Project Report SELF SECURITY
Project Report SELF SECURITY
Chapter 1
INTRODUCTION
GPS tracking system uses the Global Navigation Satellite System (GNSS) network.
This network incorporates a range of satellites that use microwave signals that are transmitted
to GPS devices to give information on location, vehicle speed, time and direction. GPS
tracking system can potentially give both real-time and historic navigation data on any kind
of journey.
We refer to our mapping ability as "GPS," Global Positioning System is actually the
term for a constellation of 30 satellites that orbit the earth. The first GPS satellite was
launched in 1978, and the full constellation of 24 came to be in December 1993, and became
operational in 1995. Each satellite takes 11 hours and 58 minutes to orbit the earth, meaning
each satellite makes two orbits per day, at an altitude of 10,600 miles above earth.
GPS device tells the precise location, position in a process called trilateration. It
communicates with three satellites in sight using high-frequency, low-power radio signals
that travel at the speed of light and then calculates the distance between those satellites and
your device. Since the satellites have a fixed orbital pattern and are synced with atomic
clocks from the U.S. Naval Observatory, this process tends to yield an accurate location
reading. To improve accuracy, GPS devices typically seek data from four or more satellites,
especially for determining altitude.
Once your GPS knows where you are, it can determine map routes, speeds, and other
location-specific information, such as sunrise and sunset. GPS receivers log locations of
satellites in an almanac, and though the orbits can be affected by the moon and sun, the
United States Department of Defence monitors the satellites' exact positions and sends
updates to GPS receivers.
“Self Security” is a smartphone application that helps the one to ensure their safety
using their devices. At the time of emergency there may not be any possibility to attempt any
phone calls or to send messages manually. Hence, this application will be helpful for persons
who are at difficulty. The user can add persons in his/her emergency contact list; the
application would consist of emergency button. Whenever the user clicks on the emergency
button, all the contacts in emergency contact list receive a text message with the user’s
location via GPS.
Even the person in trouble doesn’t have to look at the phone once the users tap the
button. Everything else is done by the emergency app. The app sends out alert messages with
the locations to the contacts that have fed into the app as the designated receivers or
guardians. The message says “Hello xyz, your buddy abc is in trouble and their present
location is..…”. Help will come fast at you. No complex set up is required.
The application consists of 5 modules, which are Profile module, Police station
module, Hospital module, Emergency contact module, and Emergency button. It has some
key features:
At first user have to save some personal details such as: name, address, mobile
number, email_id.
Next the users have to insert some details such as: name, mobile number, email_id of
the receipient.
Just the finger touch on the “Emergency button” is enough to alert your receipient.
The message also includes the current position of the victim.
Also the user gets the details about nearby hospitals and police stations with latitude
and longitude.
Chapter 2
LITERATURE SURVEY
2.1 EXISTING SYSTEM
There is one of the applications available at Google play which is also a security
application, which will send emergency message when the user is in critical situation, but it
won’t displays users location in map[1].
Chapter 3
PROBLEM STATEMENT
The “Self-security” application is to make something unique that is not unique in the
market and for a social cause. So, we came up with this idea of Women Security App.
3.1OBJECTIVE
The main objective of this application is to provide help not only for the women but
also for the men, children, teenagers, travellers, disabled, handicapped and seniors
especially who suffer dementia and confusion.
It will send a message that “Hello xyz, your buddy abc is in trouble and their present
location is………”, so that they will respond immediately.
3.2 METHODOLOGY
Methodology is the systematic, theoretical analysis of the methods applied to a field
of study. It comprises the theoretical analysis of the body of methods and principles
associated with a branch of knowledge.
SDLC Methodology
This document play a vital role in the development of life cycle (SDLC) as it
describes the complete requirement of the system. It means for use by developers and will be
the basic during testing phase. Any changes made to the requirements in the future will have
to go through formal change approval process.
The waterfall model is a sequential design process, often used in software
development processes, in which progress is seen as flowing steadily downwards (like a
waterfall) through the phases of Conception, Initiation, Analysis, Design, Construction,
Testing, Production/Implementation, and Maintenance.
The first formal description of the waterfall model is often cited as a 1970 article by
Winston W. Royce, although Royce did not use the term "waterfall" in this article. Royce
presented this model as an example of a flawed, non-working model. This, in fact, is how the
term is generally used in writing about software development—to describe a critical view of a
commonly used software development practice.
Requirement
specification
Software
design
Implementation
and integration
Testing
Deployment
Maintenance
Android SDK
The Android Software Development Kit (SDK) contains the necessary tools to
create, compile and package Android application. Most of these tools are command line
based.
