Android Application For Call Taxi
Android Application For Call Taxi
Main Modules
Driver
New
booking
Confirm
Transaction Status
Sign
And
and
Customer
cancel
booking
up
login
booking.
xi
Sign up:
This is the first step what user to do. In this module, user wants to create an account in database,
to call taxi from system. The registration processes are done by any person non-violating the
database privacy rules. The registration will be permitted by call taxi system administrator. After
the registration process completed user can get the authentication code and machine generated
user id, by using this only user can login to the call system.
Driver and Customer Login:
In this module user want to register the personal details in the call taxi company database and get
the authentication processes to go forward.
User booking and cancel booking:.
In this module authorized drivers can book a taxi from the call taxi system. Here also shows all
the details about the driver who also registered in the system. And the system admin give the
personal details to the particular driver only after the matching process is done. Now the
matching process is done by the admin. After getting the user details, driver can wait the user
confirms the booking.
Confirm booking:
In this process, user will get the information about the distance, time and required fees from the
system, then booking can be confirmed or cancelled in the above module.
Transaction status:
This is a module in which only admin can access, all registrations got permitted by this module.
Booking request by users and drivers information also can be viewed in this module, such as the
admin will arrange available driver to serve the particular request.
Application
Call Taxi System is used to maintain the user database in the format. It also very easy to retrieve
the accurate data from a database, here all the information about the user are maintained securely
and also here we achieve the confidentiality for the datas stored in the database. Concerning the
actual execution of the database update, once the system has verified that the Booking be safely
inserted to the database the data can be easily accessed and be used for further purposes and also
the transactions can be done both the ways. Its applied by retrieving information from the
Future Enhancements
Devising private update techniques to database systems that support notions of anonymity
different than k-anonymity.
Dealing with the case of malicious parties by the introduction of an un-trusted, no colluding
third party.
Implementing a real-world database system.
Improving the efficiency of an application, in terms of number of transactions exchanged
and in terms of their sizes, as well.
System Specification
The hardware and software requirements for the development phase of our project are:
Software Requirements :
FRONT END : Eclipse with Android plug
BACK END : MYSQL
Hardware Requirements :
PROCESSOR
RAM
Phone
PENTIUM
:
IV
512
2.0
GHz,
Intel
Core
MB
DD
Android
Duo.
RAM
Phone
CDDRIVE
KEYBOARD
MOUSE : 3 BUTTONS
LG
STANDARD
52X
KEYS
102
Aadhaar Plus
Abstract
Aadhaar Plus Project is mainly based on the RFID technology. In this project we used Radio Frequency Identification
technology (RFID); we have an RFID card which is issued to each and every citizen with a unique identification number in it. This
card will be used as a unique identification and will be used in various aspects which have been described in the following Report.
Now before going to the details of the Project we should first know about the RFID technology. Radio frequency identification
(RFID) technology has been widely adopted in access control system. The control modules are developed based on embedded
systems. Embedded systems are becoming increasingly common due to the fast deployment of advanced microcontrollers offering
high processing speeds at an affordable price and allowing for simple and reliable use of Open Source software. The presented
system uses a microcontroller with a standard Ethernet interface, to validate users presenting an RFID Card.
The user credentials are validated locally or in a central database. Authorized users are given access to reserved areas. By using a
powerful database, very flexible and complex high level administration and management functions can be implemented. As we all
know about the Indian governments AADHAAR a unique identification Project which is being prepared by INFOSYS
TECHNOLOGIES. This Project is a higher or we can say a modified version of the AADHAAR card. This card will be unique for
every citizen in India. Its basically a Radio Frequency Identicifaction card, through which the particular details of a person will be
accessed.
OVERVIEW
The
four
modules
of
this
RFID
card
are
as
follows
Passport
Hospital
Details
Smart
Parking
Driving Licence
PASSPORT
The module will have all the necessary details of the passport, like all the issued VISA, Address, Name, Identification, and
Photograph. The module consists of VISA history, date of issue and expiry details. AADHAR PLUS card will act as Passport, and
we will not have to take the passport separately. The headache of carrying a passport booklet will be solved and just this card can
be used in various purposes. In National Information Centre (NIC) the database size will be reduced so it will be easier to maintain,
update and make changes. There will be only one database for passport and other modules. So it will reduce the size of database
and resource can be used properly and more structured manner. The traditional passport is issued to citizens of India for the
purpose of international travel. They act as proof of Indian nationality. The Consular Passport & Visa (CPV) Division of the
Ministry of External Affairs, functioning as the central passport organisation, is responsible for issuance of Indian passports to all
eligible Indian citizens.
