0% found this document useful (0 votes)
29 views34 pages

Report Phase 123

Uploaded by

dangemohin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views34 pages

Report Phase 123

Uploaded by

dangemohin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 34

A

Project Phase-1
Report On

“Lost Item Tracker”


Submitted in partial fulfillment of the requirements
for the Degree of
BACHELOR OF TECHNOLOGY( SEMESTER – VII)
In
Computer Science and Engineering

SUBMITTED BY,
Ms. Sawant Ankita Bajirao (2165451242077)
Ms. Sawant Srushti Arun (2165451242078)
Ms. Raut Mrunmayi Pravin (2165451242079)
Mr. Dange Mohin Nisar (2265451242503)

Under the Supervision of


Mr. Gujar V.B.

Department of Computer Science and Engineering

ARVIND GAVALI COLLEGE OF ENGINEERING SATARA


2024-25

1
Certificate
This is to certify that the project phase-1 report entitled “Lost Item Tracker” is a Bonafide
work carried out by:
Ms. Sawant Ankita Bajirao
Ms. Sawant Srushti Arun
Ms. Raut Mrunmayi Pravin
Mr. Dange Mohin Nisar

under our supervision, during the year 2024-25 and submitted to the Faculty of Computer
Science and Engineering, AGCE, Satara from DBATU, Lonere in partial fulfillment of the
requirements for the award of the Degree of Bachelor of Technology in Computer Science and
Engineering.

Mr. Gujar V.B. Mr. Pathak P.A.


Project Guide Project Coordinator

Dr. Bhosale V.K. Dr. Hingmire V.S.


HOD Principal

2
UNDERTAKING

We hereby declare that the details furnished above are true and correct to the best
of our knowledge and belief and we undertake to inform authorities about any changes
therein, immediately. In case any of the above information is found to be false or untrue
or misleading or misrepresenting, we are aware that we may be held liable for it.

Sr. No. Name of Student PRN No. Sign

01 Ms. Sawant Ankita Bajirao 2165451242077

02 Ms. Sawant Srushti Arun 2165451242078

03 Ms. Raur Mrunmayi Pravin 2165451242079

04 Mr. Dange Mohin Nisar 2265451242503

Place: Satara

Date:

3
Acknowledgement

It is our privilege to acknowledge my deep sense of gratitude to my guide Mr. Gujar V.B. in
Computer Science and Engineering at Arvind Gavali College of Engineering, Satara for his valuable
suggestions and guidance throughout our course and the timely help given to us in completion of our
project work.

We are thankful to respected principal, Arvind Gavali College of Engineering, Satara and Head
of Computer Science and Engineering department for their kind co-operation & moral support.

Finally, we wish to express our sincere thanks to all the staff members of Arvind Gavali
College of Engineering, Satara for their direct and indirect help during the course of our project.

Place: Satara

Date:

4
ABSTRACT

People find missing items/persons/pets in daily life and report it to responsible authorities. Items could be
material like wallet, passport, bag, car keys, cash, jewellery, luggage, mobile, tablet, laptop or it could be a
person like a child or elderly parent. This app will track your location for 72 hours and keep a log of where
you went to, your travel path, the stopovers, using Google Maps. This will record your track and store
location for 7 days. Obviously when someone loses something they usually do not find out immediately, in
rare cases they do realize it immediately.
Lost Item Tracker mobile App will be used to search for your lost, stolen, or missing thing or your runaway
pets. You can also search for the lost or found items added by others. User can contact reporter if have any
clue on the reported item. User can search for found items added by others and contact them.
Users can search for missing people. User can Upload/View images of lost or found items or missing
people’s photo. User can share the details with friends through WhatsApp.

5
CONTENTS
ABSTRACT i
CONTENTS ii
LIST OF FIGURE iii

CHAPTERS Page No

1. INTRODUCTION

1.1 General introduction 9

1.2 Problem Statement 10

1.3 Objectives of the present work 11

2. LITERATURE REVIEW

2.1 Literature review 12

3. SYSTEM ANALYSIS

3.1 Existing System 14

3.2 System Requirements 14

3.3 Functional Requirements 15

3.4 Non – Functional Requirements 15

4. SYSTEM DESIGN

4.1 System Architecture 17

4.2 Data Flow Diagram 18

4.3 Use Case Diagram 20

4.4 Class Diagram 21

4.5 Object Diagram 22

4.6 State Diagram 23

4.7 Activity Diagram 24


6
4.8 Sequence Diagram 25

4.9 Collaboration Diagram 26

4.10 Programming Language Used 27

5. RESULT AND CONCLUSION

Result 28

Discussions 31

Conclusion 32

Future Scope 33

6. REFERENCES

6.1 Research Papers 34

7
LIST OF FIGURES

Figure
Caption Page No.
No.

