You are on page 1of 35

SELF SECURITY THROUGH GPS BASED PROTECTION SYSTEM

Chapter 1
INTRODUCTION
GPS tracking system uses the Global Navigation Satellite System (GNSS) network.
This network incorporates a range of satellites that use microwave signals that are transmitted
to GPS devices to give information on location, vehicle speed, time and direction. GPS
tracking system can potentially give both real-time and historic navigation data on any kind
of journey.
We refer to our mapping ability as "GPS," Global Positioning System is actually the
term for a constellation of 30 satellites that orbit the earth. The first GPS satellite was
launched in 1978, and the full constellation of 24 came to be in December 1993, and became
operational in 1995. Each satellite takes 11 hours and 58 minutes to orbit the earth, meaning
each satellite makes two orbits per day, at an altitude of 10,600 miles above earth.
GPS device tells the precise location, position in a process called trilateration. It
communicates with three satellites in sight using high-frequency, low-power radio signals
that travel at the speed of light and then calculates the distance between those satellites and
your device. Since the satellites have a fixed orbital pattern and are synced with atomic
clocks from the U.S. Naval Observatory, this process tends to yield an accurate location
reading. To improve accuracy, GPS devices typically seek data from four or more satellites,
especially for determining altitude.
Once your GPS knows where you are, it can determine map routes, speeds, and other
location-specific information, such as sunrise and sunset. GPS receivers log locations of
satellites in an almanac, and though the orbits can be affected by the moon and sun, the
United States Department of Defence monitors the satellites' exact positions and sends
updates to GPS receivers.
“Self Security” is a smartphone application that helps the one to ensure their safety
using their devices. At the time of emergency there may not be any possibility to attempt any
phone calls or to send messages manually. Hence, this application will be helpful for persons
who are at difficulty. The user can add persons in his/her emergency contact list; the
application would consist of emergency button. Whenever the user clicks on the emergency
button, all the contacts in emergency contact list receive a text message with the user’s
location via GPS.
Even the person in trouble doesn’t have to look at the phone once the users tap the
button. Everything else is done by the emergency app. The app sends out alert messages with

KLS BCA COLLEGE, HALIYAL 1


SELF SECURITY THROUGH GPS BASED PROTECTION SYSTEM

the locations to the contacts that have fed into the app as the designated receivers or
guardians. The message says “Hello xyz, your buddy abc is in trouble and their present
location is..…”. Help will come fast at you. No complex set up is required.
The application consists of 5 modules, which are Profile module, Police station
module, Hospital module, Emergency contact module, and Emergency button. It has some
key features:
 At first user have to save some personal details such as: name, address, mobile
number, email_id.
 Next the users have to insert some details such as: name, mobile number, email_id of
the receipient.
 Just the finger touch on the “Emergency button” is enough to alert your receipient.
 The message also includes the current position of the victim.
 Also the user gets the details about nearby hospitals and police stations with latitude
and longitude.

KLS BCA COLLEGE, HALIYAL 2


SELF SECURITY THROUGH GPS BASED PROTECTION SYSTEM

Chapter 2
LITERATURE SURVEY
2.1 EXISTING SYSTEM
There is one of the applications available at Google play which is also a security
application, which will send emergency message when the user is in critical situation, but it
won’t displays users location in map[1].

2.2 PROPOSED SYSTEM


This application is been introduced which ensures the safety of women. This helps to
identify and call on resources to help the one out of dangerous situations. If there raises any
emergency where anyone cannot attempt a phone call and explain about the urgency then by
using this application just simply pressing on an emergency button.

2.2.1 Advantages of the proposed system


 Anyone can obtain security whenever needed.
 As the app sends out the message along with the location it becomes easier for
the recipient to help the one out of danger.

KLS BCA COLLEGE, HALIYAL 3


SELF SECURITY THROUGH GPS BASED PROTECTION SYSTEM

Chapter 3
PROBLEM STATEMENT
The “Self-security” application is to make something unique that is not unique in the
market and for a social cause. So, we came up with this idea of Women Security App.

