Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
100% found this document useful (2 votes)
480 views

Vehicle Tracking System Using Map-Matching Search Algorithm.

This document provides an introduction to vehicle tracking systems using GPS and GSM technologies. It discusses how GPS and GSM can be used together to locate, map and report vehicle locations in real time. The system consists of an Android mobile phone with a GPS and GSM modem installed in vehicles that continuously tracks location and sends updates to a server. This allows users to view vehicle locations on a map in real time through a monitoring application. The document outlines the objectives of the project, which are to design and develop a GPS/GSM tracking system, design a GPS framework using an Android phone as the tracking device, and implement the proposed system using ionic and Google Firebase.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (2 votes)
480 views

Vehicle Tracking System Using Map-Matching Search Algorithm.

This document provides an introduction to vehicle tracking systems using GPS and GSM technologies. It discusses how GPS and GSM can be used together to locate, map and report vehicle locations in real time. The system consists of an Android mobile phone with a GPS and GSM modem installed in vehicles that continuously tracks location and sends updates to a server. This allows users to view vehicle locations on a map in real time through a monitoring application. The document outlines the objectives of the project, which are to design and develop a GPS/GSM tracking system, design a GPS framework using an Android phone as the tracking device, and implement the proposed system using ionic and Google Firebase.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 45

CHAPTER ONE

INTRODUCTION
1.1 BACKGROUND

The Global Positioning System (GPS) and the GSM (Global System of Mobile Communications)
According to (Journal of Technology in Human Services, Volume 34, 2016), will provide
effective information in real time on locating, mapping and reporting of vehicles. Return to the
monitoring device by improving the level of service provided. A GPS-based vehicle tracking
system informs the user of the location of the vehicle and its location and duration. The system
uses geographic position and time information from global positioning satellites. This system
consists of an Android mobile phone containing a GSM and GPS modem and the processor
permanently integrated into the vehicle. This device is called a tracking device that continuously
accesses its current location and sends updates to the server. At the monitoring device that is an
Android application provides the user the exact location of the vehicles of his interest.
A mobile tracking fleet management system is used to monitor different types of vehicles such as
cars, vans, trucks and airplanes (Saghaei, .MoravvejFarsh, 2016). It has many applications such
as vehicle tracking and diagnostics, improved driver performance, speed control and fuel
management. The transport tracking system is a device that uses the global positioning system to
determine the precise location of the vehicle to which it is attached and to record the position of
the vehicle at regular intervals. (IEEE Journal of Vol. 20, No. 5, pages 582-589, 2017) Saved
location data can be stored in the tracking unit or can be transmitted to a central location Server
connected to the Internet using a cell phone. (GPRS or SMS), modem built into the device. This
allows the vehicle's position to be displayed on a map in real time or during subsequent analysis
of the track, using GPS tracking software (Randeep, 2016).
A GPS vehicle location system uses the Global Navigation Satellite System (GNSS) which
works in conjunction with a range of satellites and uses microwave signals for communication. A
GPS device can be installed in the vehicle or used as a portable device.
The microwave signals are transmitted to the GPS device and received back to obtain
information on the real position of the vehicle, its speed and direction. This information can be
viewed online or in real time and can be saved for future reference (Kumar Maurya ,Mandeep
Singh,2016).
In addition to vehicle tracking, the GPS system can be used for various functions to track, control
and analyze your vehicle. Some of its important features are live speed monitoring, live location
on the map, activation / deactivation report of the vehicle's air conditioning, car door opening
alert, system fuel theft, the immobilization of the vehicle in case of theft, panic emergency
button, anti-theft alert system of the vehicle, Rental Car theft Deterrent System, Report of theft
Car On / Off The Global Positioning System (GPS) is a global radio navigation system
consisting of the constellation of 24 satellites and their ground stations. GPS transport services
can be placed in a vehicle, on a mobile phone, on special GPS devices, which can be a fixed or
portable unit (Ritika and Rakul, 2015).
The transportation tracking system is a way to monitor the location of a vehicle, the GPS
system, widely deployed to track fleets of trucks. Transport tracking ensures that vehicles are
used properly and can be recovered in the event of theft. Transportation tracking is based on both
Global Positioning Satellites (GPS) and a cellular system. A tracking module in the vehicle
continuously collects GPS coordinates indicating the real-time position of the vehicle. Using a
cellular data service, the coordinates are immediately transmitted to the computers of the
