android based database for tracking and reporting the user location
android based database for tracking and reporting the user location
INTRODUCTION
1.1 Background of the Study
With the development of the information era, people hope to access data anywhere
and anytime. To meet this requirement, mobile computing is researched as the
combination of computing and mobile communication technology. Mobile
communication gradually changes its trends from simple voice communications to
complex data communications. Short messages and mobile internet business have
been widely used in Nigeria, which are the best cases (Mai, 2014).
Location Based Service (LBS) is a platform that provides information services
based on the current or a known location, supported by the electronic map
platform. The location information (latitude and longitude coordinates) of mobile
end user can be obtained through the mobile communication network or the Global
Navigation Satellite Systems (GNSS). The research focusing on LBS is vast and a
number of these services have been implemented and tested. Tourist information
systems are ideal examples for such applications, for example, Tourist Guide
project, CyberGuide project and PinPoint Tourist Guide (Roth, 2019).
An Android App can be very useful in determining the location of the user. By
identifying a user’s location in an Android app can be really useful. Users take
their mobiles all over the place and are frequently using them on the go, and as
developers we can benefit from that by providing a more appropriate familiarity
based on their current location.
Mobile has become a vital communication tool which everyone prefers to possess
and carry along. This technology has laid a foundation to overcome the traditional
desktop-based approach of obtaining information. Mark Weiser the father of
Pervasive Computing in his paper entitled, ‘The Computers of 21st Century,
‘envisioned that, “The technology would weave into the fabric of everyday life
1
until they are indistinguishable from it, “this is the vision and has come true in this
current 21st century. Following the vision of Mark Weiser, researchers at Carnegie
Mellon University in a project Aura demonstrated that, human distractions could
be minimized by Ubiquitous systems which will have to be proactive in
anticipating the demands, thus self-tunable so as to give a better response to the
future hassles. The ability to sense and process a context form as a fundamental
requirement for a system to be proactive. Hence, designing a context -aware
application would pave way to satisfy the future growing requirements of user.
Most promising type of contextual information is the proximity selection known as
Location Based Service (LBS). Tracking location of a mobile device accurately
has been a challenging research topic for decades. Global Positioning Systems
(TRACKER) is a top priority technology used for locating a device position
accurately. Methodology for tracking can be done using a TRACKER receiver
which is an additional hardware integrated in most of mobile equipment. We have
used TRACKER as the approach idea for location tracking. The platform used for
development is Android Operating System, as described Being a mobile operating
system, android operating system (OS) is a modified version of Linux, originally
developed by a start-up, Android, Inc. As Google entered mobile market, it
purchased Android and, in a bid, to encourage independent development works, it
released the developer tools under the open-source Apache License. The
permissive licensing allows the operating system (OS) and related software to be
modified and distributed by enthusiastic developers, network operators & device
manufacturers.
This research work presents some easy steps which will create an App that will
identify the user location easily. This proposed System will occupies less space on
the mobile device and it can be installed on any Android based mobile like Redmi
2
and OPPO etc. While developing a location-aware application for Android, we can
make use of GPS and Android's Network Location Provider to obtain the user
location. Although GPS is most precise, but it only useful in outdoors, it quickly
consumes battery power, and doesn't return the location as quickly as users’
necessity. Android's Network Location Provider verifies user location using cell
tower and Wi-Fi signals, providing location information in a way that works
indoors and outdoors, responds faster, and uses less battery power. To get the user
location in an application, we can use both GPS and the Network Location
Provider, or just one.
1.2 Statement of the problem
The potential for geolocation to transform apps is almost limitless. As a central
feature of delivery, fleets and an advertiser's dream, mobile location data is now
part of everyday life. But getting quality location data without discrepancies that
could severely alter the user's experience is not a guarantee. GPS can be inaccurate
and battery-draining, making it impossible to target users at the right time. For app
developers, location features must be done right.
Environment, device state, and satellite position all impact accuracy and precision.
Dense urban environments usually mean less accurate location data. Buildings,
walls, trees or any high obstacle can cause signal blocks, as satellites struggle to
send signals to a user without interference. Equally, if there are not enough
satellites, GPS receivers struggle to calculate location accurately.
3
Some of the common problems this system is intended to solve include:
1. Difficulty in Tracking all users’ locations
2. Challenges of retrieved from an online database so as to centrally control
the permissions for viewing.