3.1OBJECTIVE
 The main objective of this application is to provide help not only for the women but
also for the men, children, teenagers, travellers, disabled, handicapped and seniors
especially who suffer dementia and confusion.
 It will send a message that “Hello xyz, your buddy abc is in trouble and their present
location is………”, so that they will respond immediately.

3.2 METHODOLOGY
Methodology is the systematic, theoretical analysis of the methods applied to a field
of study. It comprises the theoretical analysis of the body of methods and principles
associated with a branch of knowledge.

SDLC Methodology
This document play a vital role in the development of life cycle (SDLC) as it
describes the complete requirement of the system. It means for use by developers and will be
the basic during testing phase. Any changes made to the requirements in the future will have
to go through formal change approval process.
The waterfall model is a sequential design process, often used in software
development processes, in which progress is seen as flowing steadily downwards (like a
waterfall) through the phases of Conception, Initiation, Analysis, Design, Construction,
Testing, Production/Implementation, and Maintenance.
The first formal description of the waterfall model is often cited as a 1970 article by
Winston W. Royce, although Royce did not use the term "waterfall" in this article. Royce
presented this model as an example of a flawed, non-working model. This, in fact, is how the
term is generally used in writing about software development—to describe a critical view of a
commonly used software development practice.

KLS BCA COLLEGE, HALIYAL 4


SELF SECURITY THROUGH GPS BASED PROTECTION SYSTEM

The waterfall development model originates in the manufacturing and construction


industries; highly structured physical environments in which after-the-fact changes are
prohibitively costly, if not impossible. Since no formal software development methodologies
existed at the time, this hardware-oriented model was simply adapted for software
development.
The waterfall model shows a process, where developers are to follow these phases in order:
• Requirements specification (Requirements analysis)
• Software design
• Implementation and Integration
• Testing (or Validation)
• Deployment (or Installation)
• Maintenance
Requirements: Defines needed information, function, behavior, performance and
interfaces.
Design: Data structures, software architecture, interface representations, algorithmic
details.
Implementation: Source code, database, user documentation, testing.

The following diagram shows how a Water model acts like:

Requirement
specification

Software
design

Implementation
and integration

Testing

Deployment

Maintenance

KLS BCA COLLEGE, HALIYAL 5


SELF SECURITY THROUGH GPS BASED PROTECTION SYSTEM

Fig 3.1.Water fall model of the project


Advantages
• Easy to understand, easy to use
• Provides structure to inexperienced staff
• Milestones are well understood
• Sets requirements stability
• Good for management control (plan, staff, track)
• Works well when quality is more important than cost or schedule
In a strict Waterfall model, after each phase is finished, it proceeds to the next
one.Reviews may occur before moving to the next phase which allows for the possibility of
changes (which may involve a formal change control process). Reviews may also be
employed to ensure that the phase is indeed complete; the phase completion criteria are often
referred to as a "gate" that the project must pass through to move to the next phase. Waterfall
discourages revisiting and revising any prior phase once it's complete. This "inflexibility" in a
pure Waterfall model has been a source of criticism by supporters of other more "flexible"
models.

3.3 TOOLS AND TECHNIQUES


3.3.1 Tool
A program used for software development or software maintenance. Virtually any
program or utility that helps programmers or users to develop or maintain their computers.

Android SDK
The Android Software Development Kit (SDK) contains the necessary tools to
create, compile and package Android application. Most of these tools are command line
based.
The Android SDK also provides an Android device emulator, so that Android
applications can be tested without a real Android phone[9]. You can create Android virtual
devices (AVD) via the Android SDK, which run in this emulator.
The Android SDK contains the Android debug bridge (adb) tool which allows
connecting to a virtual or real android device.

