0% found this document useful (0 votes)
6 views57 pages

android based database for tracking and reporting the user location

This document discusses the development of a mobile application for location tracking using Android technology, focusing on Location Based Services (LBS) and the integration of GPS and Network Location Provider for accurate user location retrieval. It highlights the challenges of geolocation accuracy, particularly in urban environments, and outlines the objectives of creating an effective tracking system that addresses issues such as user authentication and data retrieval. The study aims to contribute to advancements in mobile technology and inspire further research in GPS-based location tracking systems.

Uploaded by

Samuel Andrew
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views57 pages

android based database for tracking and reporting the user location

This document discusses the development of a mobile application for location tracking using Android technology, focusing on Location Based Services (LBS) and the integration of GPS and Network Location Provider for accurate user location retrieval. It highlights the challenges of geolocation accuracy, particularly in urban environments, and outlines the objectives of creating an effective tracking system that addresses issues such as user authentication and data retrieval. The study aims to contribute to advancements in mobile technology and inspire further research in GPS-based location tracking systems.

Uploaded by

Samuel Andrew
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 57

CHAPTER ONE

INTRODUCTION
1.1 Background of the Study
With the development of the information era, people hope to access data anywhere
and anytime. To meet this requirement, mobile computing is researched as the
combination of computing and mobile communication technology. Mobile
communication gradually changes its trends from simple voice communications to
complex data communications. Short messages and mobile internet business have
been widely used in Nigeria, which are the best cases (Mai, 2014).
Location Based Service (LBS) is a platform that provides information services
based on the current or a known location, supported by the electronic map
platform. The location information (latitude and longitude coordinates) of mobile
end user can be obtained through the mobile communication network or the Global
Navigation Satellite Systems (GNSS). The research focusing on LBS is vast and a
number of these services have been implemented and tested. Tourist information
systems are ideal examples for such applications, for example, Tourist Guide
project, CyberGuide project and PinPoint Tourist Guide (Roth, 2019).
An Android App can be very useful in determining the location of the user. By
identifying a user’s location in an Android app can be really useful. Users take
their mobiles all over the place and are frequently using them on the go, and as
developers we can benefit from that by providing a more appropriate familiarity
based on their current location.
Mobile has become a vital communication tool which everyone prefers to possess
and carry along. This technology has laid a foundation to overcome the traditional
desktop-based approach of obtaining information. Mark Weiser the father of
Pervasive Computing in his paper entitled, ‘The Computers of 21st Century,
‘envisioned that, “The technology would weave into the fabric of everyday life
1
until they are indistinguishable from it, “this is the vision and has come true in this
current 21st century. Following the vision of Mark Weiser, researchers at Carnegie
Mellon University in a project Aura demonstrated that, human distractions could
be minimized by Ubiquitous systems which will have to be proactive in
anticipating the demands, thus self-tunable so as to give a better response to the
future hassles. The ability to sense and process a context form as a fundamental
requirement for a system to be proactive. Hence, designing a context -aware
application would pave way to satisfy the future growing requirements of user.
Most promising type of contextual information is the proximity selection known as
Location Based Service (LBS). Tracking location of a mobile device accurately
has been a challenging research topic for decades. Global Positioning Systems
(TRACKER) is a top priority technology used for locating a device position
accurately. Methodology for tracking can be done using a TRACKER receiver
which is an additional hardware integrated in most of mobile equipment. We have
used TRACKER as the approach idea for location tracking. The platform used for
development is Android Operating System, as described Being a mobile operating
system, android operating system (OS) is a modified version of Linux, originally
developed by a start-up, Android, Inc. As Google entered mobile market, it
purchased Android and, in a bid, to encourage independent development works, it
released the developer tools under the open-source Apache License. The
permissive licensing allows the operating system (OS) and related software to be
modified and distributed by enthusiastic developers, network operators & device
manufacturers.

This research work presents some easy steps which will create an App that will
identify the user location easily. This proposed System will occupies less space on
the mobile device and it can be installed on any Android based mobile like Redmi

2
and OPPO etc. While developing a location-aware application for Android, we can
make use of GPS and Android's Network Location Provider to obtain the user
location. Although GPS is most precise, but it only useful in outdoors, it quickly
consumes battery power, and doesn't return the location as quickly as users’
necessity. Android's Network Location Provider verifies user location using cell
tower and Wi-Fi signals, providing location information in a way that works
indoors and outdoors, responds faster, and uses less battery power. To get the user
location in an application, we can use both GPS and the Network Location
Provider, or just one.
1.2 Statement of the problem
The potential for geolocation to transform apps is almost limitless. As a central
feature of delivery, fleets and an advertiser's dream, mobile location data is now
part of everyday life. But getting quality location data without discrepancies that
could severely alter the user's experience is not a guarantee. GPS can be inaccurate
and battery-draining, making it impossible to target users at the right time. For app
developers, location features must be done right.

Where location features are fundamental to app functionality such as delivery,


logistics or fitness, inaccurate tracking leads to a sub-par or unusable user
experience. For marketers targeting users based on their location, inaccurate
location data severely compromises campaigns.

Environment, device state, and satellite position all impact accuracy and precision.
Dense urban environments usually mean less accurate location data. Buildings,
walls, trees or any high obstacle can cause signal blocks, as satellites struggle to
send signals to a user without interference. Equally, if there are not enough
satellites, GPS receivers struggle to calculate location accurately.

3
Some of the common problems this system is intended to solve include:
1. Difficulty in Tracking all users’ locations
2. Challenges of retrieved from an online database so as to centrally control
the permissions for viewing.
3. Difficulty in restricting user access, user authentication.
4. The challenge of Periodic refreshing so as to be present so that each time
the geo–location changes or after a fixed interval of time the values in
database should be updated.
1.3 Aim and Objectives of the Study
The aim of the research work is to Develop an Android Based Database for
Tracking and Reporting the User Location. With the following objectives:
1. To develop a more effective location-based tracking facility.
2. For retrieving information on mobile device.
3. To store user’s location in SQLite database.

