Vehicle Tracking System Using Map-Matching Search Algorithm.
Vehicle Tracking System Using Map-Matching Search Algorithm.
INTRODUCTION
1.1 BACKGROUND
The Global Positioning System (GPS) and the GSM (Global System of Mobile Communications)
According to (Journal of Technology in Human Services, Volume 34, 2016), will provide
effective information in real time on locating, mapping and reporting of vehicles. Return to the
monitoring device by improving the level of service provided. A GPS-based vehicle tracking
system informs the user of the location of the vehicle and its location and duration. The system
uses geographic position and time information from global positioning satellites. This system
consists of an Android mobile phone containing a GSM and GPS modem and the processor
permanently integrated into the vehicle. This device is called a tracking device that continuously
accesses its current location and sends updates to the server. At the monitoring device that is an
Android application provides the user the exact location of the vehicles of his interest.
A mobile tracking fleet management system is used to monitor different types of vehicles such as
cars, vans, trucks and airplanes (Saghaei, .MoravvejFarsh, 2016). It has many applications such
as vehicle tracking and diagnostics, improved driver performance, speed control and fuel
management. The transport tracking system is a device that uses the global positioning system to
determine the precise location of the vehicle to which it is attached and to record the position of
the vehicle at regular intervals. (IEEE Journal of Vol. 20, No. 5, pages 582-589, 2017) Saved
location data can be stored in the tracking unit or can be transmitted to a central location Server
connected to the Internet using a cell phone. (GPRS or SMS), modem built into the device. This
allows the vehicle's position to be displayed on a map in real time or during subsequent analysis
of the track, using GPS tracking software (Randeep, 2016).
A GPS vehicle location system uses the Global Navigation Satellite System (GNSS) which
works in conjunction with a range of satellites and uses microwave signals for communication. A
GPS device can be installed in the vehicle or used as a portable device.
The microwave signals are transmitted to the GPS device and received back to obtain
information on the real position of the vehicle, its speed and direction. This information can be
viewed online or in real time and can be saved for future reference (Kumar Maurya ,Mandeep
Singh,2016).
In addition to vehicle tracking, the GPS system can be used for various functions to track, control
and analyze your vehicle. Some of its important features are live speed monitoring, live location
on the map, activation / deactivation report of the vehicle's air conditioning, car door opening
alert, system fuel theft, the immobilization of the vehicle in case of theft, panic emergency
button, anti-theft alert system of the vehicle, Rental Car theft Deterrent System, Report of theft
Car On / Off The Global Positioning System (GPS) is a global radio navigation system
consisting of the constellation of 24 satellites and their ground stations. GPS transport services
can be placed in a vehicle, on a mobile phone, on special GPS devices, which can be a fixed or
portable unit (Ritika and Rakul, 2015).
The transportation tracking system is a way to monitor the location of a vehicle, the GPS
system, widely deployed to track fleets of trucks. Transport tracking ensures that vehicles are
used properly and can be recovered in the event of theft. Transportation tracking is based on both
Global Positioning Satellites (GPS) and a cellular system. A tracking module in the vehicle
continuously collects GPS coordinates indicating the real-time position of the vehicle. Using a
cellular data service, the coordinates are immediately transmitted to the computers of the
tracking company. Customers can then connect to the tracking company's website to see their
vehicles on road maps, similar to the in-dash and portable GPS navigation systems.
A tracking system combines the use of automatic vehicle location in individual vehicles with
software that collects this fleet data to obtain a complete picture of vehicle locations. Modern
vehicle tracking systems commonly use GPS or GLONASS technology to locate the vehicle, but
other types of automatic vehicle location technology may also be used. Vehicle information can
be viewed on electronic charts via the Internet or specialized software. Urban transit companies
are increasingly using vehicle tracking systems, especially in larger cities (Rameshbabu, 2014).
Transport tracking systems are the foundation of the shipping industry. They needed some kind
of system to determine where each vehicle was at a particular time and how long it was traveling.
Initially, the transport tracking systems developed for fleet management were passive tracking
systems. In the passive tracking system, a hardware device is installed in the vehicle to record
GPS position, speed, heading, and a triggering event such as turning on / off a key, door open /
closed. When the vehicle returns to a specific location, the device is deleted and the data
downloaded to the computer.