KLS BCA COLLEGE, HALIYAL 6


SELF SECURITY THROUGH GPS BASED PROTECTION SYSTEM

Android Development Tools


Google provides the Android Development Tools (ADT) to develop Android
applications with Eclipse. ADT is a set of components (plug-ins) which extend the Eclipse
IDE with Android development capabilities[2].
ADT contains all required functionalities to create, compile, debug and deploy
Android applications from the Eclipse IDE. ADT also allows to create and start AVDs.
The Android Development Tools (ADT) provides specialized editors for resources
files, e.g. layout files. These editors allow to switch between the XML representation of the
file and a richer user interface via tabs on the bottom of the editor.

How to develop Android Applications


Android applications are primarily written in the Java programming language. The
Java source files are converted to Java class files by the Java compiler.
The Android SDK contains a tool called dx which converts Java class files into a
.dex (Dalvik Executable) file. All class files of one application are placed in one compressed
.dex file. During this conversion process redundant information in the class files are
optimized in the .dex file. For example if the same String is found in different class files, the
.dex file contains only once reference of this String.
These dex files are therefore much smaller in size than the corresponding class files.
The .dex file and the resources of an Android project, e.g. the images and XML files, are
packed into an.apk (Android Package) file[8]. The program aapt (Android Asset Packaging
Tool) performs this packaging.
The resulting .apk file contains all necessary data to run the Android application and
can be deployed to an Android device via the adb tool.
The Android Development Tools (ADT) performs these steps transparently to the
user. If you use the ADT tooling you press a button the whole Android application (.apk
file) will be created and deployed

3.3.2Technologies
Technology is the collection of techniques, skills, methods and processes used in the
production of goods or services or in the accomplishment of objectives, such as scientific
investigation. Technology can be the knowledge of techniques, processes, etc. or it can be

KLS BCA COLLEGE, HALIYAL 7


SELF SECURITY THROUGH GPS BASED PROTECTION SYSTEM

embedded in machines, computers, devices and factories, which can be operated by


individuals without detailed knowledge of the workings of such things.

Android with Eclipse


It provides the following:
 The Android project wizard, which generates all the required project files.
 Android-specific resource editors.
 The Android SDK and AVD (Android Virtual Devices) Manager.
 The Eclipse DDMS perspective for monitoring and debugging Android applications.
 Integration with Android Log Cat logging.
 Automated builds and application deployment to Android emulators and handsets.
 Application packaging and code signing tools for release deployment[4].

KLS BCA COLLEGE, HALIYAL 8


SELF SECURITY THROUGH GPS BASED PROTECTION SYSTEM

Chapter 4
SYSTEM DESIGN
4.1 ARCHITECTURE

GPS Internet

Self security app


Family

Sends message
On clicking with location Friends and
emergency relatives
button
Remote place

Help line

Fig 4.1. Flow of project

In any critical situation their will be no time to call help in time. If the person has a
smartphone with internet, GPS and self security app in it then, they can easily get the help
from the family, friends and relatives, and helplines just on clicking the emergency button.
Now everything will be done by this app. It sends out the alert message with the location to
the receivers as shown above.

KLS BCA COLLEGE, HALIYAL 9


SELF SECURITY THROUGH GPS BASED PROTECTION SYSTEM

2. Request Carrier’s
Satellite sending server 1 Ask for location

3. Get Location

4. Tracker replies 5. Track by


location information SMS/GPRS

Phone GPS Tracker Cell Phone


Fig 4.2. Working of GPS

The Global Positioning System(GPS) is a network of about 30 satellities orbiting the


earth at an altitude of 20,000 km. Whenever you are on the planet, atleast 4 satellites are
visible at any time. Each one transmits information about its position anr the current time at
regular intervals. These signals, travelling at the speed of light, are intercepted by your GPS
receiver, which calculates how far away each satellite is based on how long it took for the
messages to arrive.
Once it has information on how far away atleast 3 satellitess are, your GPS receiver
can pinpoint your location using a process called Trilateration.

Trilateration:
A GPS receiver uses trilateration to determine its position on the surface of the earth
by timing signals from 3 satellites in GPS. The GPS is a network of satellites that orbit the
earth and send a signal to GPS receivers.
Each satellites sends out the periodic signal and these are received by GPS devices
which then calculate the distance between the device and each satellite based on the delay
between the time the signal was sent and the time when it was received.