3. Difficulty in restricting user access, user authentication.
4. The challenge of Periodic refreshing so as to be present so that each time
the geo–location changes or after a fixed interval of time the values in
database should be updated.
1.3 Aim and Objectives of the Study
The aim of the research work is to Develop an Android Based Database for
Tracking and Reporting the User Location. With the following objectives:
1. To develop a more effective location-based tracking facility.
2. For retrieving information on mobile device.
3. To store user’s location in SQLite database.
4
1.6 Limitation of the Study
The researcher faced some limitations during the course of this research. Some of
these limitations/constraints include;
i. Time constraint: Time factor was the major constraint, as the time frame to
submit the project was too short for rigorous research.
ii. Financial constraint: Lack of adequate finance to fund the researcher as to
the purchase of data to review related works online was another major
setback.
Google Maps: Google maps provide the map of an open Application programming
interface (Google maps API). Developers can easily link the Google maps service
to the application.
5
MY SQL: MySQL is a fast, easy-to-use RDBMS being used for many small and
big businesses. MySQL works on many operating systems and with many
languages including PHP, PERL, C, C++, JAVA etc MySQL works very quickly
and works well even with large data sets.
6
Updated: More recent and usually improved, form or something, especially
something that is regularly changed.
7
CHAPTER TWO
LITERATURE REVIEW
Goldman’s diagnosis of what went wrong in Gettier’s examples was that the thing
that made one’s belief true in the examples was causally disconnected from the
thing that made a person hold the belief. One could justifiably and truly believe (on
good evidence) that p (= that Jones owned a Ford or Brown was in Barcelona). Yet
one may fail to know that p since one’s belief that p could be true by accident
because the thing that brought one to believe was not connected to the thing that
made one’s belief true. I may believe Jones owns a Ford because I rode in his new
Ford and saw the bill of sale before the car was repossessed, and so on. Yet, what
makes my belief true is the accident (of which I am unaware) that today Brown is
indeed in Barcelona. My belief, though true and justified, is true by accident since
8
Jones’s Ford was repossessed and I knew nothing of the specific whereabouts of
Brown.
Goldman’s diagnosis, in the face of Gettier’s examples, and many other cases of
perception, testimony, and memory where we would agree that we do have
knowledge, was that the accident that bars knowledge would be removed if one’s
nose were rubbed in the truth, as it were. That is, if there were an unbroken causal
chain running from the thing that makes one’s belief true to one’s belief, then one’s
true belief would be knowledge. No specific role need be played by one’s
justification for the belief. At least, that was the main hope behind Goldman’s
causal theory.
It later turned out that beliefs causally connected with the truth could still be true
by accident, and the new tracking theory approach to knowledge had to be revised
further. Still, the bold new approach, once begun by Goldman, moved forward
over several iterations.
Other epistemologists who helped develop the tracking theories were Armstrong
(2013), and Dretske (2019, 2020, 2021), and, of course, the “tracking” name comes
from Robert Nozick’s (2021) account, which I’ll discuss later.
The Cognitive theories on the other hand are characterized by their focus on the
idea that how and what people think leads to the arousal of emotions and that
certain thoughts and beliefs lead to disturbed emotions and behaviors and others
lead to healthy emotions and adaptive behavior. In this chapter, we review
cognitive theories (CTs): their definition, historical evolution, theory of personality
and psychopathology, clinical assessment, and treatment process, including the
psychotherapy relationship (DiGiuseppe, et at., 2016).
Siriteanu A.et. al. (2013) presents the creation of Social Network in which the
users are being alerted when their friends are around. Available Android location
services like GPS technology, wireless and mobile towers are used to find an
approximate location of a mobile phone running this program and then sharing the
location information through the Meet You or via SMS.
Kumar N. (2012) describes a system using which you can locate the mobile device
using another mobile device by even sitting at your home. The system only
requires the inbuilt GPS and GPRS in the device whose location is to be tracked.
“Where are you? – A Location Awareness System” is a project that helps you to
locate a friend or a known person without informing that person.
Li Liu.et. al. (2012) explains the design and implementation of Android mobile
operating system-based group communication and navigation system. By use of
GPS and Google Map, the system implements a geographic location and route
planning between user and his friend. The system provides a convenient and
efficient platform for users travel and connection between friends.