A real-time tracking system was required to transmit the collected information to the vehicle
after regular intervals or at least could transmit the information when the monitoring station
requested it. Active systems have also been developed to transmit vehicle data in real time via
cellular or satellite networks to a remote computer or data center.
Many current vehicle systems were equipped with the Automatic Vehicle Location (AVL)
feature. AVL is a concept for determining the geographical location of a vehicle and transmitting
this information to a remote server. The location is determined using a GPS and the transmission
mechanism could be a satellite, a terrestrial cellular radio connection between the vehicle and a
radio receiver, a satellite or a nearby cell tower. After capture, tracking data can be transmitted
using any telemetry or wireless communication system. GSM is the most used service for this
purpose.
A transport tracking system consists of an electronic device installed on a vehicle, so that its
owner or a third party can track its position. Most current transport tracking systems use the
Global Positioning System (GPS) to get an accurate reading of the vehicle's position.
Communication components such as cellular transmitters (GSM) and satellite or Google Map
will be combined to transmit the position of the vehicle to a remote user. The vehicle information
can then be viewed using software installed on a computer.
Transport tracking systems are commonly used by fleet operators for fleet management functions
such as routing, dispatching, on-board information and security. Other applications include
monitoring of driving behavior, such as an employee or parent with an adolescent driver.
Transport tracking systems are also popular in consumer vehicles as a device for preventing and
recovering theft. The police can simply follow the signal from the location system and locate the
stolen vehicle. When used as a security system, the transport tracking system can complement or
replace a traditional car alarm. The existence of a transport tracking device can then be used to
reduce the cost of insurance, as the risk of vehicle loss decreases significantly ( Khan and Ravi ,
2012).
Transportation tracking is useful in many other applications, such as asset tracking scenarios, in
which companies must track valuable assets for insurance and other supervisory purposes. In the
field of mobile sales where the situation of sales professionals can easily access real-time
locations. For example, in unfamiliar areas, they can locate themselves, their customers and
prospects, get road routes and add last-minute appointments to routes. Benefits include increased
productivity, reduced driving time and increased time with current and potential customers.
It has been reported that with this system, users have been able to gain many benefits by auditing
employee hours to ensure better use of vehicles. This system has also proven its ability to reduce
mileage, so fuel costs through control of private use of vehicles. Reducing the average speed of
vehicles also improves fuel efficiency. Productivity will also be increased through better
budgeting of time and resources (Stephen Teang,2007).
This project is designed and developed to meet the needs of today's transportation company, in
order to keep track of its vehicles. It is a very useful and versatile device, which can actually be
used by anyone who needs to keep track of their valuable assets and not just by the automaker.
The desired system output will be data such as position, speed and time obtained from the GPS
receiver and will be displayed on the computer screen ( Krishna, 2013).
Fleet vehicles are groups of motor vehicles owned or leased by a business, government agency or
other organization rather than by an individual or family. Typical examples are vehicles operated
by car rental companies, taxicab companies, public utilities, public bus companies, and police
departments. In addition, many businesses purchase or lease fleet vehicles to deliver goods to
customers, or for sales representatives to travel to clients. In some jurisdictions and countries,
fleet vehicle also means vehicles that are privately owned by employees, or on novated leases,
but are used for work purposes; this is called the grey fleet
FLEET MANAGEMENT
leet management is used by couriers, oil and gas delivery, utilities, repair and service industry
businesses to ensure responsible vehicle use, confirm safety and enable real-time tracking.
Although commonly associated with delivery cars and trucks, the boating industry uses fleet
management technology as well.
Vendors offer many fleet management technologies. Vehicles use telematics like GPS for reliable
global automatic vehicle location (AVL) detection, though some use GLONASS or less
expensive cellular triangulation in remote and less-traveled areas.
Fleet management software allows a company’s management and dispatchers to track all
vehicles from a central location. Tracking systems are used to monitor driver behavior, proper
vehicle use, work breaks and safety. Fleet management software may also include some remote
control capabilities such as speed limiting, engine revolution limiting and gradual slowing or
stopping of vehicles. Remote security features help prevent stolen vehicles and cargo with GPS,
mapping and cellular technology to quickly and accurately locate rogue vehicles. Vehicle
operation is often monitored for mechanical problems and efficiency, helping the overall
efficiency of the company and protecting profitability.