KLS BCA COLLEGE, HALIYAL 10


SELF SECURITY THROUGH GPS BASED PROTECTION SYSTEM

Profile Details

Police Station Details

Women Hospital Details

Emergency Contact

Emergency Button

Fig 4.3. DFD diagram

Process Modules
This project ccontains the following 4 modules :
 Profile Module
 Police Station Module
 Hospital Module
 Emergency Contact Module
 Emergency Button

Profile Module
Profile is an important component to users, which helps the users to add his/her personal
details.
1. Name
2. Address
3. Email Id
4. Mobile Number

KLS BCA COLLEGE, HALIYAL 11


SELF SECURITY THROUGH GPS BASED PROTECTION SYSTEM

Police station
The women will get information about the nearer police station.

Hospital
When hospital option is clicked in my application,the user gets required details of near by
hospitals.

Emergency Contact
Required details of one who is in danger will be contacted to the right persons or family
members or friends or help lines.

Emergency Button
When we sense any dange, we can be escaped by using emergency button.

Android application architecture


Android is a widely anticipated open source operating system for mobile devices that
provides a base operating system, an application middleware layer, a Java software
development kit (SDK), and a collection of system applications[5]. Android mobile
application development is based on Java language codes, as it allows developers to write
codes in the Java language.Android operating system is a stack of software components
which is roughly divied into five sections and four main layers as shown below in the
architecture diagram.

KLS BCA COLLEGE, HALIYAL 12


SELF SECURITY THROUGH GPS BASED PROTECTION SYSTEM

Android will ship with a set of core applications including an email client, SMS
program, calendar, maps, browser, contacts and others. All applications are written using the
Java programming language.
In android operating system, there are four layers. Android has its own libraries; it is
helpful for developing and designing any application of android platform.These libraries are
written in C/C++. Linux kernel is the 1 st layer which is written in C. Linux also helps to wrap the
application.
The unveiling of the Android platform on 5 November 2007 was announced with the
founding of the Open Handset Alliance, a consortium of 34 hardware, software and telecom
companies devoted to advancing open standards for mobile devices. When released in 2008, most
of the Android platform will be made available under the Apache free-software and open source
license. Currently Android represents 31.2 percent of the U.S Smartphone market. Android has a
large community of developers writing application programs. There are currently over 150,000
apps available for Android. Android Market is the online app store run by Google, though apps
can also be downloaded from third party sites.

Features of Android
 Application Framework enabling reuse and replacement of components
 Dalvik Virtual Machine optimized for mobile devices
 Integrated browser based on the open source Web Kit engine
 SQLite for structured data storage
 Media support for common audio, video and still image formats (MPEG4, H.264, MP3,
AAC, AMR,J PG, PNG, GIF)
 GSM Telephony(hardware dependent)
 Bluetooth,EDGE,3G, and Wi-Fi(hardware dependent)[6]

Android Architecture
The following diagram shows the major components of the Android operating system. Each
section is described in more detail below:
 Application
 Application Framework
 Libraries
 Android Runtime

KLS BCA COLLEGE, HALIYAL 13


SELF SECURITY THROUGH GPS BASED PROTECTION SYSTEM

Chapter 5
REQUIREMENT ANALYSIS
5.1 FUNCTIONAL REQUIREMENTS
This specification is used to specify the requirements for the initial implementation of
the system and update the system in future. The software requirement specification bridges
the gap between client/user and the system developer. This is the document that describes the
user needs accurately.

5.2 NON-FUNCTIONAL REQUIREMENTS


These are the constraints service or functions offered by the system. They include
timing constraints, constraints on the development process and standards. Non-functional
requirements often apply to the system as a whole. They do not usually just apply to
individual system features or services.