tracking company. Customers can then connect to the tracking company's website to see their
vehicles on road maps, similar to the in-dash and portable GPS navigation systems.
A tracking system combines the use of automatic vehicle location in individual vehicles with
software that collects this fleet data to obtain a complete picture of vehicle locations. Modern
vehicle tracking systems commonly use GPS or GLONASS technology to locate the vehicle, but
other types of automatic vehicle location technology may also be used. Vehicle information can
be viewed on electronic charts via the Internet or specialized software. Urban transit companies
are increasingly using vehicle tracking systems, especially in larger cities (Rameshbabu, 2014).
Transport tracking systems are the foundation of the shipping industry. They needed some kind
of system to determine where each vehicle was at a particular time and how long it was traveling.
Initially, the transport tracking systems developed for fleet management were passive tracking
systems. In the passive tracking system, a hardware device is installed in the vehicle to record
GPS position, speed, heading, and a triggering event such as turning on / off a key, door open /
closed. When the vehicle returns to a specific location, the device is deleted and the data
downloaded to the computer.
A real-time tracking system was required to transmit the collected information to the vehicle
after regular intervals or at least could transmit the information when the monitoring station
requested it. Active systems have also been developed to transmit vehicle data in real time via
cellular or satellite networks to a remote computer or data center.
Many current vehicle systems were equipped with the Automatic Vehicle Location (AVL)
feature. AVL is a concept for determining the geographical location of a vehicle and transmitting
this information to a remote server. The location is determined using a GPS and the transmission
mechanism could be a satellite, a terrestrial cellular radio connection between the vehicle and a
radio receiver, a satellite or a nearby cell tower. After capture, tracking data can be transmitted
using any telemetry or wireless communication system. GSM is the most used service for this
purpose.
A transport tracking system consists of an electronic device installed on a vehicle, so that its
owner or a third party can track its position. Most current transport tracking systems use the
Global Positioning System (GPS) to get an accurate reading of the vehicle's position.
Communication components such as cellular transmitters (GSM) and satellite or Google Map
will be combined to transmit the position of the vehicle to a remote user. The vehicle information
can then be viewed using software installed on a computer.
Transport tracking systems are commonly used by fleet operators for fleet management functions
such as routing, dispatching, on-board information and security. Other applications include
monitoring of driving behavior, such as an employee or parent with an adolescent driver.
Transport tracking systems are also popular in consumer vehicles as a device for preventing and
recovering theft. The police can simply follow the signal from the location system and locate the
stolen vehicle. When used as a security system, the transport tracking system can complement or
replace a traditional car alarm. The existence of a transport tracking device can then be used to
reduce the cost of insurance, as the risk of vehicle loss decreases significantly ( Khan and Ravi ,
2012).
Transportation tracking is useful in many other applications, such as asset tracking scenarios, in
which companies must track valuable assets for insurance and other supervisory purposes. In the
field of mobile sales where the situation of sales professionals can easily access real-time
locations. For example, in unfamiliar areas, they can locate themselves, their customers and
prospects, get road routes and add last-minute appointments to routes. Benefits include increased
productivity, reduced driving time and increased time with current and potential customers.
It has been reported that with this system, users have been able to gain many benefits by auditing
employee hours to ensure better use of vehicles. This system has also proven its ability to reduce
mileage, so fuel costs through control of private use of vehicles. Reducing the average speed of
vehicles also improves fuel efficiency. Productivity will also be increased through better
budgeting of time and resources (Stephen Teang,2007).
This project is designed and developed to meet the needs of today's transportation company, in
order to keep track of its vehicles. It is a very useful and versatile device, which can actually be
used by anyone who needs to keep track of their valuable assets and not just by the automaker.
The desired system output will be data such as position, speed and time obtained from the GPS
receiver and will be displayed on the computer screen ( Krishna, 2013).

1.2 STATEMENT OF THE PROBLEM


Vehicle theft is a common crime and a lot of thieves actually get away with it. Since we are sure
that such situation can occur and we cannot stop cars from being stolen, then the need to develop
an android based application that helps in tracking stolen vehicles for easy recovery is necessary.
This project serves as a means of assisting law enforcement agencies and the general public to
easily recover stolen vehicles from any part of the country.