Because commercial vehicle accidents can be subject to an investigation, the data logged in fleet
management software may be subpoenaed by law enforcement.
A tracking system is used for the observing of persons or objects on the move and supplying
a timely ordered sequence of location data for further processing.
In virtual space technology, a tracking system is generally a system capable of rendering virtual
space to a human observer while tracking the observer's coordinates. For instance, in dynamic
virtual auditory space simulations, a real-time head tracker provides feedback to the central
processor, allowing for selection of appropriate head-related transfer functions at the estimated
current position of the observer relative to the environment.
The purpose of a tracking system is to determine the location or direction of a target on a near-
continuous basis. An ideal tracking system would maintain contact and constantly update the
target's bearing, range and elevation. The output of the tracking system can be sent to a fire
control system, which stores the information and derives the target's motion and therefore its
future position. As we shall see, tracking systems not only provide an automatic target following
feature but also determine the target's position with sufficient accuracy for weapons delivery.
Tracking System is a system used to monitor the data of objects on the go. It is becoming an
important tool for industries that want real-time information about their fleet, personnel or
merchandise. The system enables the business to run smoothly and effectively. Many oil and gas
companies and various other organizations are installing the system as it leads to potential
savings on running costs. An ideal system constantly updates the target’s location, elevation, and
range.
2.1.2 ALGORTIHM
It is a logical and mathematical approach to solve or crack a problem using any possible method.
Types of algorithm
Well there are many types of algorithm but the most fundamental types of algorithm are:
Recursive algorithms
Dynamic programming algorithm
Backtracking algorithm
Divide and conquer algorithm
Greedy algorithm
Brute Force algorithm
Randomized algorithm
Solves the base case directly and then recurs with a simpler or easier input every time (A base
value is set at the starting for which the algorithm terminates).
It is use to solve the problems which can be broken into simpler or smaller problems of same
type.
How about we learn backtracking using an example so let’s say we have a problem
“Monk” and we divide it into four smaller problems “M, R, A, A”. It may be the case that the
solution of these problems did not get accepted as the solution of “Monk”.
In fact we did not know on which one it depends. So we will check each one of them one by one
until we find the solution for “Monk”.
So basically we attempt solving a subproblem but if we did not reach the desired solution undo
whatever you have done and start from the scratch again until you find the solution.
Divide and conquer consist of two parts first of all it divides the problems into smaller
sub problems of the same type and solve them solve them recursively and then combine them to
form the solution of the original problem.
GREEDY ALGORITHM
Greedy algorithm is an algorithm that solves the problem by taking optimal solution at
the local level (without regards for any consequences) with the hope of finding optimal solution
at the global level.
Greedy algorithm is used to find the optimal solution but it is not necessary that you will
definitely find the optimal solution by following this algorithm.
Like there are some problems for which an optimal solution does not exist (currently) these are
called NP complete problem.
A brute force algorithm simply tries all the possibilities until a satisfactory solution is
found. Such types of algorithm are also used to find the optimal (best) solution as it checks all
the possible solutions. And also used for finding a satisfactory solution (not the best), simply
stop as soon as a solution of the problem is found.
RANDOMIZED ALGORITHM
A randomized algorithm uses a random number at least once during the computation to
make a decision.
Dijkstra's algorithm (or Dijkstra's Shortest Path First algorithm, SPF algorithm) is
an algorithm for finding the shortest paths between nodes in a graph, which may represent, for
example, road networks. It was conceived by computer scientistEdsger W. Dijkstra in 1956 and
published three years later (Frana, Phil (August 2010)
The algorithm exists in many variants; Dijkstra's original variant found the shortest path
between two nodes, Dijkstra, E. W. (1959) but a more common variant fixes a single node as the
"source" node and finds shortest paths from the source to all other nodes in the graph, producing
a shortest-path tree.