1.4 Significance of the study


This study has some vital rules in modern technological advancement since there is
move to android world. Android's has Network Location Provider which
determines user location using cell tower and Wi-Fi signals, providing location
information in a way that works indoors and outdoors, responds faster, and uses
less battery power. This study will also inspire the other researchers to develop
more effective and efficient GPS-based location tracking system via Android
device.
1.5 Scope of the Study
The researcher focuses only on developing an android based database for tracking
and reporting user location.

4
1.6 Limitation of the Study
The researcher faced some limitations during the course of this research. Some of
these limitations/constraints include;

i. Time constraint: Time factor was the major constraint, as the time frame to
submit the project was too short for rigorous research.
ii. Financial constraint: Lack of adequate finance to fund the researcher as to
the purchase of data to review related works online was another major
setback.

1.7 Definition of Terms

Android: Android is a mobile operating system which offers a unified approach to


application development. Developer needs to develop application using android
and these applications can run on numerous different devices, as long as the
devices are powered using Android.

Global Positioning System (GPS): The Global positioning system (GPS) is a


space –based navigation system that provides locations and time information in all
weather conditions, anywhere on or near the earth where there is an obstructed line
of sight to four or more GPS satellites.

Google Maps: Google maps provide the map of an open Application programming
interface (Google maps API). Developers can easily link the Google maps service
to the application.

PHP: PHP is a server-side scripting language that is embedded in HTML it is


used to manage dynamic content, databases, session tracking, even build entire e-
commerce site and it is integrated with number of popular databases.

5
MY SQL: MySQL is a fast, easy-to-use RDBMS being used for many small and
big businesses. MySQL works on many operating systems and with many
languages including PHP, PERL, C, C++, JAVA etc MySQL works very quickly
and works well even with large data sets.

Tracking: The maintain of a constant different in frequency between two or more


connected circuit or component.
Location: A place of settlement, activity or residence a place or situation occupied
System: A set of things working together as part of a mechanism or an
interconnecting network.
Retrieval: The process of getting something back from somewhere.
Online: Online is the condition of being connected to a network of computer or
another device.
Database: A databases management system (DBMS) is a computer software
application that interacts with the user, other applications and data base itself to
capture and analyze data
Restricting user access: Access control is a security technical that can view or use
resource in the computing environment.
User Authentication: The process of identifying an individual, usually based on a
user name and password.
Locating Multiple Users: These users may have different location access setting.
Geo–Location: This is the real word geographic location of identifying person or
device by means of digital information process via internet
Interval of Time: Duration of a segment of time within reference to when the time
interval begins or ends.

6
Updated: More recent and usually improved, form or something, especially
something that is regularly changed.

7
CHAPTER TWO
LITERATURE REVIEW

2.1 Theoretical Review


Some of the theories related to person tracking or device tracking include Tracking
Theory and Cognitive Theory.

Tracking theorists hypothesize that in order to qualify as knowledge, a true belief


must track the relevant fact-the belief must depend in an appropriate way upon the
fact that accounts for its truth.

Tracking theories of knowledge began with Alvin Goldman’s (2017) “A Causal


Theory of Knowing.” Goldman launched a bold new approach to knowledge, in
the wake of Edmund Gettier’s (2013) elegant demonstration that, whatever else
knowledge is, it isn’t merely justified true belief. At least it was not this on the
prevailing theories of justified belief circa 2013. Goldman agreed and headed off in
a new direction, offering no account of justified belief or warranted belief in his
1967 paper.

Goldman’s diagnosis of what went wrong in Gettier’s examples was that the thing
that made one’s belief true in the examples was causally disconnected from the
thing that made a person hold the belief. One could justifiably and truly believe (on
good evidence) that p (= that Jones owned a Ford or Brown was in Barcelona). Yet
one may fail to know that p since one’s belief that p could be true by accident
because the thing that brought one to believe was not connected to the thing that
made one’s belief true. I may believe Jones owns a Ford because I rode in his new
Ford and saw the bill of sale before the car was repossessed, and so on. Yet, what
makes my belief true is the accident (of which I am unaware) that today Brown is
indeed in Barcelona. My belief, though true and justified, is true by accident since

8
Jones’s Ford was repossessed and I knew nothing of the specific whereabouts of
Brown.

Goldman’s diagnosis, in the face of Gettier’s examples, and many other cases of
perception, testimony, and memory where we would agree that we do have
knowledge, was that the accident that bars knowledge would be removed if one’s
nose were rubbed in the truth, as it were. That is, if there were an unbroken causal
chain running from the thing that makes one’s belief true to one’s belief, then one’s
true belief would be knowledge. No specific role need be played by one’s
justification for the belief. At least, that was the main hope behind Goldman’s
causal theory.

It later turned out that beliefs causally connected with the truth could still be true
by accident, and the new tracking theory approach to knowledge had to be revised
further. Still, the bold new approach, once begun by Goldman, moved forward
over several iterations.

Other epistemologists who helped develop the tracking theories were Armstrong
(2013), and Dretske (2019, 2020, 2021), and, of course, the “tracking” name comes
from Robert Nozick’s (2021) account, which I’ll discuss later.

The Cognitive theories on the other hand are characterized by their focus on the
idea that how and what people think leads to the arousal of emotions and that
certain thoughts and beliefs lead to disturbed emotions and behaviors and others
lead to healthy emotions and adaptive behavior. In this chapter, we review
cognitive theories (CTs): their definition, historical evolution, theory of personality
and psychopathology, clinical assessment, and treatment process, including the
psychotherapy relationship (DiGiuseppe, et at., 2016).

2.2 Review of Related Studies


9
Literatures on the prior research work done by accredited scholars in the
Ubiquitous Computing domain are reviewed. Challenges and solutions proposed
are in specific to context aware location-based service are presented here.
Lashkari A.H.et. al. (2010) describes a system which is used to locate friends and
family by using GPS and Standard web technology. This system is implemented
using J2ME & JavaScript, the repository and the web client is implemented using
PHP and MySQL.

Siriteanu A.et. al. (2013) presents the creation of Social Network in which the
users are being alerted when their friends are around. Available Android location
services like GPS technology, wireless and mobile towers are used to find an
approximate location of a mobile phone running this program and then sharing the
location information through the Meet You or via SMS.