1.3 AIM AND OBJECTIVES


The aim of this project is to develop a vehicle tracking system using Map-matching search
algorithm.
i. Design and develop the GPS/GSM tracking system
ii. Design a GPS framework using and android phone as a tracking device
iii. Implement the proposed system in ionic and Google firebase

1.4 SIGNIFICANCE OF THE STUDY


The significance of this study is to design an android based application that would serve as a
vehicle tracking device, which will be used to determine/know the real-time or precise location
of vehicle at anytime and anywhere, in order to locate the vehicle. Hence, this system can be
adopted by any organizations, individuals, schools and other bodies to track down or monitor
their vehicles.
1.5 SCOPE OF THE STUDY
The study way or focus is centered on the design and development of transport tracking system
using map-matching search algorithm with GPS and Android GSM Device.

1.6 LIMITATIONS OF THE STUDY


This program cannot work in lower SDK of Android OS thereby forcing user/client to upgrade or
get higher version of Android OS.
1.7 DEFINITION OF TERMS

GPS: Global Positioning System


GSM: Global System for Mobile communications
AVL: Automatic Vehicle Locator
AC: Air Conditioner
GNSS: Global Navigation Satellite System
GLONASS: Global Navigation Satellite System
1.8 ORGANIZATION OF THE STUDY
The remaining parts of this study are as follows:
Chapter Two: It maintains literature review and discussion of issues related to the study.
Chapter Three: Discusses the methodology, analysis of existing system, problems of the existing
system, description of the proposed system and advantages of proposed system.
Chapter Four: This chapter contains the design and implementation of the system which includes
input and output design, programming languages used with reason, hardware and software
support and a proper documentation of the system.
Chapter Five: Presents a brief summary of the work done, conclusion and recommendation.
Other appendices included after the references used are; algorithm, system flowchart, program
flowchart, program source listing and generated computer output.
CHAPTER TWO
LITERATURE REVIEW
2.0 INTRODUCTION
Chapter one discussed the overview, problem statements, objectives and scopes, contributions
and expected output of the project to get a better understanding of doing this project. This
chapter will describe on fleet tracking system using map matching search algorithm.
2.1 FLEET

Fleet vehicles are groups of motor vehicles owned or leased by a business, government agency or
other organization rather than by an individual or family. Typical examples are vehicles operated
by car rental companies, taxicab companies, public utilities, public bus companies, and police
departments. In addition, many businesses purchase or lease fleet vehicles to deliver goods to
customers, or for sales representatives to travel to clients. In some jurisdictions and countries,
fleet vehicle also means vehicles that are privately owned by employees, or on novated leases,
but are used for work purposes; this is called the grey fleet

FLEET MANAGEMENT

Fleet management is an administrative approach that allows companies to organize and


coordinate work vehicles with the aim to improve efficiency, reduce costs, and provide
compliance with government regulations. While most commonly used for vehicle tracking, fleet
management includes following and recording mechanical diagnostics and driver behavior.

leet management is used by couriers, oil and gas delivery, utilities, repair and service industry
businesses to ensure responsible vehicle use, confirm safety and enable real-time tracking.
Although commonly associated with delivery cars and trucks, the boating industry uses fleet
management technology as well.

Vendors offer many fleet management technologies. Vehicles use telematics like GPS for reliable
global automatic vehicle location (AVL) detection, though some use GLONASS or less
expensive cellular triangulation in remote and less-traveled areas.

Fleet management software allows a company’s management and dispatchers to track all
vehicles from a central location. Tracking systems are used to monitor driver behavior, proper
vehicle use, work breaks and safety. Fleet management software may also include some remote
control capabilities such as speed limiting, engine revolution limiting and gradual slowing or
stopping of vehicles. Remote security features help prevent stolen vehicles and cargo with GPS,
mapping and cellular technology to quickly and accurately locate rogue vehicles. Vehicle
operation is often monitored for mechanical problems and efficiency, helping the overall
efficiency of the company and protecting profitability.

Because commercial vehicle accidents can be subject to an investigation, the data logged in fleet
management software may be subpoenaed by law enforcement.

2.1.1 TRACKING SYSTEM

A tracking system is used for the observing of persons or objects on the move and supplying
a timely ordered sequence of location data for further processing.

In virtual space technology, a tracking system is generally a system capable of rendering virtual
space to a human observer while tracking the observer's coordinates. For instance, in dynamic
virtual auditory space simulations, a real-time head tracker provides feedback to the central
processor, allowing for selection of appropriate head-related transfer functions at the estimated
current position of the observer relative to the environment.