For a given source node in the graph, the algorithm finds the shortest path between that
node and every other Mehlhorn, Kurt; Sanders, Peter (2008). It can also be used for finding the
shortest paths from a single node to a single destination node by stopping the algorithm once the
shortest path to the destination node has been determined. For example, if the nodes of the graph
represent cities and edge path costs represent driving distances between pairs of cities connected
by a direct road, Dijkstra's algorithm can be used to find the shortest route between one city and
all other cities. As a result, the shortest path algorithm is widely used in network routing
protocols, most notably IS-IS (Intermediate System to Intermediate System) and Open Shortest
Path First (OSPF). It is also employed as a subroutine in other algorithms such as Johnson's.
The Dijkstra algorithm uses labels that are positive integer or real numbers, which have
the strict weak ordering defined. Interestingly, Dijkstra can be generalized to use labels defined
in any way, provided they have the strict partial order defined, and provided the subsequent
labels (a subsequent label is produced when traversing an edge) are monotonically non-
decreasing. This generalization is called the Generic Dijkstra shortest-path algorithm.
ADVANTAGE OF SHORTEST PATH ALGORITHMS
1) It is used in Google Maps
3) This leads to acyclic graphs and most often cannot obtain the right shortest path.
Map matching algorithms can be divided in real-time and offline algorithms. Real-time
algorithms associate the position during the recording process to the road network. Offline
algorithms are used after the data is recorded and are then matched to the road network. Real-
time applications can only calculate based upon the points prior to a given time (as opposed to
those of a whole journey), but are intended to be used in 'live' environments. This brings a
compromise of performance over accuracy. Offline applications can consider all points and so
can tolerate slower performance in favor of accuracy.
Shortest path search algorithms covered a short range on the map why the map matching
search algorithms can covered a long distance in which can be located in any part of the world.
Shortest path search (Dijkstra) method is a well-known algorithm for finding the optimum path
in shortest-path search problems. With that method, however, the time required to find the
optimum path becomes remarkably long when the search scope is broad, so the (Djikstra)
method is not suitable for real-time problems. Map-matching algorithms that utilise road
segment connectivity along with other data (i.e. position, speed and heading) in the process of
map-matching are normally suitable for high frequency (1 Hz or higher) positioning data from
GPS.
3.5 METHODOLOGY
The system has 2 modules whereby each module work hand in hand together in order to achieve
the objectives of this project. The first module will handle tracking part, which will be installed
on android phone and embedded into a vehicle and the second module is for monitoring the
location of the first module.
3.6 Map-Matching Search Algorithm
Map-Matching Search Algorithm handles the positioning location and communication between
two or more devices over a short or long distance apart, using the signals emitted from them.
Map matching search algorithms essentially a way of comparing path geometries. In a typical
digital road map, the roads in the network are represented as piece wise linear curves. A simple
and intuitive way of performing map matching is to match the raw position estimated by the
positioning system to the nearest road segment. While this method, known as point-to-arc
mapping, is easy to implement it has many disadvantages.
A MAP MATCHING
C METHOD FOR GPS
D
CP2P3P4 E
D E
B
G F
B
A
A
Figure 3.1 Point-to-arc map matching. Figure 3.2 Arc-to-arc map matching.
Firstly, it does not make use of historical information about the vehicle’s motion and this can
result in mismatches similar to the case illustrated in Figure 1. The sequence of estimated
positions P0, P1, P2 and P3 indicate that the vehicle is traveling along the path comprising of
road segments AB and BC. However, since the previously estimated positions are not taken into
consideration, the point-to-arc method, the points P1and P2would be wrongly matched to the
closest road segment BE.
In route guidance systems, such mismatches are likely to result in wrong guidance instructions
being issued to the driver. Another shortcoming of the point-to-arc method is that the matched
position can oscillate between two closely situated parallel roads especially in dense urban street
networks.
Some of the drawbacks of the point-to-arc method can be overcome by another geometric
method known as arc-to-arc mapping. The arc-to-arc method matches the piece wise linear curve
formed by the sequence of estimated positions to a piece wise linear curve corresponding to a
path in the network based on their closeness or similarity. Results of field trials provided indicate
that while the arc-to-arc method consistently outperforms a simple point-to-arc method, it fails to
outperform a point-to-arc method that makes use of information about the vehicle heading. This
is possibly because arc-to-arc mapping can perform poorly in situations like the one illustrated in
Figure 2, where the piece wise linear curve formed by points P0,P1,P2,P3, and P4 is equally
close and similar to two candidate paths namely ABF and BCE.
