHA BT KHALID

V. NIROSHA, K. SUMA LATHA, "A COMPREHENSIVE APPROACH TO ENSURE SECURE

DATA COMMUNICATION IN CLOUD ENVIRONMENT", FOR DATA STORAGE USING

ENCRYPTION TECHNIQUE FOR SECURITY, INTERNATIONAL JOURNAL OF

ADVANCED RESEARCH IN COMPUTER SCIENCE AND SOFTWARE ENGINEERING,

VOLUME 3, ISSUE 7,

https://www.researchgate.net/publication/329317377_Antitheft_Vehicle_Monitoring_and_Track

ing_Android_Application_Using_Firebase_as_Web_Service

https://www.slideshare.net/BharathChapala/vehicle-tracking-system-using-gps-and-

gsm-techniques

https://www.researchgate.net/publication/304129283_GPS_Based_Vehicle_Tracking_System_a

nd_Using_Analytics_to_Improve_The_Performance

https://www.researchgate.net/publication/328293746_Anti-theft_Security_System_for_Vehicles

50

Page 64: NUR LAILI NASUHA BT KHALID

APPENDIX A : TIMELINE

Task/ Activities Week

Sept Oct Nov Dec Jan Feb Mac Apr May Jun July

Topic discussion and

determination

Topic project

proposal

Proposal writing-

introduction

Proposal writing-

literature review

Proposal slide

presentation

Proposal progress

presentation

Discussion and

correction of the

proposal

Proposed solution-

methodology

Prototype

Drafting Report of

the proposal

Submit draft of

report to supervisor

Seminar

Registration- project

poster

Seminar

Registration- project

slide

Seminar presentation

and Evaluation I

Final report

submission and

Evaluation I

Develop system

Developing system

progress

presentation

51

Page 65: NUR LAILI NASUHA BT KHALID

Discussion and

correction of the

development Seminar presentation

and Evaluation II Final report submission and

Evaluation II

52