The purpose of a tracking system is to determine the location or direction of a target on a near-
continuous basis. An ideal tracking system would maintain contact and constantly update the
target's bearing, range and elevation. The output of the tracking system can be sent to a fire
control system, which stores the information and derives the target's motion and therefore its
future position. As we shall see, tracking systems not only provide an automatic target following
feature but also determine the target's position with sufficient accuracy for weapons delivery.

Tracking System is a system used to monitor the data of objects on the go. It is becoming an
important tool for industries that want real-time information about their fleet, personnel or
merchandise. The system enables the business to run smoothly and effectively. Many oil and gas
companies and various other organizations are installing the system as it leads to potential
savings on running costs. An ideal system constantly updates the target’s location, elevation, and
range.
2.1.2 ALGORTIHM

An algorithm is a set of self-contained sequence of instructions or actions that contains finite


space or sequence and that will give us a result to a specific problem in a finite amount of time.

It is a logical and mathematical approach to solve or crack a problem using any possible method.

Types of algorithm

Well there are many types of algorithm but the most fundamental types of algorithm are:

 Recursive algorithms
 Dynamic programming algorithm
 Backtracking algorithm
 Divide and conquer algorithm
 Greedy algorithm
 Brute Force algorithm
 Randomized algorithm

SIMPLE RECURSIVE ALGORITHM

Solves the base case directly and then recurs with a simpler or easier input every time (A base
value is set at the starting for which the algorithm terminates).

It is use to solve the problems which can be broken into simpler or smaller problems of same
type.

DYNAMIC PROGRAMMING ALGORITHM

A dynamic programming algorithm (also known as dynamic optimization algorithm) remembers


the past result and uses them to find new result means it solve complex problems by breaking it
down into a collection of simpler subproblems, then solving each of those subproblems only
once ,and storing their solution for future use instead of recomputing their solutions again.
BACKTRACKING ALGORITHM

How about we learn backtracking using an example so let’s say we have a problem
“Monk” and we divide it into four smaller problems “M, R, A, A”. It may be the case that the
solution of these problems did not get accepted as the solution of “Monk”.

In fact we did not know on which one it depends. So we will check each one of them one by one
until we find the solution for “Monk”.

So basically we attempt solving a subproblem but if we did not reach the desired solution undo
whatever you have done and start from the scratch again until you find the solution.

DIVIDE AND CONQUER ALGORITHM

Divide and conquer consist of two parts first of all it divides the problems into smaller
sub problems of the same type and solve them solve them recursively and then combine them to
form the solution of the original problem.

GREEDY ALGORITHM

Greedy algorithm is an algorithm that solves the problem by taking optimal solution at
the local level (without regards for any consequences) with the hope of finding optimal solution
at the global level.

Greedy algorithm is used to find the optimal solution but it is not necessary that you will
definitely find the optimal solution by following this algorithm.

Like there are some problems for which an optimal solution does not exist (currently) these are
called NP complete problem.

BRUTE FORCE ALGORITHM

A brute force algorithm simply tries all the possibilities until a satisfactory solution is
found. Such types of algorithm are also used to find the optimal (best) solution as it checks all
the possible solutions. And also used for finding a satisfactory solution (not the best), simply
stop as soon as a solution of the problem is found.

RANDOMIZED ALGORITHM

A randomized algorithm uses a random number at least once during the computation to
make a decision.

SHORTEST PATH ALGORITHM

Dijkstra's algorithm (or Dijkstra's Shortest Path First algorithm, SPF algorithm) is
an algorithm for finding the shortest paths between nodes in a graph, which may represent, for
example, road networks. It was conceived by computer scientistEdsger W. Dijkstra in 1956 and
published three years later (Frana, Phil (August 2010)

The algorithm exists in many variants; Dijkstra's original variant found the shortest path
between two nodes, Dijkstra, E. W. (1959) but a more common variant fixes a single node as the
"source" node and finds shortest paths from the source to all other nodes in the graph, producing
a shortest-path tree.