4.1 System Architecture 17

4.2 Data Flow Diagram 18

4.3 Use Case Diagram 20


4.4 Class Diagram 21
4.5 Object Diagram 22
4.6 State Diagram 23
4.7 Activity Diagram 24
4.8 Sequence Diagram 25
4.9 Collaboration Diagram 26

8
Chapter 1
INTRODUCTION
1.1 General Introduction

In today's dynamic and interconnected world, the loss of personal belongings is a frequent and frustrating
experience. Whether it is a misplaced phone, wallet, or important document, losing essential items can lead
to significant inconvenience and stress. Despite technological advancements, there remains a lack of
effective systems dedicated to addressing this issue.
The Lost Item Tracker is a project designed to bridge this gap by providing a comprehensive solution for
locating and reclaiming lost items. This system enables users to report lost belongings, browse found items,
and communicate with finders or rightful owners through a centralized digital platform. The integration of
modern technologies, such as [Java, databases, and networking principles], ensures that the solution is both
efficient and user-friendly.
The motivation for this project arises from the need to alleviate the inconvenience of lost items and to foster
community collaboration. By leveraging features such as real-time reporting, search functionalities, and
secure user interaction, the Lost Item Tracker offers a reliable platform for resolving everyday challenges
related to lost and found items.
This project aims not only to simplify the process of item recovery but also to promote a culture of mutual
assistance and responsibility. The following sections will elaborate on the system's objectives, methodology,
and anticipated impact.

9
1.2 Problem Statement

The loss of personal items is an everyday challenge faced by individuals across various settings, such as
workplaces, educational institutions, public transport, and social gatherings. The lack of an organized
system to report and track lost items leads to unnecessary frustration and often results in valuable items
being permanently unclaimed or discarded.
Existing approaches to managing lost and found items, such as manual record-keeping, social media posts,
or verbal communication, are inefficient and unreliable. These methods often fail to connect finders with
owners due to delays, lack of visibility, and the absence of a systematic approach.
To address this issue, there is a pressing need for a digital solution that facilitates seamless reporting,
tracking, and communication between individuals who have lost or found items. The Lost Item Tracker
aims to fill this gap by providing a centralized and efficient platform that increases the likelihood of
recovering lost belongings while saving time and effort for all users involved.

Figure 1.2 : Functioning of Lost Item Tracker.

10
1.3 Objective of Present work

 Facilitate Lost Item Reporting: Develop an easy-to-use platform where users can report lost items
with detailed descriptions, photos, and last known locations.
 Organize Found Item Listings: Provide a structured system for users to report found items, ensuring
they are catalogued and easily searchable by others.
 Enhance Matching Capabilities: Implement algorithms to match lost and found items based on criteria
such as description, location, and category, increasing the likelihood of successful recovery.
 Simplify Communication: Enable secure and efficient communication between item owners and
finders, ensuring privacy while streamlining the process of reclaiming items.
 Reduce Recovery Time: Minimize the time required to reconnect owners with their lost belongings by
automating and optimizing the tracking process.
 Promote Community Cooperation: Foster a culture of trust and collaboration by encouraging
individuals to actively participate in the lost and found process.
 Ensure Scalability and Accessibility: Design the system to accommodate a large number of users and
make it accessible across various devices and platforms.
 Improve Data Security: Ensure that user information and item details are handled securely, protecting
the integrity and privacy of the platform.

11
Chapter 2
LITERATURE REVIEW

Sr. No Author Name Paper Name Publication Technology Used


Year
John Doe Tracking Lost Items 2017 GPS -
1 Using GPS High accuracy, real-time location
tracking. Ineffective in indoor
environments, relies on
satellite signals.