Shrestha R.et. al. (2012) presents android-based location and message sharing
system which provides a secured two-way communication between web server and
android based application. The proposed system uses Java programming language
10
for android mobile user application, PHP programming language as web server,
MySQL as external database to store the data. Symmetric cryptography is used to
assure secured communication between android device and web server.
Chandra A.et. al. (2011) discusses Location Based Service which is a key factor
for future mobile application. The system is developed with J2ME API based on
providing location-based service using GPS. The application is implemented as
client server system which helps users to locate friends and family with whom he
wants to share his location.
Al-Suwaidi G Bet. al. (2009) presents Location Based Services (LBS) for mobile
applications using Global Positioning System (GPS). The application is
implemented as a client-server system that helps users to locate their family
members and receive alerts when friends are nearby. Mobile application developed
using J2ME API at client side and Server was implemented using PHP and
Database MySQL which is open source.
11
drivers to send complaints regarding public infrastructure so that better services are
provided to the public. The implementation of procedure for road maintenance is
done with the combination of GPS and GSM technologies.
12
positioning beacons, to provide services based on the user's geographical location.
Although location-based technologies have been commercially available for almost
two decades, the applications and services that use geodata have recently become
mainstream, thanks to the widespread use of Android and Apple smartphones and
tablets.
For location-based services to operate, the following four basic components are
required:
13
By law, location-based services must be permission-based, so the end user must
opt in to the service in order to use it. In most cases, this means the user turns on
the location-based service application and accepts a request to enable the service to
know the device's location. For example, a user can enable or disable Apple's
iPhone Location Services for a specific app, as well as specify whether the
application can pull geodata at any time, only when the app is in use or ask each
time a location is needed. This process is similar with Android devices as well.
14
navigation and travel information, including real-time traffic notifications;
store and service locators;
inventory monitoring;
anti-theft prevention;
proximity-based marketing;
roadside assistance;
social networking;
surveillance; and
augmented reality.
15
containing time information from atomic clocks, current satellite positions etc.
Nominal time to get a location is around 30-60 seconds. The same information
needs to be confirmed by at least two other satellites. Only Using Mobile Services
The user location in an area is calculated with the help of signal measurements
with the information received from cell towers. Information analyzed are angle to
approach towers, multipath fading characteristics with signal strength comparisons.
No GPS module used.
Assisted GPS
This is what a cell phone normally uses for mapping and GPS use purposes. User
location information is retrieved within 5-10 seconds. The GPS components are
shared with other mobile components and hence simultaneous use of GPS and
normal voice/video usage is done. First, gross positioning information from service
provider based on what cell tower is being accessed and the same is fed to the GPS
receiver. Next, the phone switches from phone to GPS mode for around 0.1
seconds and collects raw GPS data from satellites. It then switches back to phone
mode and sends the data to the service provider to be analyzed.
The module still gets data from the service provider such as tower positioning and
satellites to hear from. Switching is for 1 second but after that the receiver keeps
track of information with very low power drawn from circuit.
16
phone using multilateration of mobile radio signals, the phone must emit at least
the idle signal to contact nearby antenna towers and does not require an active call.
The Global System for Mobile Communications (GSM) is based on the phone's
signal strength to nearby antenna masts (BBC News, 2010).
Mobile positioning may be used for location-based services that disclose the actual
coordinates of a mobile phone. Telecommunication companies use this to
approximate the location of a mobile phone, and thereby also its user (Shu Wang,
Jungwon Min and Byung K. Yi, 2018).
The location of a mobile phone can be determined using the service provider's
network infrastructure. The advantage of network-based techniques, from a service
provider's point of view, is that they can be implemented non-intrusively without
affecting handsets. Network-based techniques were developed many years prior to
the widespread availability of GPS on handsets (Laitinen, et al., 2021).
Advanced systems determine the sector in which the mobile phone is located and
roughly estimate also the distance to the base station. Further approximation can be
done by interpolating signals between adjacent antenna towers. Qualified services
may achieve a precision of down to 50 meters in urban areas where mobile traffic
and density of antenna towers (base stations) is sufficiently high.[4] Rural and
17
desolate areas may see miles between base stations and therefore determine
locations less precisely.
The accuracy of network-based techniques varies, with cell identification being the
least accurate (due to differential signals transposing between towers, otherwise
known as "bouncing signals") and triangulation as moderately accurate, and newer
"advanced forward link trilateration" timing methods as the most accurate. The
accuracy of network-based techniques is both dependent on the concentration of
cell base stations, with urban environments achieving the highest possible accuracy
because of the higher number of cell towers, and the implementation of the most
current timing methods (Wang, S.S.; Wylie-Green, M.P., 2014).