5.3 HARDWARE REQUIREMENTS


CPU type : Intel Pentium 4
Clock speed : 3.0 GHz
Ram size : 512 MB
Hard disk capacity : 40 GB
Monitor type : 15 Inch color monitor
Keyboard type : internet keyboard

5.4 SOFTWARE REQUIREMENT


Operating System : Android
Language : Java
Minimum SDK version : ANDROID SDK2.3
Front End : XML
Back End : SQLite
Documentation : Ms-Office

KLS BCA COLLEGE, HALIYAL 14


SELF SECURITY THROUGH GPS BASED PROTECTION SYSTEM

Chapter 6
IMPLEMENTATION
It is the carryout, execution, or practice of a plan, a method, or any design, idea,
model, specification, standard or policy for doing something. As such, implementation is the
action that must follow are preliminary thinking in order for something to actually happen.

Creating Android Projects


The Android Project Wizard creates all the required files for an Android application.
Open Eclipse and follow these steps to create a new project:
 Choose File, New, Android Project or click the Android Project reactor icon, which
looks like a folder (with the letter a and a plus sign :) on the Eclipse toolbar.
 Choose a project name. In this case, name the project Droid1.
 Choose a location for the project. Because this is a new project
 Create New Project in Workspace radio button. Check the Use Default Location
checkbox.
 Select a build target for your application. For most applications, you want to select the
version of Android most appropriate for the devices used by your target audience and
the needs of your application.
 Specify an application name. This name is what users will see. In this case, call the
application Droid #1.
 Specify a package name, following standard package namespace conventions for
Java. Because all code in this book falls under the com.androidbook.namespace, use
the package name com. androidbook.droid1.
 Check the Create Activity check box. This will instruct the wizard to create a default
launch Activity class for the application. Call your activity Droid Activity.
 Confirm that the Min SDK Version field is correct. This field will be set to the API
level of the build target. If you want to support older versions of the Android SDK,
you need to change this field.
 However, in this case, we can leave it as its default value.
 Click the Next button.
 The Android project wizard allows you to create a test project in conjunction with
your Android application. For this example, a test project is unnecessary.

KLS BCA COLLEGE, HALIYAL 15


SELF SECURITY THROUGH GPS BASED PROTECTION SYSTEM

 However, you can always add a test project later by clicking the Android Test Project
creator icon, which is to the right of the Android project wizard icon on the Eclipse
toolbar. Test projects are discussed in detail in Hour 22, “Testing Android
Applications.”
 Click the Finish button.
.

Selecting the right path

Before creating any Android Application the right path has to be selected so that the
whole project will be saved in that selected path.

KLS BCA COLLEGE, HALIYAL 16


SELF SECURITY THROUGH GPS BASED PROTECTION SYSTEM

Starting up with creating the application

Create Android Application, the first step is to create a simple Android Application
using Eclipse IDE. Follow the options: File → New → Android Application Project wizard from
the wizard list.

KLS BCA COLLEGE, HALIYAL 17


SELF SECURITY THROUGH GPS BASED PROTECTION SYSTEM

Create Android Application

Now name your application as Self_Security using the wizard window as above. Next
follow the instructions provided and keep all other entries as default till the final step.

KLS BCA COLLEGE, HALIYAL 18


SELF SECURITY THROUGH GPS BASED PROTECTION SYSTEM

Designing the XML sheet

Once the project is created successfully, the above project screen is displayed.

KLS BCA COLLEGE, HALIYAL 19


SELF SECURITY THROUGH GPS BASED PROTECTION SYSTEM

Adding widgets on the graphical layout form

Select the particular widget whichever is necessary from the palette and drag it on the
grapgical layout to design the application.

KLS BCA COLLEGE, HALIYAL 20


SELF SECURITY THROUGH GPS BASED PROTECTION SYSTEM

Editing the XML sheet using codes

Write the code for each selected widgets in the activity_main.xml.

KLS BCA COLLEGE, HALIYAL 21


SELF SECURITY THROUGH GPS BASED PROTECTION SYSTEM

Changing the properties

This property window is used to change the properties such as Id, Text, Style, Font,
Color etc of the selected widgets.