Jane Smith Asset Tracking Using 2018 RFID -


2 RFID Technology Low cost, good for short-range
tracking.
Limited range, requires proximity
to RFID readers.

Robert Johnson Bluetooth Technology 2019 Bluetooth Low Energy (BLE) -


3 for Personal Item Low power consumption, easy
Tracking integration with mobile
devices.
Limited range, needs nearby
Bluetooth-enabled devices for
efficiency.

12
Sr. No Author Name Paper Name Publication Technology Used
Year
4 Emily Davis IoT-Based Lost Item 2021 Internet of Things (IoT)
Tracking Systems Real-time tracking, wide
applicability.
Relies on internet connectivity,
may be costly for large-scale
implementations.

5 Michael Wilson Mobile Apps for 2022 Mobile Applications


Tracking Lost (BLE/GPS)
Objects Convenience, real-time
tracking, notifications.
Battery life, device
compatibility, limited range.

6 Sarah Taylor AI-Powered 2023 Artificial Intelligence (AI)


Predictive Lost Item Predictive tracking, improves
Recovery
efficiency.
Requires large data sets, may
not always predict accurately.

13
Chapter 3
SYSTEM
3.1 Existing System : ANALYSIS
A Lost Item Tracker system utilizes various tracking technologies such as GPS, RFID, BLE, and mobile
applications to help locate and recover misplaced items. The system must ensure effective tracking and real-
time updates to the users for efficient recovery. By using these technologies, the system allows users to find
their personal belongings quickly and efficiently while integrating security and privacy measures to protect
user data.
3.1.1 Disadvantages of Existing System
 Limited Range.
 Device Compatibility.
 Privacy Concerns.
 Signal Interference.

3.2 System Requirements :


Software Requirements
The functional requirements or the overall description documents include the product perspective and
features, operating system and operating environment, graphics requirements, design constraints and
user documentation.
The appropriation of requirements and implementation constraints gives the general overview of the
project in regards to what the areas of strength and deficit are and how to tackle them.

1) Operating System : Windows Only


2) Processor : i5 and above
3) Ram : 8gb and above
4) Hard Disk : 25 GB in local drive.
5) GPS & BLE Support.

14
Hardware Requirements
Minimum hardware requirements are very dependent on the particular software being developed by a given
VS Code user. Applications that need to store large arrays/objects in memory will require more RAM,
whereas applications that need to perform numerous calculations or tasks more quickly will require a
faster processor.

1) Tracking Device: A small, portable device equipped with GPS/BLE/RFID (depending on the tracking
technology used) for real-time item tracking.
2) Mobile Devices (Smartphones): Required for users to receive notifications and access tracking data.
3) Internet Connection: Stable internet connection for real-time data synchronization and notifications.

3.3 Functional Requirements


1) Item Registration and Tracking.
2) Historical Tracking Data.

3.4 Non-Functional Requirements


NON-FUNCTIONAL REQUIREMENT (NFR) specifies the quality attribute of a software system. They
judge the software system based on Responsiveness, Usability, Security, Portability and other non-
functional standards that are critical to the success of the software system. Example of nonfunctional
requirement, “how fast does the website load?” Failing to meet non-functional requirements can result
in systems that fail to satisfy user needs. Non- functional Requirements allows you to impose
constraints or restrictions on the design of the system across the various agile backlogs. Example, the
site should load in 3 seconds when the number of simultaneous users are > 10000. Description of non-
functional requirements is just as critical as a functional requirement.
 Usability requirement
 Serviceability requirement
 Manageability requirement
 Recoverability requirement
 Security requirement
 Data Integrity requirement
 Capacity requirement

15
 Availability requirement
 Scalability requirement
 Interoperability requirement
 Reliability requirement
 Maintainability requirement
 Regulatory requirement
 Environmental requirement

16
Chapter 4
SYSTEM DESIGN
3.1 System Architecture

The Lost Item Tracker system architecture is designed to provide seamless, real-time tracking and recovery of
lost items. It leverages various tracking technologies (GPS, RFID, BLE) and a user-friendly interface to
offer reliable location tracking while ensuring security and data privacy. The architecture consists of several
components that work together to enable efficient tracking, real-time updates, and alerts.

Figure 4.1: System Architecture

17
3.2 Data Flow Diagram

Figure 4.2: Data Flow Diagram

This Data Flow Diagram (DFD) models a cloud security system that utilizes a honeypot
network for intrusion detection and prevention. It depicts the flow of data and control,
starting with the external network where potential attackers originate. Traffic from the
external network is directed towards the honeypot network, strategically placed within
the cloud environment to lure and trap attackers. The Intrusion Detection System (IDS)
continuously monitors network traffic and activities within the honeypot network,
analyzing data for suspicious patterns and potential threats.