Kumar N. (2012) describes a system using which you can locate the mobile device
using another mobile device by even sitting at your home. The system only
requires the inbuilt GPS and GPRS in the device whose location is to be tracked.
“Where are you? – A Location Awareness System” is a project that helps you to
locate a friend or a known person without informing that person.

Li Liu.et. al. (2012) explains the design and implementation of Android mobile
operating system-based group communication and navigation system. By use of
GPS and Google Map, the system implements a geographic location and route
planning between user and his friend. The system provides a convenient and
efficient platform for users travel and connection between friends.

Shrestha R.et. al. (2012) presents android-based location and message sharing
system which provides a secured two-way communication between web server and
android based application. The proposed system uses Java programming language

10
for android mobile user application, PHP programming language as web server,
MySQL as external database to store the data. Symmetric cryptography is used to
assure secured communication between android device and web server.

Chandra A.et. al. (2011) discusses Location Based Service which is a key factor
for future mobile application. The system is developed with J2ME API based on
providing location-based service using GPS. The application is implemented as
client server system which helps users to locate friends and family with whom he
wants to share his location.

Al-Suwaidi G Bet. al. (2009) presents Location Based Services (LBS) for mobile
applications using Global Positioning System (GPS). The application is
implemented as a client-server system that helps users to locate their family
members and receive alerts when friends are nearby. Mobile application developed
using J2ME API at client side and Server was implemented using PHP and
Database MySQL which is open source.

J Jayashree.et. al. (2011) proposes a mobile location tracking application in a


cellular mobile network based on Location Based Service. The proposed system is
implemented as a client server system that helps the users to locate their friends
and receive alerts whenever they are nearby.

Sandeep et al (2011), have outlined the significance of location-based services.


Technological development in an exponential manner have paved a way to access
hardware directly by customized application interface such as GPS, web service,
programming cameras were elucidated.
The Researchers in Kee NeeGoh et al, (2011) proposed and developed a system
where the complaints of the drivers on the roads are easily accessible. The system
is implemented with the help of GSM. This System is convenient channel for

11
drivers to send complaints regarding public infrastructure so that better services are
provided to the public. The implementation of procedure for road maintenance is
done with the combination of GPS and GSM technologies.

A Researcher in F.Aloul et al, (2019) discussed the implementation of simple and


cost-effective system that help users to track College friends and colleagues within
campus environment. This system locates the college friends using Bluetooth and
WIFI connectivity on mobile phones. A mobile phone is loaded with software that
communicates with the Server. This work is implemented through GSM. The
server gives the current location of moving users.

Mohammad Al-khedkar (2011) proposed an integrated GPS-GSM system used to


Track vehicles using Google Earth Application. The main goal of the system is
Automobile Trajectory used to assist corporations with large number of
automobiles and several usage purposes. To provide location and time information
in a system, Global positioning system is used as space based global navigation
satellite system. The performance of this integrated system is calculated with the
help of map matching techniques used for automobiles localization. The system
shows proper travel routes from the beginning of Journey.

2.3 Conceptual Review


2.3.1 The Concept of Location Base Service
A location-based service (LBS) is a software service for mobile device applications
that requires knowledge about where the mobile device is geographically located.
The application collects geodata, which is data gathered in real time using one or
more location tracking technologies (Andrew Froehlich, 2022).
Location-based services integrate data from various resources, including Global
Positioning System (GPS) satellites, cellular tower pings and short-range

12
positioning beacons, to provide services based on the user's geographical location.
Although location-based technologies have been commercially available for almost
two decades, the applications and services that use geodata have recently become
mainstream, thanks to the widespread use of Android and Apple smartphones and
tablets.

Location-based services can be broken into the following distinct categories:


1. Pull. The application user initiates the location-based service processes. One
example of a query-based location-based service is a user checking a mobile
map application, such as Waze, to find the nearest automated teller machine.
Some location-based services also enable users to check in to restaurants,
concerts or sporting events using apps such as Foursquare, Yelp or Google
Maps.
2. Push. The application initiates the location process based on a trigger or at
regular intervals. The application then presents the user or device with
relevant information based on their geographic location. Proximity-based
marketing is a push-based location-based service example. Here, a user is
sent an advertisement or coupon after the application proactively identifies
that person as being near a specific retail outlet.

For location-based services to operate, the following four basic components are
required:

1. an application that uses location-based services;


2. a positioning mechanism to collect geodata;
3. a mobile network to transmit or receive data; and
4. analytics software running on a remote server to compute and deliver
relevant data to the user based on geographic location.

13
By law, location-based services must be permission-based, so the end user must
opt in to the service in order to use it. In most cases, this means the user turns on
the location-based service application and accepts a request to enable the service to
know the device's location. For example, a user can enable or disable Apple's
iPhone Location Services for a specific app, as well as specify whether the
application can pull geodata at any time, only when the app is in use or ask each
time a location is needed. This process is similar with Android devices as well.

Risks of using location-based services


While there are clear benefits and relevant use cases for location-based services,
there are some risks users must understand. In the recent past, application creators,
mobile device developers and mobile network operators have been accused of
tracking devices and users without their consent.
While the industry seems to be moving in the right direction, this topic brings up
serious privacy risks for those who are not fully informed or tech-savvy. Location
tracking data in the wrong hands can lead to situations where criminals, thieves or
stalkers could use this information to assist with their crimes. And, on a lesser
scale, the data can be used for unsolicited and unwanted targeted marketing or
advertising campaigns that many find overly intrusive.
To reduce the security risks of using location-based services, it is wise to limit
when applications are authorized to track users. This includes turning off or
limiting when an application can track and verifying that the application owner
will not use or sell location data in a way that could harm the end user.
Applications of location-based services
There are numerous location-based services, including Waze, Google Maps, Lyft,
Uber, GasBuddy and WhatsApp. While the types and benefits of these services are
growing, common uses include the following:

14
 navigation and travel information, including real-time traffic notifications;
 store and service locators;

 fleet and mobile workforce management tracking;

 inventory monitoring;

 anti-theft prevention;

 fraud prevention using a location-based service to match a customer's


location to a credit card transaction;

 proximity-based marketing;

 roadside assistance;

 social networking;

 surveillance; and

 augmented reality.