KLS BCA COLLEGE, HALIYAL 22


SELF SECURITY THROUGH GPS BASED PROTECTION SYSTEM

Coding

The main coding part of whole project is been done here.

KLS BCA COLLEGE, HALIYAL 23


SELF SECURITY THROUGH GPS BASED PROTECTION SYSTEM

Package explorer

 src: This contains the .java source files for the project. By default it includes an
MainActivity.javasource file having an activity class that runs when the app is
launched using the app icon.
 gen: This contains the .R file, a compiler_generated file that references all the
resources found in the project. This file should not be modified.
 bin: This folder contains the Android package files .apk built by the ADT during the
build process and everything else needed to run an Android application.
 res/layout: This is a directory for files that defines app’s user interface[7].

KLS BCA COLLEGE, HALIYAL 24


SELF SECURITY THROUGH GPS BASED PROTECTION SYSTEM

 AndriodManifest.xml: This is the manifest file which describes the fundamental


characteristics of the app and defines each of its components.
Application .apk file

An APK file is an application package created for Android. It is generated using


Google’s Android SDK, a Java_based development kit. Android package cointains all the
necessary files for a single Android program. This includes the code(.DEX)files,
resourse(.ARSC)files and the AndroidManifest.xml file.
When Opened on an Android device, the application files are installed automatically
and can be executed.

KLS BCA COLLEGE, HALIYAL 25


SELF SECURITY THROUGH GPS BASED PROTECTION SYSTEM

Snapshot 1

This is the Self_Security app, on clicking this app the home page will be displayed
which is consisting of 5 buttons.
 Profile
 Emergency contact
 Police station
 Hospital details
 Emergency

KLS BCA COLLEGE, HALIYAL 26


SELF SECURITY THROUGH GPS BASED PROTECTION SYSTEM

Snapshot 2

On clicking the Profile button, the profile page will be opened and the user should
insert their personal details such as name, address, contact and Email. Then press update
button, and the details will be saved. In case of any updation, the user can update their
profile.

KLS BCA COLLEGE, HALIYAL 27


SELF SECURITY THROUGH GPS BASED PROTECTION SYSTEM

Snapshot 3

On clicking the emergency contact, the contact list page is opened. Here the user
should insert the required details such as name, mobile number and Email address of the
right person or family members or friends or help lines

KLS BCA COLLEGE, HALIYAL 28


SELF SECURITY THROUGH GPS BASED PROTECTION SYSTEM

Snapshot 4

On clicking the police station button the user gets the detail informations about the
nearer police station such as address, latitude and longitude also the phone number if
specified.

KLS BCA COLLEGE, HALIYAL 29


SELF SECURITY THROUGH GPS BASED PROTECTION SYSTEM

Snapshot 5

Similarly, on clicking the hospital button the user gets the detail informations about
the nearer hospitals such as address, latitude and longitude also the phone number if
specified.

KLS BCA COLLEGE, HALIYAL 30


SELF SECURITY THROUGH GPS BASED PROTECTION SYSTEM

Snapshot 6

Finally on clicking the emergency button, the message is sent along with the location
to the designated receivers as shown in the above snapshot.

KLS BCA COLLEGE, HALIYAL 31


SELF SECURITY THROUGH GPS BASED PROTECTION SYSTEM

Chapter 7
SYSTEM TESTING
The philosophy behind testing is to find errors. The common view of testing is that it
is performed to prove that there are no errors in a program. However it is virtually impossible
to prove that no program will be free and clear of errors. Therefore the most useful approach
and practical approach is with the understanding that testing is the process of executing a
program with explicit intention of finding errors that is, making the program fail.

Testing Strategies
A test strategy is an outline that describes the testing approach of the software
development cycle. It is created to inform project managers, testers, and developersabout
some key issues of the testing process. This includes the testing objective, methods of testing
new functions, total time and resources required for the project, and the testing environment.
Test strategies describe how the product risks of the stakeholders are mitigated at the test-
level, which types of test are to be performed, and which entry and exit criteria apply.