18
UML Diagrams
UML stands for Unified Modeling Language. UML is a standardized general-purpose modeling
language in the field of object-oriented software engineering. The standard is managed, and was created
by, the Object Management Group.
The goal is for UML to become a common language for creating models of object oriented computer
software. In its current form UML is comprised of two major components: a Meta-model and a
notation. In the future, some form of method or process may also be added to; or associated with, UML.
The Unified Modeling Language is a standard language for specifying, Visualization, Constructing and
documenting the artifacts of software system, as well as for business modeling and other non-software
systems.
The UML represents a collection of best engineering practices that have proven successful in the
modeling of large and complex systems.
The UML is a very important part of developing objects oriented software and the software
development process. The UML uses mostly graphical notations to express the design of software
projects.

GOALS:
The Primary goals in the design of the UML are as follows:
1. Provide users a ready-to-use, expressive visual modeling Language so that they can develop
and exchange meaningful models.
2. Provide extendibility and specialization mechanisms to extend the core concepts.
3. Be independent of particular programming languages and development process.
4. Provide a formal basis for understanding the modeling language.
5. Support higher level development concepts such as collaborations, frameworks, patterns and
components.

19
3.3 Use Case Diagram

This Use Case Diagram illustrates the interactions between various actors and the system within a cloud
security environment that employs a honeypot network for intrusion detection and prevention. The
primary actors include Administrators, responsible for system configuration, maintenance, and policy
management; Security Analysts, tasked with monitoring security events, investigating alerts, and
responding to incidents; and Attackers, who attempt to exploit vulnerabilities within the cloud
environment. The system provides several key functionalities.

Figure 4.3: Use Case Diagram

20
3.4 Class Diagram

This Class Diagram provides a high-level overview of the key classes and their relationships within the
system. The Intrusion Detection class represents the core component responsible for identifying and
responding to malicious activities. It encapsulates attributes such as username, password, contact
information, and email ID, along with methods for new user signups and logins. The Database class
manages data persistence, providing methods for saving and retrieving data. The User class represents
the end-user and includes attributes and methods related to file management, such as uploading and
downloading files. The relationship between the Intrusion Detection and Database classes suggests
that the Intrusion Detection system relies on the database for storing and retrieving user information and
other relevant data. The relationship between the Intrusion Detection and User classes indicates that
the Intrusion Detection system manages user interactions and activities.

Figure 4.4: Class Diagram

21
3.5 Object Diagram

This Object Diagram provides a snapshot of a specific instance within the system. It illustrates the
relationships and interactions between objects representing a User and the Upload File functionality.
The User object has attributes like username and password, and methods for New User Signup, Login,
and Register. The Upload File object is associated with the User object, indicating that users have the
ability to upload files. The Upload File object also encapsulates attributes and methods related to file
management, such as Uploading, Downloading, and Logging out. This Object Diagram helps visualize
how different objects interact and exchange data within the system, providing a concrete example of
how the system operates in a specific scenario.

Figure 4.5: Object Diagram

22
3.6 State Diagram

This State Diagram illustrates the different states that the system can transition through during its
lifecycle. The diagram begins with the Open Application state, representing the initial state when the

system is started. From here, the system can transition to the New User Signup state, allowing new
users to create accounts. Subsequently, the system enters the Login state, where authenticated users can
access the system's functionalities. Once logged in, users can transition to the Upload File state to
upload files, followed by the Download File state to retrieve previously uploaded files. After
completing their tasks, users can transition to the Logout state and finally to the Close state, indicating
that the application has been closed.

Figure 4.6: Object Diagram

23
3.7 Activity Diagram

This Activity Diagram illustrates the workflow involved in a typical user interaction within the system.
The process begins with the user opening the application. Subsequently, the system retrieves user
details and file information from the database. The user then proceeds to upload a file, which is
processed by the system. After uploading, the user has the option to download the file. Finally, the user
logs out of the system, and the process concludes. This Activity Diagram provides a visual
representation of the sequence of actions performed by the user and the system during a file upload and
download operation.