For a given source node in the graph, the algorithm finds the shortest path between that
node and every other Mehlhorn, Kurt; Sanders, Peter (2008). It can also be used for finding the
shortest paths from a single node to a single destination node by stopping the algorithm once the
shortest path to the destination node has been determined. For example, if the nodes of the graph
represent cities and edge path costs represent driving distances between pairs of cities connected
by a direct road, Dijkstra's algorithm can be used to find the shortest route between one city and
all other cities. As a result, the shortest path algorithm is widely used in network routing
protocols, most notably IS-IS (Intermediate System to Intermediate System) and Open Shortest
Path First (OSPF). It is also employed as a subroutine in other algorithms such as Johnson's.

The Dijkstra algorithm uses labels that are positive integer or real numbers, which have
the strict weak ordering defined. Interestingly, Dijkstra can be generalized to use labels defined
in any way, provided they have the strict partial order defined, and provided the subsequent
labels (a subsequent label is produced when traversing an edge) are monotonically non-
decreasing. This generalization is called the Generic Dijkstra shortest-path algorithm.
ADVANTAGE OF SHORTEST PATH ALGORITHMS
1) It is used in Google Maps

2) It is used in finding Shortest Path.

3) It is used in geographical Maps

4) To find locations of Map which refers to vertices of graph.

5) Distance between the location refers to edges.

6) It is used in IP routing to find Open shortest Path First.

7) It is used in the telephone network.

DISADVANTAGE OF SHORTEST PATH ALGORITHM

1) It do blind search so wastes lot of time while processing.

2) It cannot handle negative edges.

3) This leads to acyclic graphs and most often cannot obtain the right shortest path.

MAP MATCHING SEARCH ALGORITHMS

Map matching is the problem of how to match recorded geographic coordinates to a


logical model of the real world, typically using some form of Geographic Information System.
The most common approach is to take recorded, serial location points (e.g. from GPS) and relate
them to edges in an existing street graph (network), usually in a sorted list representing the travel
of a user or vehicle. Matching observations to a logical model in this way has applications
in satellite navigation, GPS tracking of freight, and transportation engineering.

Map matching algorithms can be divided in real-time and offline algorithms. Real-time
algorithms associate the position during the recording process to the road network. Offline
algorithms are used after the data is recorded and are then matched to the road network. Real-
time applications can only calculate based upon the points prior to a given time (as opposed to
those of a whole journey), but are intended to be used in 'live' environments. This brings a
compromise of performance over accuracy. Offline applications can consider all points and so
can tolerate slower performance in favor of accuracy.

WHY MAP MATCHING SEARCH ALGORITMS IS BETTER THAN SHORTEST


PATH SEARCH ALGORITHMS

Shortest path search algorithms covered a short range on the map why the map matching
search algorithms can covered a long distance in which can be located in any part of the world.
Shortest path search (Dijkstra) method is a well-known algorithm for finding the optimum path
in shortest-path search problems. With that method, however, the time required to find the
optimum path becomes remarkably long when the search scope is broad, so the (Djikstra)
method is not suitable for real-time problems. Map-matching algorithms that utilise road
segment connectivity along with other data (i.e. position, speed and heading) in the process of
map-matching are normally suitable for high frequency (1 Hz or higher) positioning data from
GPS.

2.2 REVIEW ON RELATED WORK

SADAPHALT, 2001 HE PROPOSED SYSTEM TO OVERCOME PROBLEM OF


PUBLIC TRANSPORTATION
Wireless sensor network used for monitoring of bus transportation system and record of
arrival time of buses at bus stops. The system is detecting the delay and arrival time of bus at bus
stops. Propose use of minimal information viz. record of arrival time of the buses at the bus-
stops, for improvement of transport system. Present algorithms to perform various analysis
operations namely detection of bus delays, likely cause of the delay and prediction of likely
arrival time of buses at the bus-stops. Also present and compare various design choices of WSN
available for bus transportation system.
My proposed system is better than this method is that Map-Matching Search Algorithm
handles the positioning location and communication between two or more devices over a short or
long distance apart, using the signals emitted from them.
KAKUDA, 2006 KAKUDA PROPOSED TECHNOLOGY FOR CHILDREN TRACKING
SYSTEM
Prevent crimes against children and beneficial to parents. The technology is based on
mobile ad hoc network. The system is helpful to parent to know the safety level and to and from
information of their children on school route. Proposed system consists of Android terminals
which has Wireless LAN device and Bluetooth device with the ad hoc communication function.
Our system manages groups of Android terminals using Autonomous Clustering technique. In
this paper, we show the system requirements for our children tracking system and describe the
implementation features to satisfy the system requirements. Finally, we provide some
preliminary implemented results for our proposed system.
My proposed system is that the tracking system can also be very useful for Intelligent
Transportation System. For example, it can be used in probe cars to measure real-time traffic
data to identify the congesting area. It can also be a life saver in an emergency case to quickly
and automatically report a vehicle position to a rescue agent when an accident happens to the
vehicle. In addition, it can be attached to a vehicle with an anti-theft system to identify its
location when it is stolen.