Algorithms that make use of the geometric approach can be improved by incorporating
topological information such that only those road segments that are directly connected to the
current road of travel are considered. However, this can result in one wrong match leading to a
sequence of wrong matches. Another class of algorithms, known as probabilistic algorithms,
makes use of statistical error models of the positioning sensor to define a confidence region
within which the true vehicle position may lie. Only those roads that lie within this region are
considered for map matching. Although these algorithms can recover from wrong matches
quickly, they require more computation time. In dense urban road networks, it is often difficult to
precisely identify the road on which the vehicle is traveling. Rather, the map-matching algorithm
may only be able to determine that the vehicle is more likely to be on some roads and less likely
to be on certain other roads. Fuzzy logic has been proven to be an effective way to deal with such
ambiguous situations. Because map matching is a decision making process involving a degree of
ambiguity, fuzzy logic based algorithms are often employed to perform map matching.
In this work, we propose an efficient map-matching algorithm that can be implemented on
systems with low computational resources such as a handheld device (Android device). We
conceptually split the map matching problem into two tasks namely, correctly identifying the
road of travel and, determining the exact location of the vehicle on the identified road. We make
use of a simple fuzzy rule based inference system for identifying the road of travel.
3.7 Adaptation Of The Transport Tracking System With The Work ability Of The Map-
matching Search Algorithm
Map-Matching Search Algorithm handles the positioning location and communication
between two or more devices over a short or long distance apart(Using University of ilorin as a
case study), using the signals emitted from them.
The work ability of the proposed system is divided into two phases namely:
1. Tracking Part: The first phase will handle tracking part, which will be installed on
android phone and embedded into a vehicle and monitoring that vehicle in real time from
the second phase.
2. Monitoring Part: Second phase will be for monitoring the location of the tracking part
through Google map which will be on another android device, and the algorithm that will
be adopted is Map-matching search algorithm with fuzzy rule. This algorithm will work
as an intermediary between the first and the second part, where it will determine the
positional output of the device inside the vehicle (first phase) in terms of its latitude and
longitude and then converts it into X and Y coordinates and the coordinate will then be
sent as a signal to the monitoring part (Google Map module) to determine the vehicle
location.
Pseudo code for Map-matching Search Algorithm
1. Form X road list using range query
2. Calculate travel likelihood for all roads in X road list
3. Test if Vehicle is off-road
4. If Yes, Goto 1 otherwise proceed
5. Use Map GPS-estimated position to identified road of travel
6. Test if successor roads is generated
7. If No, Goto 2 otherwise proceed
8. Add successor roads to X road list forming new X road list and delete roads with low
travel likelihood
9. Goto 1 to Update X road list in every 0.5-1 sec
Figure 3.3 The map-tracking algorithm
Figure 3.4 The map-matching algorithm
Start
Open database
Read location
Longitude & latitude
Is location
Valid?
Close database
Return
2. The importance can be stated with a single word “Quality”. Design is the place where
quality is fostered in software development. Design provides us with representations of
software that can assess for quality. Design is the only way that we can accurately
translate a customer’s view into a finished software product or system. Software design
serves as a foundation for all the software engineering steps that follow. Without a strong
design we risk building an unstable system – one that will be difficult to test, one whose
quality cannot be assessed until the last stage.
Input design is a part of overall system design. The main objective during the input design is as
given below:
1. To produce a cost-effective method of input.
2. To achieve the highest possible level of accuracy.
3. To ensure that the input is acceptable and understood by the user.
4.3 Locating the vehicle
Figure 4.3 back end monitoring server showing the location of the tracked vehicle
1. The accuracy of getting the correct location of stolen vehicle is very certain compare to
manual searching
2. Companies and start-ups that provide cabs can place the device in their vehicles to ensure
the safety of passengers and vehicle.
3. Schools could also install the device in school bus to keep a constant check on the route
of the bus for the sake of student’s safety.
4. It reduces the cost of managing car theft operation by the law enforcement agent.
5. It provides more security than other existing systems.
User interface systems can be broadly classified as:
1. User initiated interface the user is in charge, controlling the progress of the user/computer
dialogue. In the computer-initiated interface, the computer selects the next stage in the
interaction.