2.3.2 GPS Locator


Turning ON the GPS module on the phone would not cost us anything but getting a
location usually involves transaction with cell phone service provider so as to
extract the location fast and with as little network connectivity as possible plus non
visibility of satellites. In short: no cell phone service implies any GPS location, as
far as hand held devices are considered.
Normal GPS
The method is called trilateration. The receiver listens to a particular frequency and
gets data packets in the form of time coded messages from satellites. The receiver
figures which satellite it can hear from. It starts gathering those messages

15
containing time information from atomic clocks, current satellite positions etc.
Nominal time to get a location is around 30-60 seconds. The same information
needs to be confirmed by at least two other satellites. Only Using Mobile Services
The user location in an area is calculated with the help of signal measurements
with the information received from cell towers. Information analyzed are angle to
approach towers, multipath fading characteristics with signal strength comparisons.
No GPS module used.
Assisted GPS
This is what a cell phone normally uses for mapping and GPS use purposes. User
location information is retrieved within 5-10 seconds. The GPS components are
shared with other mobile components and hence simultaneous use of GPS and
normal voice/video usage is done. First, gross positioning information from service
provider based on what cell tower is being accessed and the same is fed to the GPS
receiver. Next, the phone switches from phone to GPS mode for around 0.1
seconds and collects raw GPS data from satellites. It then switches back to phone
mode and sends the data to the service provider to be analyzed.

Full Chip GPS Receiver

The module still gets data from the service provider such as tower positioning and
satellites to hear from. Switching is for 1 second but after that the receiver keeps
track of information with very low power drawn from circuit.

2.3.3 The concept of Mobile Phone Tracking


Mobile phone tracking is a process for identifying the location of a mobile phone,
whether stationary or moving. Localization may be affected by a number of
technologies, such as the multilateration of radio signals between (several) cell
towers of the network and the phone or by simply using GNSS. To locate a mobile

16
phone using multilateration of mobile radio signals, the phone must emit at least
the idle signal to contact nearby antenna towers and does not require an active call.
The Global System for Mobile Communications (GSM) is based on the phone's
signal strength to nearby antenna masts (BBC News, 2010).

Mobile positioning may be used for location-based services that disclose the actual
coordinates of a mobile phone. Telecommunication companies use this to
approximate the location of a mobile phone, and thereby also its user (Shu Wang,
Jungwon Min and Byung K. Yi, 2018).

Network-based Mobile tracking

The location of a mobile phone can be determined using the service provider's
network infrastructure. The advantage of network-based techniques, from a service
provider's point of view, is that they can be implemented non-intrusively without
affecting handsets. Network-based techniques were developed many years prior to
the widespread availability of GPS on handsets (Laitinen, et al., 2021).

The technology of locating is based on measuring power levels and antenna


patterns and uses the concept that a powered mobile phone always communicates
wirelessly with one of the closest base stations, so knowledge of the location of the
base station implies the cell phone is nearby.

Advanced systems determine the sector in which the mobile phone is located and
roughly estimate also the distance to the base station. Further approximation can be
done by interpolating signals between adjacent antenna towers. Qualified services
may achieve a precision of down to 50 meters in urban areas where mobile traffic
and density of antenna towers (base stations) is sufficiently high.[4] Rural and

17
desolate areas may see miles between base stations and therefore determine
locations less precisely.

GSM localization uses multilateration to determine the location of GSM mobile


phones, or dedicated trackers, usually with the intent to locate the user (Jungwon
Min and Byung K. Yi, 2018)

The accuracy of network-based techniques varies, with cell identification being the
least accurate (due to differential signals transposing between towers, otherwise
known as "bouncing signals") and triangulation as moderately accurate, and newer
"advanced forward link trilateration" timing methods as the most accurate. The
accuracy of network-based techniques is both dependent on the concentration of
cell base stations, with urban environments achieving the highest possible accuracy
because of the higher number of cell towers, and the implementation of the most
current timing methods (Wang, S.S.; Wylie-Green, M.P., 2014).

One of the key challenges of network-based techniques is the requirement to work


closely with the service provider, as it entails the installation of hardware and
software within the operator's infrastructure. Frequently the compulsion associated
with a legislative framework, such as Enhanced 9-1-1, is required before a service
provider will deploy a solution.

In December 2020, it emerged that the Israeli surveillance company Rayzone


Group may have gained access, in 2018, to the SS7 signaling system via cellular
network provider Sure Guernsey, thereby being able to track the location of any
cellphone globally (Black, 2020).

Handset-based Mobile tracking


The location of a mobile phone can be determined using client software installed
on the handset. This technique determines the location of the handset by putting its
18
location by cell identification, signal strengths of the home and neighboring cells,
which is continuously sent to the carrier. In addition, if the handset is also
equipped with GPS, then significantly more precise location information can be
then sent from the handset to the carrier (Reynolds and Bethany, 2015).

Another approach is to use a fingerprinting-based technique, where the "signature"


of the home and neighboring cells signal strengths at different points in the area of
interest is recorded by war-driving and matched in real-time to determine the
handset location. This is usually performed independent from the carrier (Ibrahim,
M. & Youssef, M, 2010).

The key disadvantage of handset-based techniques, from service provider's point of


view, is the necessity of installing software on the handset. It requires the active
cooperation of the mobile subscriber as well as software that must be able to
handle the different operating systems of the handsets. Typically, smartphones,
such as one based on Symbian, Windows Mobile, Windows Phone, BlackBerry
OS, iOS, or Android, would be able to run such software, e.g. Google Maps.

One proposed work-around is the installation of embedded hardware or software


on the handset by the manufacturers, e.g., Enhanced Observed Time Difference (E-
OTD). This avenue has not made significant headway, due to the difficulty of
convincing different manufacturers to cooperate on a common mechanism and to
address the cost issue. Another difficulty would be to address the issue of foreign
handsets that are roaming in the network.

SIM-based Mobile Tracking

Using the subscriber identity module (SIM) in GSM and Universal Mobile
Telecommunications System (UMTS) handsets, it is possible to obtain raw radio
measurements from the handset. Available measurements include the serving Cell
19
ID, round-trip time, and signal strength. The type of information obtained via the
SIM can differ from that which is available from the handset. For example, it may
not be possible to obtain any raw measurements from the handset directly, yet still
obtain measurements via the SIM (Ted Gibbons, 2018).