Using the subscriber identity module (SIM) in GSM and Universal Mobile
Telecommunications System (UMTS) handsets, it is possible to obtain raw radio
measurements from the handset. Available measurements include the serving Cell
19
ID, round-trip time, and signal strength. The type of information obtained via the
SIM can differ from that which is available from the handset. For example, it may
not be possible to obtain any raw measurements from the handset directly, yet still
obtain measurements via the SIM (Ted Gibbons, 2018).
Crowdsourced Wi-Fi data can also be used to identify a handset's location. The
poor performance of the GPS-based methods in indoor environment and the
increasing popularity of Wi-Fi have encouraged companies to design new and
feasible methods to carry out Wi-Fi-based indoor positioning. Most smartphones
combine Global Navigation Satellite Systems (GNSS), such as GPS and
GLONASS, with Wi-Fi positioning systems (Pourhomayoun, 2012).
There are also hybrid positioning systems which combine several different location
approaches to position mobile devices by Wi-Fi, WiMAX, GSM, LTE, IP
addresses, and network environment data.
20
Location Tracking through Google Latitude
21
service. A few data services such as Maxmind are provide that maintains the tables
including IP addresses with the locations that matches. The important requirement
of general user is to get the Location of his family member. This can be done
through sending and receiving SMS.
22
CHAPTER THREE
RESEARCH METHODOLOGY
3.1 Methodology
The design methodology adopted in this research is the Rapid application
development (RAD) method. This is a condensed development process that
produces a high-quality system with low investment costs. The rapid application
development method contains four phases: requirements planning, user design,
construction, and cutover. The user design and construction phases repeat until the
user confirms that the product meets all requirements.
Another reason for adopting this methodology is because the Rapid application
development highlights speed and agility. This rapid pace is spearheaded by
RAD’s capability and stress on minimizing the planning stage efforts and
maximizing and fastening the prototype development and later helping in faster
project release times. Hence the researcher can increase his productivity and
improve project outcomes. Rapid application development methodology
effectuates the researcher to deliver the project not just in months but in a matter of
days or weeks. Creating a production-ready application at a faster pace means that
the research can benefit from its early availability, while new functionality
continues to be released at later stages.
23
The existing database for tracking and the reporting user is the Website Tracking
System. This is a system that collects data about the visitors to your site.
Furthermore, most artificially intelligent systems also generate data into a more
meaningful report. Website tracking is when websites collect information about
site users to monitor their online behavior. The practice is used to power many
online services including digital advertising and website analytics. Website
tracking is incredibly common; a 2017 survey found that 79% of websites use
trackers that collect user data.
1. Many website functions will not work without some form of tracking.
3. Websites collect data about users to provide them with targeted advertising.
2. It is, in part, because of these issues that countries and regions around the
world are introducing laws to regulate the way websites can collect data to
track users.
24
In our application, we have used Map Views as supported by Google APIs 10 or
higher which would allow the use of app in devices starting from Gingerbread
itself. We have used an Apache Server with PHP & MySQL support for remote
database use. The data transaction from or to the database occurs with the help of
PHP scripts and in the form of JSON objects. The android end of the app handles
this JSON objects through HTTP clients. Onboard compass & map controllers are
enabled. Locations are extracted from the device with the help of the TRACKER
module available. A form of passive TRACKER use, the device decides on the
best content with the information available from different providers. On touching
the overlay on the map, options are asked ranging from extracting address to
locating any other user on the same view.
1. With so many people and things in motion, business and government leaders
don't have time to manually track each movement. With location
intelligence, they can create live maps and apps for monitoring. By seeing
what's happening now and analyzing what has already happened, decision-
makers can identify opportunities for growth, safety, and efficiency.
2. Security knows where the criminal is around the clock.
3. If a vehicle is stolen, the real-time tracking system can be used by police to
locate the vehicle.
4. If drivers are being paid an hourly rate, GPS fleet tracking prevents false
time claims and extended trips to job sites.
5. Business owners won’t have to rely on their drivers to record all of their
mileage logs or job arrival and departure logs. All of that information will be
automatically calculated and reported by the real-time tracking system.