In the computer initiated interfaces the computer guides the progress of the user/computer
dialogue. Information is displayed and the user response of the computer takes action or displays
further information.
1. Command driven interfaces: In this type of interface the user inputs commands or queries
which are interpreted by the computer.
2. Forms oriented interface: The user calls up an image of the form to his/her screen and fills in
the form. The forms oriented interface is chosen because it is the best choice.
Computer-Initiated Interfaces
1. The menu system for the user is presented with a list of alternatives and the user chooses one;
of alternatives.
2. Questions – answer type dialog system where the computer asks question and takes action
based on the basis of the users reply.
Right from the start the system is going to be menu driven, the opening menu displays the
available options. Choosing one option gives another popup menu with more options. In this
way every option leads the users to data entry form where the user can key in the data.
Error Message Design:
The design of error messages is an important part of the user interface design. As user is bound
to commit some errors or other while designing a system the system should be designed to be
helpful by providing the user with information regarding the error he/she has committed.
This application must be able to produce output at different modules for different inputs.
Performance Requirements
Requirement specification plays an important part in the analysis of a system. Only when the
requirement specifications are properly given, it is possible to design a system, which will fit into
required environment. It rests largely in the part of the users of the existing system to give the
requirement specifications because they are the people who finally use the system. This is
because the requirements have to be known during the initial stages so that the system can be
designed according to those requirements. It is very difficult to change the system once it has
been designed and on the other hand designing a system, which does not cater to the
requirements of the user, is of no use.
The requirement specifications for the proposed system are broadly stated as given below:
The existing system is completely dependent on the user to perform all the duties.
The common language runtime manages memory, thread execution, code execution, code safety
verification, compilation, and other system services. These features are intrinsic to the managed
code that runs on the common language runtime.
With regards to security, managed components are awarded varying degrees of trust, depending
on a number of factors that include their origin (such as the Internet, enterprise network, or local
computer). This means that a managed component might or might not be able to perform file-
access operations, registry-access operations, or other sensitive functions, even if it is being used
in the same active application.
The runtime enforces code access security. For example, users can trust that an executable
embedded in a Web page can play an animation on screen or sing a song, but cannot access their
personal data, file system, or network. The security features of the runtime thus enable legitimate
Internet-deployed software to be exceptionally featuring rich.
The runtime also enforces code robustness by implementing a strict type- and code-verification
infrastructure called the common type system (CTS). The CTS ensures that all managed code is
self-describing. The various Microsoft and third-party language compilers
Generate managed code that conforms to the CTS. This means that managed code can consume
other managed types and instances, while strictly enforcing type fidelity and type safety.
In addition, the managed environment of the runtime eliminates many common software issues.
For example, the runtime automatically handles object layout and manages references to objects,
releasing them when they are no longer being used. This automatic memory management
resolves the two most common application errors, memory leaks and invalid memory references.
Language support
Sometimes all the information of interest to a business operation can be stored in one table.
Local storage is used to for the backend which makes it very easy to link the data in multiple
tables. Matching data to its categories. This is what makes the local storage stores data in two or
more tables and enables you to define relationships between the tables and enables you to define
relationships between the tables.
Data Abstraction
A major purpose of a database system is to provide users with an abstract view of the data. This
system hides certain details of how the data is stored and maintained. Data abstraction is divided
into three levels.
Physical level: This is the lowest level of abstraction at which one describes how the data are
actually stored.
Conceptual Level: At this level of database abstraction all the attributed and what data are
actually stored is described and entries and relationship among them.
View level: This is the highest level of abstraction at which one describes only part of the
database.
Advantages of RDBMS
E – R Diagrams
·The relation upon the system is structure through a conceptual ER-Diagram, which not only
specifics the existential entities but also the standard relations through which the system exists
and the cardinalities that are necessary for the system state to continue.
·The entity Relationship Diagram (ERD) depicts the relationship between the data objects. The
ERD is the notation that is used to conduct the date modeling activity the attributes of each data
object noted is the ERD can be described resign a data object descriptions.
Software testing is a critical element of software quality assurance and represents the ultimate
review of specification, design and coding. In fact, testing is the one step in the software
engineering process that could be viewed as destructive rather than constructive.