Wi-Fi Based Mobile Tracking

Crowdsourced Wi-Fi data can also be used to identify a handset's location. The
poor performance of the GPS-based methods in indoor environment and the
increasing popularity of Wi-Fi have encouraged companies to design new and
feasible methods to carry out Wi-Fi-based indoor positioning. Most smartphones
combine Global Navigation Satellite Systems (GNSS), such as GPS and
GLONASS, with Wi-Fi positioning systems (Pourhomayoun, 2012).

Hybrid positioning system

Hybrid positioning systems use a combination of network-based and handset-based


technologies for location determination. One example would be some modes of
Assisted GPS, which can both use GPS and network information to compute the
location. Both types of data are thus used by the telephone to make the location
more accurate (i.e., A-GPS). Alternatively tracking with both systems can also
occur by having the phone attain its GPS-location directly from the satellites, and
then having the information sent via the network to the person that is trying to
locate the telephone. Such systems include Google Maps, as well as, LTE's
OTDOA and E-CellID.

There are also hybrid positioning systems which combine several different location
approaches to position mobile devices by Wi-Fi, WiMAX, GSM, LTE, IP
addresses, and network environment data.

20
Location Tracking through Google Latitude

Google latitude (Google latitude, 2012) is defined as a “Location aware mobile


application developed by Google as a successor to its earlier SMS based service
Dodge ball”. This Software is tested with various Mobile users for Location
detection. The Software is loaded on Idea Alcatel one touch 918N, version
6573.The software works with android 2.3 operating system loaded on mobile.
This Software also gives the output of some queries like “show me the area where I
am on the map”, “show me the area where is my friend at this time”. Google use
their own Location databases for Localization (Denis Huber, 2011). In order to get
the Location of user, Location Manager must be acquired from the system. Then a
new Location Listener object is assigned for each Mobile User. After that with
request-Location updates the device begins to locate the position (Android Guide,
2012).

2.4 Summary of Literature Review


In today’s environment, a mobile has become one of the important necessities. If a
person wants to search his family member or a child or if a person who loses his
mobile wants to track it, or a Person wants to know who is disturbing him by
giving missed calls or irrelevant SMS, a person becomes handicapped if he is
unable to get in touch with the contacts. With the help of GSM technology, it is
possible to trace and find the Location of person with the help of 2G, 3G and 4G
mobile phones which the other person is using. There are many applications on the
internet through which one can detect the location of user. These applications
include surveillance, detection of fraud, help in business marketing etc. There are
two types of addresses that are assigned to user i.e., public IP addresses and private
IP addresses for data distribution and performance tuning of a System. One can
also find the Location of user through IP address for immediate or any specific

21
service. A few data services such as Maxmind are provide that maintains the tables
including IP addresses with the locations that matches. The important requirement
of general user is to get the Location of his family member. This can be done
through sending and receiving SMS.

22
CHAPTER THREE

RESEARCH METHODOLOGY

3.1 Methodology
The design methodology adopted in this research is the Rapid application
development (RAD) method. This is a condensed development process that
produces a high-quality system with low investment costs. The rapid application
development method contains four phases: requirements planning, user design,
construction, and cutover. The user design and construction phases repeat until the
user confirms that the product meets all requirements.

The researcher chooses the Rapid application development (RAD) because, it


develops higher quality products faster through - Requirements gathering using
focus groups and workshops, performing early prototyping and iterative design
testing and using reusable software components to build prototypes quickly.

Another reason for adopting this methodology is because the Rapid application
development highlights speed and agility. This rapid pace is spearheaded by
RAD’s capability and stress on minimizing the planning stage efforts and
maximizing and fastening the prototype development and later helping in faster
project release times. Hence the researcher can increase his productivity and
improve project outcomes. Rapid application development methodology
effectuates the researcher to deliver the project not just in months but in a matter of
days or weeks. Creating a production-ready application at a faster pace means that
the research can benefit from its early availability, while new functionality
continues to be released at later stages.

3.2 Analysis of the Existing System

23
The existing database for tracking and the reporting user is the Website Tracking
System. This is a system that collects data about the visitors to your site.
Furthermore, most artificially intelligent systems also generate data into a more
meaningful report. Website tracking is when websites collect information about
site users to monitor their online behavior. The practice is used to power many
online services including digital advertising and website analytics. Website
tracking is incredibly common; a 2017 survey found that 79% of websites use
trackers that collect user data.

3.2.1 The advantages of the existing system

1. Many website functions will not work without some form of tracking.

2. Tracking users for analytics purposes is incredibly common.

3. Websites collect data about users to provide them with targeted advertising.

3.2.1 The disadvantages of the existing system


1. However, the prevalence of website tracking and the lack of transparency
about the data websites collect, how they use this data, and who has access
to it, means there are issues with the practice.

2. It is, in part, because of these issues that countries and regions around the
world are introducing laws to regulate the way websites can collect data to
track users.

3.3 Analysis of the Proposed System


The proposed System is more like GPS thing. You do not have your user’s monitor
access but you can still track his activities through suffered URL. Mostly used in
during the website tracking system to get an idea about your user’s demographics.

3.3.1 Description of the New System

24
In our application, we have used Map Views as supported by Google APIs 10 or
higher which would allow the use of app in devices starting from Gingerbread
itself. We have used an Apache Server with PHP & MySQL support for remote
database use. The data transaction from or to the database occurs with the help of
PHP scripts and in the form of JSON objects. The android end of the app handles
this JSON objects through HTTP clients. Onboard compass & map controllers are
enabled. Locations are extracted from the device with the help of the TRACKER
module available. A form of passive TRACKER use, the device decides on the
best content with the information available from different providers. On touching
the overlay on the map, options are asked ranging from extracting address to
locating any other user on the same view.