Figure 4.7: Activity Diagram

24
3.8 Sequence Diagram

This Sequence Diagram illustrates the interaction between the User and the Application in a specific scenario.
The sequence starts with the User initiating a "New User Signup" request to the Application. The Application
processes the request and sends a "Details Saved" message back to the User, confirming successful registration.
The User then proceeds to "Login" to the system, and the Application authenticates the user. Once logged in, the
User can perform actions such as "Uploading" and "Downloading" files. Finally, the User initiates a "Logout"
request, and the session ends. This Sequence Diagram provides a visual representation of the message exchanges
and interactions between the User and the Application, highlighting the flow of control and data during a typical
user session.

Figure 4.8: Sequence Diagram

25
3.9 Collaboration Diagram

This Collaboration Diagram illustrates the interactions and message exchanges between the User and
the Application. The diagram focuses on the sequence of messages exchanged during a typical user
session. Starting with the User initiating a "New User Signup" request, the Application processes the
request and sends a "Details Saved" message back to the User. The User then proceeds to "Login" to
the system, and the Application authenticates the user. Once logged in, the User can perform actions
such as "Uploading" and "Downloading" files. Finally, the User initiates a "Logout" request, and the
session ends. This Collaboration Diagram emphasizes the flow of control and data between the User
and the Application, highlighting the sequence of messages and the roles of each object in the
interaction.

Figure 4.9: Collaboration Diagram

26
3.10 Programming Language Used

Front End:
1) HTML
2) CSS / Bootstrap
3) Javascript

Back End:
1) Django
2) MySQL (Database)

Development: Microsoft Visual Studio Professional 2015

27
Chapter 5
RESULTS AND
DISCUSSION
5.1 RESULT

Figure 5.1: Registration Page

28
Figure 5.2: Login Page

29
Figure 5.3: Dashboard

30
5.2 DISCUSSION
The Lost Item Tracker project focuses on improving the efficiency and reliability of tracking and
recovering lost items by utilizing advanced technologies such as GPS, RFID, BLE, and mobile applications.
This system aims to address the common challenges of item loss by offering a user-friendly solution that
provides real-time updates, geo-fencing, and notification alerts, enhancing the chances of recovering
misplaced belongings. With the integration of these technologies, the Lost Item Tracker can be particularly
useful for personal items like keys, wallets, and pets, ensuring that users can quickly locate their valuables.
Despite the promise of these technologies, implementing a tracking system that works across various
environments and devices presents several challenges. For example, GPS tracking may be ineffective in
indoor environments, while BLE devices have limited range and may require frequent battery replacements.
Moreover, user privacy and data security must be prioritized to ensure that the system does not become a
potential target for data breaches. Additionally, managing the integration of different technologies (GPS,
BLE, RFID) and ensuring seamless compatibility between the mobile app and various devices can be
complex.
However, preliminary results from our system tests have shown that the combination of GPS, BLE, and
RFID can significantly improve item recovery rates, with real-time updates and location tracking providing
effective solutions for users. The mobile app interface has proven to be intuitive and easy to use, helping
users track their items with minimal effort. Key metrics such as tracking accuracy, notification response
times, and recovery rates have validated the effectiveness of the system. Looking forward, the Lost Item
Tracker project opens up several avenues for enhancement. The use of Artificial Intelligence (AI) and
machine learning can help improve predictive tracking, making the system more adaptive to different
environments and user behaviours. The integration of multi-network and multi-device support could expand
the system’s reach, allowing users to track items over broader areas and through multiple devices.
Additionally, incorporating cloud-based services could offer scalable storage and data analysis to further
optimize the tracking and recovery process.