The Android SDK also provides an Android device emulator, so that Android
applications can be tested without a real Android phone[9]. You can create Android virtual
devices (AVD) via the Android SDK, which run in this emulator.
The Android SDK contains the Android debug bridge (adb) tool which allows
connecting to a virtual or real android device.
3.3.2Technologies
Technology is the collection of techniques, skills, methods and processes used in the
production of goods or services or in the accomplishment of objectives, such as scientific
investigation. Technology can be the knowledge of techniques, processes, etc. or it can be
Chapter 4
SYSTEM DESIGN
4.1 ARCHITECTURE
GPS Internet
Sends message
On clicking with location Friends and
emergency relatives
button
Remote place
Help line
In any critical situation their will be no time to call help in time. If the person has a
smartphone with internet, GPS and self security app in it then, they can easily get the help
from the family, friends and relatives, and helplines just on clicking the emergency button.
Now everything will be done by this app. It sends out the alert message with the location to
the receivers as shown above.
2. Request Carrier’s
Satellite sending server 1 Ask for location
3. Get Location
Trilateration:
A GPS receiver uses trilateration to determine its position on the surface of the earth
by timing signals from 3 satellites in GPS. The GPS is a network of satellites that orbit the
earth and send a signal to GPS receivers.
Each satellites sends out the periodic signal and these are received by GPS devices
which then calculate the distance between the device and each satellite based on the delay
between the time the signal was sent and the time when it was received.
Profile Details
Emergency Contact
Emergency Button
Process Modules
This project ccontains the following 4 modules :
Profile Module
Police Station Module
Hospital Module
Emergency Contact Module
Emergency Button
Profile Module
Profile is an important component to users, which helps the users to add his/her personal
details.
1. Name
2. Address
3. Email Id
4. Mobile Number
Police station
The women will get information about the nearer police station.
Hospital
When hospital option is clicked in my application,the user gets required details of near by
hospitals.
Emergency Contact
Required details of one who is in danger will be contacted to the right persons or family
members or friends or help lines.
Emergency Button
When we sense any dange, we can be escaped by using emergency button.
Android will ship with a set of core applications including an email client, SMS
program, calendar, maps, browser, contacts and others. All applications are written using the
Java programming language.
In android operating system, there are four layers. Android has its own libraries; it is
helpful for developing and designing any application of android platform.These libraries are
written in C/C++. Linux kernel is the 1 st layer which is written in C. Linux also helps to wrap the
application.
The unveiling of the Android platform on 5 November 2007 was announced with the
founding of the Open Handset Alliance, a consortium of 34 hardware, software and telecom
companies devoted to advancing open standards for mobile devices. When released in 2008, most
of the Android platform will be made available under the Apache free-software and open source
license. Currently Android represents 31.2 percent of the U.S Smartphone market. Android has a
large community of developers writing application programs. There are currently over 150,000
apps available for Android. Android Market is the online app store run by Google, though apps
can also be downloaded from third party sites.
Features of Android
Application Framework enabling reuse and replacement of components
Dalvik Virtual Machine optimized for mobile devices
Integrated browser based on the open source Web Kit engine
SQLite for structured data storage
Media support for common audio, video and still image formats (MPEG4, H.264, MP3,
AAC, AMR,J PG, PNG, GIF)
GSM Telephony(hardware dependent)
Bluetooth,EDGE,3G, and Wi-Fi(hardware dependent)[6]
Android Architecture
The following diagram shows the major components of the Android operating system. Each
section is described in more detail below:
Application
Application Framework
Libraries
Android Runtime
Chapter 5
REQUIREMENT ANALYSIS
5.1 FUNCTIONAL REQUIREMENTS
This specification is used to specify the requirements for the initial implementation of
the system and update the system in future. The software requirement specification bridges
the gap between client/user and the system developer. This is the document that describes the
user needs accurately.
Chapter 6
IMPLEMENTATION
It is the carryout, execution, or practice of a plan, a method, or any design, idea,
model, specification, standard or policy for doing something. As such, implementation is the
action that must follow are preliminary thinking in order for something to actually happen.
However, you can always add a test project later by clicking the Android Test Project
creator icon, which is to the right of the Android project wizard icon on the Eclipse
toolbar. Test projects are discussed in detail in Hour 22, “Testing Android
Applications.”
Click the Finish button.
.
Before creating any Android Application the right path has to be selected so that the
whole project will be saved in that selected path.
Create Android Application, the first step is to create a simple Android Application
using Eclipse IDE. Follow the options: File → New → Android Application Project wizard from
the wizard list.