A strategy for software testing integrates software test case design methods into a well-planned
series of steps that result in the successful construction of software. Testing is the set of activities
that can be planned in advance and conducted systematically. The underlying motivation of
program testing is to affirm software quality with methods that can economically and effectively
apply to both strategic to both large and small-scale systems.
The software engineering process can be viewed as a spiral. Initially system engineering defines
the role of software and leads to software requirement analysis where the information domain,
functions, behavior, performance, constraints and validation criteria for software are established.
Moving inward along the spiral, we come to design and finally to coding. To develop computer
software we spiral in along streamlines that decrease the level of abstraction on each turn.
A strategy for software testing may also be viewed in the context of the spiral. Unit testing
begins at the vertex of the spiral and concentrates on each unit of the software as implemented in
source code. Testing progress by moving outward along the spiral to integration testing, where
the focus is on the design and the construction of the software architecture. Talking another turn
on outward on the spiral we encounter validation testing where requirements established as part
of software requirements analysis are validated against the software that has been constructed.
Finally we arrive at system testing, where the software and other system elements are tested as a
whole.
Unit Testing
Unit testing focuses verification effort on the smallest unit of software design, the module. The
unit testing we have is white box oriented and some modules the steps are conducted in parallel.
To follow the concept of white box testing we have tested each form .we have created
independently to verify that Data flow is correct, All conditions are exercised to check their
validity, All loops are executed on their boundaries.
Established technique of flow graph with Cyclomatic complexity was used to derive test cases
for all the functions. The main steps in deriving test cases were:
Use the design of the code and draw correspondent flow graph.
V (G) =E-N+2 or
V (G) =P+1 or
3. Conditional Testing
In this part of the testing each of the conditions were tested to both true and false aspects. And all
the resulting paths were tested. So that each path that may be generate on particular condition is
traced to uncover any possible errors.
This type of testing selects the path of the program according to the location of definition and use
of variables. This kind of testing was used only when some local variable were declared.
The definition-use chain method was used in this type of testing. These were particularly useful
in nested statements.
5. Loop Testing
In this type of testing all the loops are tested to all the limits possible. The following exercise
was adopted for all loops:
·All the loops were tested at their limits, just above them and just below them.
·For nested loops test the inner most loop first and then work outwards.
·For concatenated loops the values of dependent loops were set with the help of connected loop.
·Unstructured loops were resolved into nested loops or concatenated loops and tested as above.
Each unit has been separately tested by the development team itself and all the input have been
validated.
System Security
The protection of computer based resources that includes hardware, software, data, procedures
and people against unauthorized use or natural
Security
Integrity
Privacy
Confidentiality
System Security: refers to the technical innovations and procedures applied to the hardware and
operation systems to protect against deliberate or accidental damage from a defined threat.
Data Security: is the protection of data from loss, disclosure, modification and destruction.
System Integrity: refers to the power functioning of hardware and programs, appropriate
physical security and safety against external threats such as eavesdropping and wiretapping.
Privacy: defines the rights of the user or organizations to determine what information they are
willing to share with or accept from others and how the organization can be protected against
unwelcome, unfair or excessive dissemination of information about it.
Due to the fact that man cannot work beyond his capacity, there is reduction in the total output of
the existing system of stolen vehicles recovery. The incidences that gave rise to inefficiencies of
the existing system and need for developing a new software based strategy include inability of
taken swift action immediately the report has been filed by the owner due to lack of the vehicle
details which will then be taken down, confirmation of stolen car if seen would not be easily
confirmed, report would have to be made to the owner before such car can be confirmed, and this
process might take a long time. Therefore this exclusive project (application) has been designed
to take appropriate care of such problems listed.
5.2 CONCLUSION
In today‘s world, the security of the vehicles is at stake. The incidents of theft are common. This
compels the consumer to install a tracking device, which will help them to know the location of
their lost or stolen vehicle. The vehicle-tracking device provide the user to know his/her
vehicle‘s location in real time. The product designed is user-friendly anyone with a little
knowledge of smartphone can use the system. It is easy to install the system in the vehicle and it
requires low maintenance. The coordinates received show the correct location on the Google
map using the android app.