Passports are issued from 37 locations across the country and 162 Indian missions abroad Types of traditional passports are
Regular passport (Deep Blue/Black cover) - Issued for ordinary travel, such as vacations and business trips (36 or 60 pages)
Diplomatic passport (Maroon cover) - Issued to Indian diplomats, top ranking government officials and diplomatic couriers.
Official passport (White cover) - Issued to individuals representing the Indian government on official business
In addition, select passport offices in India as well as overseas missions are authorised to issue Regular Indo-Bangladesh passports
and Indo-Sri Lankan passports, to Indian nationals resident in West Bengal, the North Eastern States, Tamil Nadu and Pondicherry.
These two passports permit travel to Bangladesh and Sri Lanka only and are not valid for travel to other foreign countries
In our project we dont have any such types. We have only one card which will work for all type of passports. This project not only
deals with passport but many other domains which are given below. In this particular domain of passport we mainly deal with the
issue of VISA and the other important fields of passport. The another important drawback on the traditional passport is that when
the pages get over in the passport we have to go for renewal of new one but in this AADHAR PLUS passport system we dont
have to issue a new one as there is no pages involved in this card, there is no chance of getting over with the pages for visa. There
is unlimited storage of visa. It will help overcome another important drawback of traditional passport system. The first RFID
passports ("E-passport") were issued by Malaysia in 1998. In addition to information also contained on the visual data page of the
passport, Malaysian e-passports record the travel history (time, date, and place) of entries and exits from the country.
SMART PARKING:
It generally includes automating the car-parking payment facility where the RFID card will first check for the available balance in
the card (RFID acts as a Smart card) and will deduct the parking charges from the available amount thus reducing the risk of
escaping. And it will also reduce the problem of tender exchanges in the parking fee gates and also reduce the problem of carrying
cash.
Baltimore/Washington International Thurgood Marshall Airport also strives to make parking less painful. The airport installed a
smart parking system for its hourly and daily garages, which combine to offer 13 200 parking spaces. Sensors embedded in each
parking space at BWI detect whether the space is occupied, with that information fed into a central parking management system.
As drivers approach BWI on their way to departing flights, they see signs showing the availability of parking at the airports
garages. As a passenger enters a garage, signs indicate the total number of parking spaces available and the number on each level
[6]. At the levels, there are additional signs that tell the passenger how many spaces are available per row. A light over each space
indicates whether it is available: green for open, red for occupied. BWI was the first airport in the country to use smart parking
technology, says Jonathan Dean, spokesman for the Maryland Aviation Administration. The technology came to BWI after
Marylands transportation secretary saw it in use while on a trip to Europe.
It explains that the RFID reader will be connected to the microcontroller with the help of UART and the UART is also connected
to the PC/ LAPTOP and the PC or Laptop will execute the software part and show the forms and in that part only we can use the
different modules and can entry the data and keep the updates and in this was the project work out.
in designing new systems, sequence diagrams can be used to document how objects in an existing (call it "legacy") system
currently interact. This documentation is very useful when transitioning a system to another person or organization
The sequence diagram of this card shows how the AADHAR PLUS card works and the steps involved in it. The user is first
checked for authorization and if the authorization is correct then only the access will be provided to the user. This authorization is
done with the help of a password. This password will be separate for each and every user. In case of Medical Details, this
authorization is not required. As in case of an emergency it will not be possible for any user to provide authentication. Thus this
module does not need authentication at all. But the other modules will need authentication as for the security reasons. So that the
passport and driving license details are safe and there is no unauthorized or illegal use of those details and in case of smart parking
also for keeping our e cash safe we have the password facility so that in case of lost card or theft, there should not be any misuse of
the card and so this will help to keep the details safe and secured. The given sequence diagram explains in what sequence and the
way the card works, authentication and other processes.