Now name your application as Self_Security using the wizard window as above. Next
follow the instructions provided and keep all other entries as default till the final step.
Once the project is created successfully, the above project screen is displayed.
Select the particular widget whichever is necessary from the palette and drag it on the
grapgical layout to design the application.
This property window is used to change the properties such as Id, Text, Style, Font,
Color etc of the selected widgets.
Coding
Package explorer
src: This contains the .java source files for the project. By default it includes an
MainActivity.javasource file having an activity class that runs when the app is
launched using the app icon.
gen: This contains the .R file, a compiler_generated file that references all the
resources found in the project. This file should not be modified.
bin: This folder contains the Android package files .apk built by the ADT during the
build process and everything else needed to run an Android application.
res/layout: This is a directory for files that defines app’s user interface[7].
Snapshot 1
This is the Self_Security app, on clicking this app the home page will be displayed
which is consisting of 5 buttons.
Profile
Emergency contact
Police station
Hospital details
Emergency
Snapshot 2
On clicking the Profile button, the profile page will be opened and the user should
insert their personal details such as name, address, contact and Email. Then press update
button, and the details will be saved. In case of any updation, the user can update their
profile.
Snapshot 3
On clicking the emergency contact, the contact list page is opened. Here the user
should insert the required details such as name, mobile number and Email address of the
right person or family members or friends or help lines
Snapshot 4
On clicking the police station button the user gets the detail informations about the
nearer police station such as address, latitude and longitude also the phone number if
specified.
Snapshot 5
Similarly, on clicking the hospital button the user gets the detail informations about
the nearer hospitals such as address, latitude and longitude also the phone number if
specified.
Snapshot 6
Finally on clicking the emergency button, the message is sent along with the location
to the designated receivers as shown in the above snapshot.
Chapter 7
SYSTEM TESTING
The philosophy behind testing is to find errors. The common view of testing is that it
is performed to prove that there are no errors in a program. However it is virtually impossible
to prove that no program will be free and clear of errors. Therefore the most useful approach
and practical approach is with the understanding that testing is the process of executing a
program with explicit intention of finding errors that is, making the program fail.
Testing Strategies
A test strategy is an outline that describes the testing approach of the software
development cycle. It is created to inform project managers, testers, and developersabout
some key issues of the testing process. This includes the testing objective, methods of testing
new functions, total time and resources required for the project, and the testing environment.
Test strategies describe how the product risks of the stakeholders are mitigated at the test-
level, which types of test are to be performed, and which entry and exit criteria apply.
Unit Testing
Unit testing is the process of verifying the logic, functionality, computations, and
error handling of a unit. The intent of unit testing is to confirm that the unit provides the
capability assigned to it, correctly interfaces with other units and data, and is a faithful
implementation of the unit design. Unit testing focuses verification effort on the smallest unit
of software design in the module. The important control paths are tested to uncover errors and
invalid flow within the boundary of the module. The unit testing is normally structural
oriented testing and can be conducted in parallel for multiple modules independently.
Unit testing was done for all the sub entities of the module simultaneously with the
development. In all the units the flow of data across the control structures were tested and all
independent paths within each module were traversed at least once. All logical decision paths
were exercised for both affirmative and negative response to the specified conditions. Also
the consistencies of the data that are processed by the unit were verified before and after its
execution.
Chapter 8
CONCLUSION
With the increasing crime against women we have decided to design”safety alert
app” is to enhance the safety for women, kids and everyone at anytime and anywhere.
The basic aim of the system is to develop a low cost solution for GPS based self
security system (women safety system) which can applied to various domains of the
industrial and personal use just by using the very common mean i.e. mobile with android
enabled.
The main objective of the system is to track the current location of the person which
has an android enabled mobile by extracting the longitude and latitude of that target person.
The primary objective of our system is to track the person and plot the location on real
time system like Google map.
REFERENCES
1. http://m.thehindu.com/features/metroplus/society/always-vithu/article5375763.ece
2. http://developer.android.com/sdk/api_diff/9/changes/android.location.LocationMa
nager.html
3. http://java.sun.com/javase/downloads/index.jsp
4. http://www.eclipse.org/downloads/Eclipse
5. http://stackoverflow.com/questions/android
6. http://developer.android.com/guide/topics/fundamentals/
7. http://stackoverflow.com/questions/tagged/android-layout
8. ‘Greg Nudelman’, “ANDROID Design Pattern” , This book is more suited for
advanced level android developers.
9. ‘Ian G Clifton’ , “ANDROID user interface design” , This book explains the
importance of user interface design.
10. “Software Engineering” by ‘Ian Summerville’, 6th Edition, Pearson Education Ltd,
2001.