3.3.3 Disadvantages of the Proposed System
25
1. One of the biggest flipsides of using GPS tracking devices is that you have
nil privacy. Everyone will know where you are, what you’re doing and every
other detail about your daily movement.
2. Another problem of real time GPS tracker is that it can also be used for
criminal performances. If the tracker falls into the wrong hands, then it could
lead into very difficult situations.
3.4 UML Diagrams
26
3.4.2 Data Flow diagram of the proposed System
Start
GPS Initialization
No Get user
Location?
Yes
Stop
27
3.4.3 Use Case Diagram of the Proposed System
Log in
View Database
Manage Data
Base
Log out
28
29
3.5 Database Design
Task data is stored in the SQLite database and can be viewed using special third
part browser while running the program. Database entries are pulled from the
device in DDMS perspective and downloaded to the user system for further
analysis. Latitude, longitude, distance of interest and essential product details along
with product identification code and shop name are stored in MySQL backend for
shopping offers display.
30
3.5.2 Schematic Diagram of the Database
31
extra VARCHAR(15)
time VARCHAR(8)
longitude VARCHAR(25)
latitude VARCHAR(25)
32
CHAPTER FOUR
Hardware
Any Android Enabled Handheld
Android OS Version : Gingerbread & Above
Google Maps API 1.0 Version Compatible
Discount Information
Retailers wishing to publish product discount information can do so by registering
into the webserver. Once done, the administrative rights of uploading discount
information are given to the retailer. Request communication from mobile to the
web server is done through Hyper Text Transfer Protocol (HTTP). Matched
discount information corresponding to latitude and longitude will be passed back to
the Android mobile using JSN format and the same will be displayed.
The android based location devices using PHP, My SQL, HTML, CSS, while my
structured query language was use as a database. the system using data to work. the
system consist of timer function that enable to show time and location of the user.
After the system has been designed physically in detail, the stage is to transfer the
system into a working one. Implementation is the stage of project during which the
33
design of project is tested. it is the most crucial stage in achieving a system and in
given the users confidence that the new system will work and be effective.
34
Figure 4.2 Registration Page
Registration Page
This page allows the user to register as a new user. In this form we have required
information to be entered to accomplish this process such information includes
Name, address, Contact, Select, Username and Password.
35
Contact ;The contact of the user
Username ;this is where the user enters the name he /she uses during registration
Password ;this is a code with encryption that allow the user access
After registration, the user is expected to enter the username and password. When
the information entered into the required field, the system connect to the database.
Eclipse : Version Juno (4.2.1) ADT Package : Version 21.0.1 Android SDK Tools :
Revision 21.1 Android SDK Platform-Tools : Revision 16.0.2 Android Support
Library : Revision 12 Android SDK Platform : 4.2.2 – API 17 – Revision 2 2.3.3 –
API 10 – Revision 2 Google APIs : 4.2.2 – API 17 – Revision 2 2.3.3 – API 10 –
Revision 2
Apache is a web server software. Any web server is either hardware (a computer)
or software (the computer application) and thus it helps deliver content which is
accessed through the computer. It is the back end that provides the support for
scripts to work, databases to seamlessly integrate with the web application. Apache
played a vital role in initial phases of development of World Wide Web. It helps in
implementing core modules for handling server side programming language,
authentication schemes, socket transactions & layer securities. While supporting
37
ftp, it has inbuilt HTML authorizing tool & inbuilt search engine. The large public
library of add-ons helps one to customize the server end. Wamp Server is used to
run a local server on PC or laptop.
PHP Scripting
It serves as a server side scripting language. The interpreter used at server end is a
dedicate PHP processor module and interprets the chunk of code within the
delimiters. Acronym for Hypertext Preprocessor, PHP helps in designing dynamic
web content. PHP code is processed in command-line mode performing desired
operating system operations and producing program output on its standard output
channel. The three main reasons to work with PHP are: first, it fits in greatly with
HTML, being interchangeable with it, and only adds new content. Secondly, its
user interface provides a richer experience as compared to HTML only. Third and
foremost, it’s easy to learn and we can easily get started by using only a few
functions.
MySQL Database
38
CHAPTER FIVE
5.1 Summary
This work is detecting and saving your current location in the database, it shows
you the place you are, in a particular place
5.2 Conclusion
Future battle in the telecom industry is least expected to be based on the hardware
or the features like SMS and call cost, but the battle would be based on the
enhanced user friendly applications provided by the service provider and
adaptability for such applications provided by device manufacturers. Setting up of
infrastructure for a location based service using the GPS facility, to alert a user on
reaching a desired location is emulated using the Android 2.2 platform and the
desired output is obtained successfully. Thus this Location based intelligent
observer application using GPS tracking is developed so as to add value and
organize users’ task intelligently.