3.3.2 Advantages of the proposed System

1. With so many people and things in motion, business and government leaders
don't have time to manually track each movement. With location
intelligence, they can create live maps and apps for monitoring. By seeing
what's happening now and analyzing what has already happened, decision-
makers can identify opportunities for growth, safety, and efficiency.
2. Security knows where the criminal is around the clock.
3. If a vehicle is stolen, the real-time tracking system can be used by police to
locate the vehicle.
4. If drivers are being paid an hourly rate, GPS fleet tracking prevents false
time claims and extended trips to job sites.
5. Business owners won’t have to rely on their drivers to record all of their
mileage logs or job arrival and departure logs. All of that information will be
automatically calculated and reported by the real-time tracking system.
3.3.3 Disadvantages of the Proposed System

25
1. One of the biggest flipsides of using GPS tracking devices is that you have
nil privacy. Everyone will know where you are, what you’re doing and every
other detail about your daily movement.
2. Another problem of real time GPS tracker is that it can also be used for
criminal performances. If the tracker falls into the wrong hands, then it could
lead into very difficult situations.
3.4 UML Diagrams

3.4.1 Data Flow diagram of the Existing System

Fig. 3.1 Dataflow Diagram of the Exiting System

26
3.4.2 Data Flow diagram of the proposed System

Start

GPS Initialization

Getting API Response

No Get user
Location?

Yes

Store user Location


into database

Stop

Fig. 3.2 Dataflow Diagram of the Proposed System

27
3.4.3 Use Case Diagram of the Proposed System

Android based location data based and reporting


system

Log in

View Database

Manage Data
Base

Add User USER


ADMIN

Log out

Figure 3.2 use case of the propose system


The admin login, he views the database, managed database, add user and logout.
The user login, view database, and logout.
Designer model is developed to describe the overall layout of the project. Fig 3.1
illustrates in detail the basic model used as reference during the project
implementation service is invoked automatically using our service routine.
Permission has to be set in the Android Manifest file.

28

Figure 3.1 Architecture Diagram


3.4.4 State Diagram of the Proposed System

Fig. 3.4 State Diagram of the Proposed System

29
3.5 Database Design
Task data is stored in the SQLite database and can be viewed using special third
part browser while running the program. Database entries are pulled from the
device in DDMS perspective and downloaded to the user system for further
analysis. Latitude, longitude, distance of interest and essential product details along
with product identification code and shop name are stored in MySQL backend for
shopping offers display.

3.5.1 Entity Relationship Diagram of the Database

Fig. 3.5 E-R Diagram of the Database

30
3.5.2 Schematic Diagram of the Database

Fig. 3.6 Schematic Diagram of the Database

Table 1: User table of the database

Field name Type (Size) Key

User_id INT(11) Primary


username VARCHAR(15)
password VARCHAR(15)
User_type VARCHAR(15)

Table 1: Admin table of the database


Field name Type (Size) Key

admin_id INT(11) Primary


username VARCHAR(15)
password VARCHAR(15)

31
extra VARCHAR(15)
time VARCHAR(8)
longitude VARCHAR(25)
latitude VARCHAR(25)

Table 3: Location table of the database


Field name Type (Size) Key

_id INT(11) Primary


username VARCHAR(15)
extra VARCHAR(15)
time VARCHAR(8)
longitude VARCHAR(25)
latitude VARCHAR(25)

32
CHAPTER FOUR

SYSTEM IMPLEMENTATION AND DESIGN

4.1 System Design

3.5 System Requirements

Hardware
Any Android Enabled Handheld
Android OS Version : Gingerbread & Above
Google Maps API 1.0 Version Compatible
Discount Information
Retailers wishing to publish product discount information can do so by registering
into the webserver. Once done, the administrative rights of uploading discount
information are given to the retailer. Request communication from mobile to the
web server is done through Hyper Text Transfer Protocol (HTTP). Matched
discount information corresponding to latitude and longitude will be passed back to
the Android mobile using JSN format and the same will be displayed.

The android based location devices using PHP, My SQL, HTML, CSS, while my
structured query language was use as a database. the system using data to work. the
system consist of timer function that enable to show time and location of the user.

4.2 System Implementation

After the system has been designed physically in detail, the stage is to transfer the
system into a working one. Implementation is the stage of project during which the

33
design of project is tested. it is the most crucial stage in achieving a system and in
given the users confidence that the new system will work and be effective.

4.3 Sample Shots of Program

The welcome page comprise of an introductory view of what is expect the


program, in the page active splash screen are seen and animation are displayed to
give an interactive word view of the program.

Figure 4.1 Welcome Page

34
Figure 4.2 Registration Page

Registration Page

This page allows the user to register as a new user. In this form we have required
information to be entered to accomplish this process such information includes
Name, address, Contact, Select, Username and Password.

Name ;The name of the user

Address ;The address of the user

35
Contact ;The contact of the user

Select; the user select from the available object

Username ;this is where the user enters the name he /she uses during registration

Password ;this is a code with encryption that allow the user access

After registration, the user is expected to enter the username and password. When
the information entered into the required field, the system connect to the database.

Figure 4.3 Login Page


36
Eclipse is an integrated development environment for multi-language software &
web application development. Its extensible plug-in system helps in customizing
the IDE to work on a particular technology, like Android in this case. It supports
Java as the principal coding language and through plug-ins; it supports C, C++,
Python, Ruby, PHP, JavaScript, Perl etc. Under Eclipse Public License, the SDK is
free and open source. For android application development, we need to download
the Android Development Tools (ADT) plug-in for eclipse and install it. After this,
we need to run the SDK manager so as to download the Android SDKs for
developing onto newer android OS versions and also the Google APIs and other
support functions so as to use Google licensed android services like Maps,
OAUTH 2.0 etc to full use. The eclipse configuration where I have developed the
applications is as follows:

Eclipse : Version Juno (4.2.1) ADT Package : Version 21.0.1 Android SDK Tools :
Revision 21.1 Android SDK Platform-Tools : Revision 16.0.2 Android Support
Library : Revision 12 Android SDK Platform : 4.2.2 – API 17 – Revision 2 2.3.3 –
API 10 – Revision 2 Google APIs : 4.2.2 – API 17 – Revision 2 2.3.3 – API 10 –
Revision 2

Apache HTTP Server

Apache is a web server software. Any web server is either hardware (a computer)
or software (the computer application) and thus it helps deliver content which is
accessed through the computer. It is the back end that provides the support for
scripts to work, databases to seamlessly integrate with the web application. Apache
played a vital role in initial phases of development of World Wide Web. It helps in
implementing core modules for handling server side programming language,
authentication schemes, socket transactions & layer securities. While supporting

37
ftp, it has inbuilt HTML authorizing tool & inbuilt search engine. The large public
library of add-ons helps one to customize the server end. Wamp Server is used to
run a local server on PC or laptop.