5.3 RECOMMENDATION
Not to confused with Vehicle location data. A vehicle tracking system combines the use of
automatic vehicle location in individual vehicles with software that collects these fleet data for a
comprehensive picture of vehicle locations. Modern vehicle tracking systems commonly use
GPS or GLONASS technology for locating the vehicle, but other types of automatic vehicle
location technology can also be used. Vehicle information can be viewed on electronic maps via
the internet or specialized Google map or GPS device.
REFERENCES
Abid khan and Ravi Mishra, (2012) “GPS – Global System for Mobile Communications (GSM)
Based Tracking System”. Electronics and Electrical Engineering Department SSCET, CSVTU,
Bhilai, India.
Abid, Mishra, (2017) “GPS Navigation System”, Transportation Service using GPS
Al-Kheder, Maruthi (2015) “Intelligent Anti-Theft and Tracking System for Automobiles”,
International Journal of Machine Learning and Computing.
Almomani(2009) “System to monitor driving behavior of employee” International Journal of
Digital Information and Communications
Benjamin (2010) “Integrating Social Network Services with Vehicle Tracking Technologies”
International Journal of Advanced Computer Science and Applications.
G. Kiran Kumar, A. Mallikarjuna Prasad (2016) ”Public TransportationManagement Service
using GPS-GSM”, International Journal of Technology in Human Service Volume 34
Hui Hu &Lian Fang (2009). “Design and Implementation of Vehicle Monitoring System Based
on GPS/GSM/GIS” Third International Symposium on Intelligent Information Technology
Application ,School of Information Engineering, East China Jiao Tong University, Nanchang,
Jiangxi, China.
Iman M. Almomani, (2009) Ubiquitous GPS Vehicle Tracking and Management System.
Kakuda (2006) "Location Based Services for Mobiles: Technologies and Standards".
Krishna(2013) Public Transportation Management Service using GPS-GSM”, International
Journal of Research in Computer and Communication Technology,
Kumar Maurya ,Mandeep Singh,(2016) “Real Time Vehicle Tracking System using GSM and
GPS Technology-An Anti-theft Tracking System,” International Journal of Electronics and
Computer Science Engineering.
Lojack&Mukesh P.R (2013). “Real Time Web based Vehicle Tracking using GPS”, World
Academy of Science, Engineering and Technology.
Maruthi(2016) “SMS based bus tracking system using open source technologies”, Journal of
Advanced Tracking system and Technology
Manikandan (2012) "GPS Datum Conversion and Kalman Filtering for Reducing Positional
Errors", Asian Journal Of Computer Science And Information Technology1.
Mishra (2005) “Simple Bus Tracking System”, Journal of Advanced Computer Science and
Technology Research
Mohammed (2017). Smart On-Board Transportation Management System Using
GPS/GSM/GPRS Technologies to Reduce Traffic Violation in Developing Countries
Montaser et al. (2012). “Intelligent Anti-Theft and Tracking System for
Automobiles”.,Teknologi, Malaysia.
Patel Krishna Harshadbhai (2013). “Design of Global Positioning System (GPS) and Global
System for Mobile Communications (GSM) Based Vehicle Location and Tracking System.”
Limda, Vadodara, India.
Ramesh(2007) “Land vehicle application on android platform” Intelligent Systems and
Applications,
R.Ramani, (2013) “Vehicle Tracking and Locking System Based on GSM and GPS”, I.J.
Intelligent Systems and Applications.
RitikaRakul, (2015) “Combining model-based and heuristic techniques for tracking,”
Transportation on Electronic system, vol. 23
Sadaphalt (2001) “Design and Implementation Of vehicle Tracking System Using GPS”,
Journalof Information Engineering and Applications.
SaghaeiMoravvejFarsh (2016)“Intelligent Anti-Theft and Tracking System for Automobiles”,
International Journal of Machine Learning and Computing
Stephen Teang,(2007) D.A., "A New Approach of Automobile Localization System Using GPS
and GSM/GPRS Transmission," Electronics Technology.
Thomas (1998) “Real Time Web based Vehicle Tracking using GPS”, World Academy of
Science, Engineering and Technology.
Thuong et al., (2010) "A New Approach of Automobile Localization System Using GPS and
GSM/GPRS Transmission", Electronics Technology.
Xiao and Haidong, (2009)“Real Time Vehicle Tracking Using GPS and GSM”,Digital Control of
Dynamic Systems