5.3 Recommendation
Invocation of web server and retrieving the relevant discount information into a
mobile device is in progress. Thus marching towards building a complete location
based service .In the same way one control the other applications by means of GPS
locations. It will be very useful for security purposes and to control the activities of
the users in a certain area. For example inside the educational buildings and office
arenas entertainment applications can be restricted to use.
39
References
Hill Books
University Press
Computer Publishing.
Idogho O.P, Akpado K., and Agajo J., (2011).” Interactive intranet `portal for
Khan A.I,. Qyarashi R.J,. and khan U.A. (2011). “A comprehensive study of
40
Learning Android, O’Reily
Tutorials
Pvt. Ltd.
41
APPENDIX (B) CODES
<?php include('header.php'); ?>
<?php include('admin/connect.php'); ?>
<body>
<div id="background">
<div id="page">
<?php include ('nav_sidebar.php');?>
<div id="con\tent">
<div id="header">
</div>
<div id="body">
<h3>Moozikay Melo's</h3>
<div class="signup">
<a href="order.php" class="btn
btn-info"><i class="icon-signin"></i> Login</a>
</div>
<hr>
<div class="row-fluid">
<div class="span12">
<div class="row-fluid">
<div class="span2">
</div>
<div class="span6">
<?php
if
(isset($_POST['save'])) {
$pass_error =
'';
42
$e_firstname =
'';
$e_lastname =
'';
$e_password =
'';
$e_rpassword =
'';
$e_address =
'';
$e_cn = '';
$e = '';
$password =
$_POST['password'];
$rpassword =
$_POST['rpassword'];
$firstname =
$_POST['firstname'];
$lastname =
$_POST['lastname'];
$eaddress =
$_POST['eaddress'];
$address =
$_POST['address'];
$cn =
$_POST['cn'];
$pattern =
"/^([a-z0-9])(([-a-z0-9._])*([a-z0-9]))*\@([a-z0-9])
(([a-z0-9-])*([a-z0-9]))+(\.([a-z0-9])([-a-z0-9_-])?
([a-z0-9])+)+$/i";
//Input
Validations
43
if (!
preg_match($pattern, $eaddress)) {
$e =
"Invalid Email Address";
}
if ($firstname
== "") {
$e_lastname
= 'LastName is Required';
}
if ($address ==
"") {
$e_address
= 'Address is Required';
}
if ($cn == "")
{
$e_cn =
'Contact Number is Required';
}
if ($password !
= $rpassword) {
44
$pass_error
= 'Password Does Not Match';
} else {
$pass_error
= '';
}
if ($password
== "") {
$e_password
= 'Password is Required';
}
if ($rpassword
== "") {
if
($firstname != "" && $password == $rpassword &&
$lastname != "" && $eaddress != "" && $cn != "" &&
$address != "" && preg_match($pattern,$eaddress) ) {
('$firstname','$lastname','$eaddress','$password','$cn'
,'$address')") or die(mysql_error());
?>
<script
type="text/javascript">
45
alert("You are Succesfully Register Please Login Your
Account");
window.location= "order.php";
</script>
<?php
}
}
?>
<form class="form-
horizontal" method="post" enctype="multipart/form-
data">
<div
class="alert alert-info"><strong>Sign Up</strong></div>
<div
class="control-group">
<label
class="control-label" for="inputEmail">Email
Address</label>
<div
class="controls">
<input
type="email" name="eaddress" id="inputEmail"
placeholder="Email Address">
<?php if (isset($_POST['save'])) { ?>
<?php } ?>
46
</div>
</div>
<div
class="control-group">
<label
class="control-label"
for="inputPassword">Password</label>
<div
class="controls">
<input
type="password" name="password" id="inputPassword"
placeholder="Password">
<?php if (isset($_POST['save'])) { ?>
<?php } ?>
</div>
</div>
<div
class="control-group">
<label
class="control-label" for="inputPassword">Re-Type
Password</label>
<div
class="controls">
<input
type="password" name="rpassword" id="inputPassword"
placeholder="Re-Type Password">
<!--
error -->
<?php if (isset($_POST['save'])) { ?>
47
<div class="wrongs"> <?php echo $e_rpassword; ?>
</div>
<?php }
?>
<?php } ?>
<!--
error -->
</div>
</div>
<div