WORKING MODEL
The above shown diagram is a working model. It shows how the RFID SCANNER reads the RFID TAG/CARD and the signal is
given to the PC and the modules will be shown. The computer displays four modules which are shown in above diagram and in the
right hand side a demo is shown, when we click in the Hospital button it will display another form which will be like the above
given demo which will have all the necessary hospital details and all. The same way it will work for each and every module.
The figure shows the hardware design of the AADHAR PLUS kit. The designed kit consists of all the hardware requirements for
this project. It contains the RFID Reader, Microcontroller 8051 along with the filters. In the right hand side we have step down
transformer which converts 120v to12v. It also shows a buzzer which will produce a sound when the card comes near the coil or
the scanner. This sound comes out only when the card comes within the range of the reader. Thus the card is read by the RFID
reader.
CONCLUSION
The AADHAR PLUS project has been documented to bring a substantial difference in the Indian Government, by helping them
introducing the AADHAR PLUS.
Our current objectives are to
To make the procedure for applying for passport and driving licence easy and quick.
In case of emergency/ accident this card will help to get the details about the patient and his medical history.
This card will also improve the classical parking system by making the parking charges payment automated which will make the
New CSE Projects : Database Synchronization, Data Mining For Credit Card Application Processing, Data Leakage
Detection, Channel Diversity in Wireless Mesh Network, Blog Mining and Emotion Argumentation,Automatic Alert Alarming For
Security Systems, Automated Parking System using RFID Technology, Aadhaar Plus
Features
Application framework enabling reuse and replacement of components Dalvik virtual
machine optimized for mobile devices
Integrated browser based on the open source WebKit engine
Optimized graphics powered by a custom 2D graphics library; 3D graphics based on the
OpenGL ES 1.0 specification (hardware acceleration optional)
SQLite for structured data storage
Media support for common audio, video and still image formats (MPEG4, H.264, MP3,
AAC, AMR, JPG, PNG, GIF)
GSM Telephony hardware dependent
Bluetooth, 3G, EDGE, WiFi hardware dependent
Camera, GPS, compass and accelerometer hardware dependent
Rich development environment including a device emulator, tools for debugging, memory
and performance profiling, and a plug-in for the Eclipse IDE
Cryptographic Algorithms
Security is very important aspect of computer systems. In our daily life we use computer systems
because we believe that the systems are secure. Cryptography is what makes the computer
systems secure. Cryptography is a branch of mathematics science. The first publications about
cryptography were published long time ago and are almost as old as first mathematical
publication. The first known cipher called Caesar cipher was used by Julius Caesar who lived 50
years before Christ (50 B.C.), but according to Menezes, van Oorschot, Vanstone (2001) limited
cryptography has been used by Egyptians 4000 years ago. Since that time cryptography, mainly
driven by military demand, became much more robust and in the 20th century, where first cipher
machines were introduced during Second World War and later when computers and asymmetric
algorithms came into play cryptography has become topic of many publications every year.
Many encryption algorithms are widely available and used in information security. They can be
categorized into symmetric (private) and asymmetric (public) key encryption. In Symmetric keys
encryption or secret key encryption, only one key is used to encrypt and decrypt data. The key
should be distributed before transmission between entities. Key plays an important role. If weak
key is used in algorithm then everyone may decrypt the data. Strength of Symmetric key
encryption depends on the size of key used. For the same algorithm, encryption using longer key
is harder to break than the one done using smaller key. Some examples of such algorithms are
RC2, DES, 3DES, AES, etc.
Asymmetric key encryption or public key encryption is used to solve the problem of key
distribution. In Asymmetric keys, two keys are used; private and public keys. Public key is used
for encryption and private key is used for decryption (E.g. RSA and Digital Signatures). Because
users tend to use two key: public key, which is known to public and private key which is known
only to the user. There is no need for distributing them prior to transmission. However, public
key encryption is based on mathematical functions, computationally intensive.
System Specification
The hardware and software requirements for the development phase of our project are:
Software Requirements :
OS: Windows 7 (64 bit) or any Linux distro (64 bit)
Android OS: Froyo v2.2 (minimum)