PHP Scripting

It serves as a server side scripting language. The interpreter used at server end is a
dedicate PHP processor module and interprets the chunk of code within the
delimiters. Acronym for Hypertext Preprocessor, PHP helps in designing dynamic
web content. PHP code is processed in command-line mode performing desired
operating system operations and producing program output on its standard output
channel. The three main reasons to work with PHP are: first, it fits in greatly with
HTML, being interchangeable with it, and only adds new content. Secondly, its
user interface provides a richer experience as compared to HTML only. Third and
foremost, it’s easy to learn and we can easily get started by using only a few
functions.

MySQL Database

MySQL is a world renowned open source Relational DBMS supporting standard


SQL. At the server end, it can be configured to provide single user or multi user
access to a number of databases and tables. Some of the best features are: cross-
platform support, updatable views, cursors, information schema, query caching etc.
It can easily be integrated into PHP scripts. It is developed, distributed & supported
by Oracle found

38
CHAPTER FIVE

SUMMARY, CONCLUSION AND RECOMMENDATION

5.1 Summary

This work is detecting and saving your current location in the database, it shows
you the place you are, in a particular place

5.2 Conclusion
Future battle in the telecom industry is least expected to be based on the hardware
or the features like SMS and call cost, but the battle would be based on the
enhanced user friendly applications provided by the service provider and
adaptability for such applications provided by device manufacturers. Setting up of
infrastructure for a location based service using the GPS facility, to alert a user on
reaching a desired location is emulated using the Android 2.2 platform and the
desired output is obtained successfully. Thus this Location based intelligent
observer application using GPS tracking is developed so as to add value and
organize users’ task intelligently.

5.3 Recommendation
Invocation of web server and retrieving the relevant discount information into a
mobile device is in progress. Thus marching towards building a complete location
based service .In the same way one control the other applications by means of GPS
locations. It will be very useful for security purposes and to control the activities of
the users in a certain area. For example inside the educational buildings and office
arenas entertainment applications can be restricted to use.

39
References

Badley, R (1999). Understanding computer science for advance levels. London;

Oxford University Press

Brightman ,.(1986). Using computer in an information age. New York; Mc Graw

Hill Books

Charles, J. (1993). Micro computer dictionary and guides. London; Oxford

University Press

Christopher, D. (1997). Visual basic programming version 6.0. India; MacMillan

Computer Publishing.

Idogho O.P, Akpado K., and Agajo J., (2011).” Interactive intranet `portal for

effective management in tertiary institution’’ international journal advance

computer science and applications, Vol. 2, No. 6, pp.122-129

Khan A.I,. Qyarashi R.J,. and khan U.A. (2011). “A comprehensive study of

common pratical Heavy and light weight software Methodologies”,

international journal of computer science issues, Vol.8, Issues 4, No. 2, pp.

Nwachukwu E.O. (1998). Information system development- A Structures

Approach Gensis concept, Owerri, Nigeria, pp. 34-36

Oyelabi, a. (2007). Education and computer. Akure; Onibonoje Ltd.

Reto Meier , Professional Android 2 Application Development, Marko Gargenta,

40
Learning Android, O’Reily

Sandeep et al.(2011) significant of location based services

Travis Cornelius, New Boston Series : Android Application Development

Tutorials

Wei-Meng Lee, 2011, Beginning Android Application Development, Wiley India

Pvt. Ltd.

Xianhua et al. (2010). Anatomy of Android Architecture.

Zohaib el,al (2008). Mobile devices for a location aware computing

Web Resource : http://www.vogella.com

Web Resource : http://www.stackoverflow.com

Web Resource : http://developer.android.com/index.html

Web Resource : https://developers.google.com/maps/

41
APPENDIX (B) CODES
<?php include('header.php'); ?>
<?php include('admin/connect.php'); ?>
<body>
<div id="background">
<div id="page">
<?php include ('nav_sidebar.php');?>
<div id="con\tent">
<div id="header">

</div>
<div id="body">

<h3>Moozikay Melo's</h3>
<div class="signup">
<a href="order.php" class="btn
btn-info"><i class="icon-signin"></i>&nbsp;Login</a>
</div>
<hr>

<div class="row-fluid">
<div class="span12">

<div class="row-fluid">
<div class="span2">

</div>
<div class="span6">
<?php
if
(isset($_POST['save'])) {

$pass_error =
'';

42
$e_firstname =
'';
$e_lastname =
'';
$e_password =
'';
$e_rpassword =
'';
$e_address =
'';
$e_cn = '';

$e = '';

$password =
$_POST['password'];
$rpassword =
$_POST['rpassword'];
$firstname =
$_POST['firstname'];
$lastname =
$_POST['lastname'];
$eaddress =
$_POST['eaddress'];
$address =
$_POST['address'];
$cn =
$_POST['cn'];

$pattern =
"/^([a-z0-9])(([-a-z0-9._])*([a-z0-9]))*\@([a-z0-9])
(([a-z0-9-])*([a-z0-9]))+(\.([a-z0-9])([-a-z0-9_-])?
([a-z0-9])+)+$/i";
//Input
Validations

43
if (!
preg_match($pattern, $eaddress)) {
$e =
"Invalid Email Address";
}

if ($firstname
== "") {

$e_firstname = 'FirstName is Required';


}
if ($lastname
== "") {

$e_lastname
= 'LastName is Required';
}
if ($address ==
"") {

$e_address
= 'Address is Required';
}

if ($cn == "")
{

$e_cn =
'Contact Number is Required';
}
if ($password !
= $rpassword) {

44
$pass_error
= 'Password Does Not Match';
} else {
$pass_error
= '';
}
if ($password
== "") {

$e_password
= 'Password is Required';
}
if ($rpassword
== "") {

$e_rpassword = 'Re Type Password';


}

if
($firstname != "" && $password == $rpassword &&
$lastname != "" && $eaddress != "" && $cn != "" &&
$address != "" && preg_match($pattern,$eaddress) ) {

mysql_query("insert into tb_member


(Firstname,Lastname,Email,Password,Contact_Number,addre
ss) values

('$firstname','$lastname','$eaddress','$password','$cn'
,'$address')") or die(mysql_error());
?>