Unit Testing
Unit testing is the process of verifying the logic, functionality, computations, and
error handling of a unit. The intent of unit testing is to confirm that the unit provides the
capability assigned to it, correctly interfaces with other units and data, and is a faithful
implementation of the unit design. Unit testing focuses verification effort on the smallest unit
of software design in the module. The important control paths are tested to uncover errors and
invalid flow within the boundary of the module. The unit testing is normally structural
oriented testing and can be conducted in parallel for multiple modules independently.
Unit testing was done for all the sub entities of the module simultaneously with the
development. In all the units the flow of data across the control structures were tested and all
independent paths within each module were traversed at least once. All logical decision paths
were exercised for both affirmative and negative response to the specified conditions. Also

KLS BCA COLLEGE, HALIYAL 32


SELF SECURITY THROUGH GPS BASED PROTECTION SYSTEM

the consistencies of the data that are processed by the unit were verified before and after its
execution.

I n tegration Tes tin g


Integration testing is a systematic technique for constructing the program structure
while conducting tests to uncover errors associated with the interfacing between modules.
The individual units are combined with other units to make sure that necessary
communication, links and data sharing occur properly. There are three basic integration-
testing methods:
 Top-down
 All-at-once
 Bottom-up
The method of integration testing that is used should be appropriate to the design of
the system. Top-down testing fits a prototyping environment that establishes an initial
skeleton that fills individual modules when they are completed.
The testing of this system follows the top-down integration approach since menu-
driven systems generally lend themselves to top-down testing. The modules were verified
using the existing, previously tested build as a test bed. Units not yet implemented exist in the
module as stubs; that is, they contain no executable instructions except to write a message
that the unit was entered and has returned control to the calling unit. Using this approach both
the module's integration into the growing system and the internal code of the units that it
comprises were tested.

Valid ation Tes tin g


Validation tests are positive tests. They confirm that the system meets the
requirements such that the proper inputs give out the desired output. This test focuses on the
input-output behavior of the system and checks the validity of the data used. All the data
fields entered by the user are checked for validity and invalid user entry is acknowledged
with corresponding error messages. Tests are done to check that the desired output is
produced and is in relevance with the input given[11].

KLS BCA COLLEGE, HALIYAL 33


SELF SECURITY THROUGH GPS BASED PROTECTION SYSTEM

Chapter 8
CONCLUSION
With the increasing crime against women we have decided to design”safety alert
app” is to enhance the safety for women, kids and everyone at anytime and anywhere.
The basic aim of the system is to develop a low cost solution for GPS based self
security system (women safety system) which can applied to various domains of the
industrial and personal use just by using the very common mean i.e. mobile with android
enabled.
The main objective of the system is to track the current location of the person which
has an android enabled mobile by extracting the longitude and latitude of that target person.
The primary objective of our system is to track the person and plot the location on real
time system like Google map.

KLS BCA COLLEGE, HALIYAL 34


SELF SECURITY THROUGH GPS BASED PROTECTION SYSTEM

REFERENCES
1. http://m.thehindu.com/features/metroplus/society/always-vithu/article5375763.ece
2. http://developer.android.com/sdk/api_diff/9/changes/android.location.LocationMa
nager.html
3. http://java.sun.com/javase/downloads/index.jsp
4. http://www.eclipse.org/downloads/Eclipse
5. http://stackoverflow.com/questions/android
6. http://developer.android.com/guide/topics/fundamentals/
7. http://stackoverflow.com/questions/tagged/android-layout
8. ‘Greg Nudelman’, “ANDROID Design Pattern” , This book is more suited for
advanced level android developers.
9. ‘Ian G Clifton’ , “ANDROID user interface design” , This book explains the
importance of user interface design.
10. “Software Engineering” by ‘Ian Summerville’, 6th Edition, Pearson Education Ltd,
2001.

KLS BCA COLLEGE, HALIYAL 35

You might also like