class="control-group">
<label
class="control-label"
for="inputEmail">Firstname</label>
<div
class="controls">
<input
type="text" name="firstname" id="inputEmail"
placeholder="Firstname">
<?php if (isset($_POST['save'])) { ?>
<?php } ?>
48
</div>
</div>
<div
class="control-group">
<label
class="control-label" for="inputEmail">Lastname</label>
<div
class="controls">
<input
type="text" name="lastname" id="inputEmail"
placeholder="Lastname">
<?php if (isset($_POST['save'])) { ?>
<?php } ?>
</div>
</div>
<div
class="control-group">
<label
class="control-label" for="inputEmail">Address</label>
<div
class="controls">
<input
type="text" name="address" id="inputEmail"
placeholder="Address">
<?php if (isset($_POST['save'])) { ?>
49
<?php } ?>
</div>
</div>
<div
class="control-group">
<label
class="control-label" for="inputEmail">Contact
Number</label>
<div
class="controls">
<input
type="text" name="cn" id="inputEmail"
placeholder="Contact Number">
<?php if (isset($_POST['save'])) { ?>
<?php } ?>
</div>
</div>
<div
class="control-group">
<div
class="controls">
<button
type="submit" name="save" class="btn btn-success"><i
class="icon-pencil"></i> Sign Up</button>
</div>
</div>
50
</form>
</div>
<div class="span3">
</div>
</div>
</div>
</div>
</div>
<div id="footer">
<?php include('footer.php'); ?>
</div>
</div>
</div>
</div>
</body>
</html>
<?xml version="1.0" encoding="utf-8"?>
<manifest
xmlns:android="http://schemas.android.com/apk/res/andro
id"
package="com.aditi.familytracker"
51
android:versionCode="1"
android:versionName="1.0" >
<uses-sdk
android:minSdkVersion="8"
android:targetSdkVersion="21" />
<uses-permission
android:name="com.current.googlemapsv2.permission.MAPS_
RECEIVE" />
<uses-permission
android:name="android.permission.ACCESS_NETWORK_STATE"
/>
<uses-permission
android:name="android.permission.INTERNET" />
<uses-permission
android:name="com.google.android.providers.gsf.permissi
on.READ_GSERVICES" />
<uses-permission
android:name="android.permission.WRITE_EXTERNAL_STORAGE
" />
<uses-permission
android:name="android.permission.INTERNET" />
<uses-permission
android:name="android.permission.ACCESS_NETWORK_STATE"
/>
<uses-permission
android:name="android.permission.ACCESS_WIFI_STATE" />
<uses-permission
android:name="android.permission.WRITE_EXTERNAL_STORAGE
" />
<!-- Required to show current location -->
52
<uses-permission
android:name="android.permission.ACCESS_COARSE_LOCATION
" />
<uses-permission
android:name="android.permission.ACCESS_FINE_LOCATION"
/>
<application
android:allowBackup="true"
android:name="com.aditi.familytracker.MyApp"
android:icon="@drawable/logos"
android:label="@string/app_name"
android:theme="@style/AppTheme" >
<activity
android:name=".SplashActivity"
android:label="@string/app_name"
android:screenOrientation="portrait" >
<intent-filter>
<action
android:name="android.intent.action.MAIN" />
<category
android:name="android.intent.category.LAUNCHER" />
</intent-filter>
</activity>
<activity
android:name="com.aditi.familytracker.LoginActivity"
android:label="@string/app_name"
android:screenOrientation="portrait">
</activity>
<activity
android:name="com.aditi.familytracker.HomeActivity"
android:label="@string/app_name"
53
android:screenOrientation="portrait" >
</activity>
<activity
android:name="com.aditi.familytracker.SignupActivtiy"
android:label="@string/app_name"
android:screenOrientation="portrait">
</activity>
<meta-data
android:name="com.google.android.gms.version"
android:value="@integer/google_play_services_version" /
>
<meta-data
android:name="com.google.android.maps.v2.API_KEY"
android:value="AIzaSyBHzT9r-
vBXAtOjzlt7LrdLgArw5UL2NQI" />
</application>
</manifest>
54
APPENDIX (A) INTERFACE
55
56
57