<script
type="text/javascript">

45
alert("You are Succesfully Register Please Login Your
Account");

window.location= "order.php";
</script>

<?php
}
}
?>

<form class="form-
horizontal" method="post" enctype="multipart/form-
data">

<div
class="alert alert-info"><strong>Sign Up</strong></div>
<div
class="control-group">
<label
class="control-label" for="inputEmail">Email
Address</label>
<div
class="controls">
<input
type="email" name="eaddress" id="inputEmail"
placeholder="Email Address">
<?php if (isset($_POST['save'])) { ?>

<div class="wrongs"> <?php echo $e; ?></div>

<?php } ?>

46
</div>
</div>
<div
class="control-group">
<label
class="control-label"
for="inputPassword">Password</label>
<div
class="controls">
<input
type="password" name="password" id="inputPassword"
placeholder="Password">
<?php if (isset($_POST['save'])) { ?>

<div class="wrongs"> <?php echo $e_password; ?></div>

<?php } ?>
</div>
</div>
<div
class="control-group">
<label
class="control-label" for="inputPassword">Re-Type
Password</label>
<div
class="controls">
<input
type="password" name="rpassword" id="inputPassword"
placeholder="Re-Type Password">
<!--
error -->
<?php if (isset($_POST['save'])) { ?>

47
<div class="wrongs"> <?php echo $e_rpassword; ?>
</div>

<?php }
?>

<?php if (isset($_POST['save'])) { ?>

<div class="wrongs"><?php echo $pass_error; ?></div>

<?php } ?>
<!--
error -->
</div>

</div>
<div
class="control-group">
<label
class="control-label"
for="inputEmail">Firstname</label>
<div
class="controls">
<input
type="text" name="firstname" id="inputEmail"
placeholder="Firstname">
<?php if (isset($_POST['save'])) { ?>

<div class="wrongs"> <?php echo $e_firstname; ?>


</div>

<?php } ?>

48
</div>
</div>
<div
class="control-group">
<label
class="control-label" for="inputEmail">Lastname</label>
<div
class="controls">
<input
type="text" name="lastname" id="inputEmail"
placeholder="Lastname">
<?php if (isset($_POST['save'])) { ?>

<div class="wrongs"> <?php echo $e_lastname; ?>


</div>

<?php } ?>
</div>
</div>

<div
class="control-group">
<label
class="control-label" for="inputEmail">Address</label>
<div
class="controls">
<input
type="text" name="address" id="inputEmail"
placeholder="Address">
<?php if (isset($_POST['save'])) { ?>

<div class="wrongs"> <?php echo $e_address; ?> </div>

49
<?php } ?>
</div>
</div>

<div
class="control-group">
<label
class="control-label" for="inputEmail">Contact
Number</label>
<div
class="controls">
<input
type="text" name="cn" id="inputEmail"
placeholder="Contact Number">
<?php if (isset($_POST['save'])) { ?>

<div class="wrongs"> <?php echo $e_cn; ?> </div>

<?php } ?>
</div>
</div>

<div
class="control-group">
<div
class="controls">

<button
type="submit" name="save" class="btn btn-success"><i
class="icon-pencil"></i>&nbsp;Sign Up</button>
</div>
</div>

50
</form>

</div>
<div class="span3">

</div>
</div>
</div>
</div>

</div>
<div id="footer">
<?php include('footer.php'); ?>
</div>
</div>
</div>
</div>
</body>

</html>
<?xml version="1.0" encoding="utf-8"?>
<manifest
xmlns:android="http://schemas.android.com/apk/res/andro
id"
package="com.aditi.familytracker"

51
android:versionCode="1"
android:versionName="1.0" >

<uses-sdk
android:minSdkVersion="8"
android:targetSdkVersion="21" />

<uses-permission
android:name="com.current.googlemapsv2.permission.MAPS_
RECEIVE" />
<uses-permission
android:name="android.permission.ACCESS_NETWORK_STATE"
/>
<uses-permission
android:name="android.permission.INTERNET" />
<uses-permission
android:name="com.google.android.providers.gsf.permissi
on.READ_GSERVICES" />
<uses-permission
android:name="android.permission.WRITE_EXTERNAL_STORAGE
" />
<uses-permission
android:name="android.permission.INTERNET" />
<uses-permission
android:name="android.permission.ACCESS_NETWORK_STATE"
/>
<uses-permission
android:name="android.permission.ACCESS_WIFI_STATE" />
<uses-permission
android:name="android.permission.WRITE_EXTERNAL_STORAGE
" />
<!-- Required to show current location -->

52
<uses-permission
android:name="android.permission.ACCESS_COARSE_LOCATION
" />
<uses-permission
android:name="android.permission.ACCESS_FINE_LOCATION"
/>

<application
android:allowBackup="true"
android:name="com.aditi.familytracker.MyApp"
android:icon="@drawable/logos"
android:label="@string/app_name"
android:theme="@style/AppTheme" >
<activity
android:name=".SplashActivity"
android:label="@string/app_name"
android:screenOrientation="portrait" >
<intent-filter>
<action
android:name="android.intent.action.MAIN" />

<category
android:name="android.intent.category.LAUNCHER" />
</intent-filter>
</activity>
<activity

android:name="com.aditi.familytracker.LoginActivity"
android:label="@string/app_name"
android:screenOrientation="portrait">
</activity>
<activity

android:name="com.aditi.familytracker.HomeActivity"
android:label="@string/app_name"

53
android:screenOrientation="portrait" >
</activity>
<activity

android:name="com.aditi.familytracker.SignupActivtiy"
android:label="@string/app_name"
android:screenOrientation="portrait">
</activity>
<meta-data

android:name="com.google.android.gms.version"

android:value="@integer/google_play_services_version" /
>
<meta-data

android:name="com.google.android.maps.v2.API_KEY"
android:value="AIzaSyBHzT9r-
vBXAtOjzlt7LrdLgArw5UL2NQI" />

</application>

</manifest>

54
APPENDIX (A) INTERFACE

55
56
57

You might also like