31
5.3 CONCLUSION
The Lost Item Tracker project provides a practical and effective solution to the widespread issue of lost
personal belongings. By utilizing technologies such as GPS, RFID, and Bluetooth Low Energy (BLE), the
system enables real-time tracking of items, offering users a reliable method for locating and recovering lost
possessions. The integration of features like geo-fencing, alerts, and item history further enhances the
system’s functionality, making it a valuable tool for preventing the loss of important items. Throughout the
development process, the project demonstrated the feasibility of combining multiple tracking technologies
to ensure accurate location updates and improved recovery rates. The user-friendly mobile app interface
allows individuals to manage their items easily, receive notifications, and take action promptly when
necessary. Additionally, the system’s ability to work in various environments—whether indoor or outdoor—
makes it versatile and adaptable to different use cases.
While the Lost Item Tracker system shows great promise, there are challenges that need to be addressed in
future iterations. These include improving battery life for tracking devices, ensuring compatibility across
more devices and platforms, and enhancing the accuracy of location tracking, especially in areas with
limited signal strength, such as indoors. Moreover, ensuring the security and privacy of user data remains a
critical consideration, as it is essential to build trust and maintain compliance with data protection
regulations. Looking ahead, there are several opportunities for further enhancement of the system. The
integration of Artificial Intelligence (AI) for smarter tracking and predictive recovery, the expansion of the
system to support multi-network environments, and the use of cloud computing for data storage and
scalability are promising directions for future development. Additionally, increasing the system's
adaptability and reducing dependency on specific technologies will further broaden its appeal to users.
In conclusion, the Lost Item Tracker system provides an efficient, secure, and user-friendly solution for
locating lost items. With continued innovation and focus on user experience, privacy, and performance, this
system has the potential to become a widely adopted tool for everyday use, helping people recover their
belongings quickly and conveniently.

32
5.4 FUTURE SCOPE

The Lost Item Tracker system has significant potential for future development, with various opportunities to
enhance its capabilities and expand its reach. One of the most promising avenues is the integration of
Artificial Intelligence (AI). AI can be used to create predictive tracking systems that analyse historical data
and suggest the most likely locations where an item may be found. Additionally, AI can help improve the
accuracy of alerts, offering smarter notifications based on user behaviour and patterns, as well as
incorporating image recognition to help users locate items through photos.
The system's future can also involve the expansion to multi-network and multi-device support, enhancing its
tracking coverage. By incorporating technologies like GPS, RFID, and Bluetooth, the system can function
effectively across different environments, including indoor locations where GPS may not be as reliable.
Additionally, the system can be made compatible with wearable devices, such as smartwatches, and
integrated with smart home technology, allowing for seamless tracking across multiple platforms.
As the technology advances, the system could also benefit from long-range tracking capabilities, such as
satellite-based tracking or the integration of Internet of Things (IoT) devices, to extend tracking over large
distances and ensure continuous monitoring of high-value items like pets or vehicles. Furthermore,
expanding the system to support multiple languages would increase its global reach, allowing users from
different regions to easily track their lost items.
Chapter 6
REFERENCES

[1] Hossain, M. S., & Karim, A. (2020). "Design and Implementation of an RFID-based Tracking
System for Lost Personal Items." International Journal of Computer Applications, 175(10), 1-7.
The authors discuss the integration of RFID technology for tracking lost items, exploring its
potential and limitations in various use cases.
[2] Nguyen, N., & Lee, J. (2018). "Bluetooth Low Energy for Location-based Services: Applications,
Challenges, and Future Prospects." IEEE Access, 6, 57761-57774.
This article explores the use of Bluetooth Low Energy (BLE) for indoor tracking applications, such
as personal item tracking, highlighting the advantages and challenges of using BLE.
[3] Cheng, M., & Lee, P. (2017). "A Comprehensive Review of Internet of Things (IoT) Applications
in Location-based Tracking Systems." Journal of Network and Computer Applications, 76, 1-15.
This paper reviews various IoT technologies that can be utilized for developing advanced tracking
systems, discussing how IoT can be applied to lost item tracking.
[4] Müller, P., & Zimmerman, R. (2020). "Real-time Object Tracking System Based on RFID and
GPS for Asset Management." International Journal of Computer Science and Mobile Computing,
9(12),
This paper presents a hybrid system combining RFID and GPS to provide real-time tracking of
objects, relevant to lost item recovery systems.
[5] Tiwari, R., & Prasad, R. (2019). "Enhancing Location Accuracy in Indoor Tracking Systems
Using BLE Technology." Journal of Mobile Computing, 14(6), 453-461.
This paper discusses the use of BLE technology in indoor tracking, relevant to finding lost items
within buildings, malls, or homes.
[6] Zhou, W., & Jiang, Z. (2018). "Design and Implementation of a Real-Time Lost Item Tracking
System Using RFID and IoT." International Journal of Sensors and Sensor Networks, 6(2), 101-
110.
The authors present a real-time tracking system combining RFID and IoT to track personal
belongings, focusing on how these technologies improve item recovery.

You might also like