ALMOMANI, 2009 ALMOMANI PROPOSED SYSTEM WHICH IS USEFUL FOR


OPERATORS TO MONITOR DRIVING BEHAVIOR OF THEIR EMPLOYEES.
The tracking system includes acquiring the location & ground speed of vehicle in the
current movement. This system receives SMS alert when the vehicle exceeds the predefined
limits by using global system for mobile communication. The real time query system for public
transport service using Zigbee and RFID is more competent and suitable for passengers demand
and give data such as bus location, bus number and number of persons inside the bus in real time.
it also monitors the vehicle by setting speed and geographical limits and therefore receiving SMS
alerts when the vehicle exceeds these pre-defined limits. Additionally, all the movements and
stops of a given vehicle can also be monitored. Tracking vehicles in our system uses a wide
range of new technologies and communication networks including General Packet Radio Service
(GPRS), Global System for Mobile Communication (GSM), the Internet or the World Wide Web
and Global Positioning System (GPS).
My proposed system offers a real-time tracking system using a client-server model. Our
client is an embedded device with a GPS/GPRS module to identify device location information
that is periodically transmitted to a server. Our server is a personal computer with a web server
program toreceive the location information that is then converted into the format that can be
displayed by using Google Earth software or Google Map technology.
MUHAMMAD, 2014 NEURAL NETWORK IS USED TO PROCESS UNCORRECTED
RAW SIGNALS RECEIVED BY GPS RECEIVER.
A neural network having an input receiving the satellite related information to obtain an
output signal representative of receiver related navigation information, where in the neural
network comprises one of the adaptive learning for the error reduction and optimum calculation.
This system improves the average accuracy of GPS signal reception at the bus station. The neural
network is trained with a particular GPS receiver. In addition to some fundamental functions
such as real-time monitoring, some featured functions can tightly be combined to make the
system compatible with the daily operations of any public transport scheme. The proposed
method will surely improve the average accuracy of GPS signal reception at the bus station
which led people to take decision either to wait for Bus or not.
Neural network is used to process uncorrected raw signals received by gps receiver. In
which map matching search algorithm is better than is because we built a transport tracking
device with two different phases. The first phase is the tracking part, which will be installed on
an Android phone and integrated into a vehicle and will monitor this vehicle in real time from the
second phase.
My real-time tracking management system is an open system that uses a free and open source
software and is composed of commodity hardware that is easy-to-find. Our system is composed
of three components, a GPS Tracking Device, a server and a database as shown in Figure 1. The
GPS tracking device is an embedded system that transmits location information to the server
through GPRS networks. The server is a personal computer that receives the information and put
it in the database. The database formats the information in a special form that can search and
display using Google Earth software or Google Map.

MANIKANDAN, 2014 MANIKANDAN IMPLEMENT REAL TIME PUBLIC


TRANSPORTATION INFORMATION USING GSM QUERY RESPONSE SYSTEM.
The system is capable of a tracking large number of buses simultaneously, detect their
service routes and predict arrival time to down station with an acceptable accuracy. The
microcontroller acquires data from the GPS module and sends to the control point by using the
GSM module. The real time tracking of bus can be done by our proposed system and this
information is then given to remote user who want to know the real time bus information. Some
technologies like GPS (Global Positioning System), Google maps and GPRS (General Packet
Radio Service) are used for development purpose. Our system provides web based application,
which gives real time location of bus on Google Maps to remote user
GSM query response system is like old fashion of tracking system so the map matching
algorithm is introduced which is better than the GSM query response in which the Map-
Matching Search Algorithm handles the positioning location and communication between two or
more devices over a short or long distance apart, using the signals emitted from them. we built a
transport tracking device with two different phases. The first phase is the tracking part, which
will be installed on an Android phone and integrated into a vehicle and will monitor this vehicle
in real time from the second phase.
My intelligent system for supervision, control, and management of vehicle fleet,
has been developed, programmed, and implemented recently. In this system, we employed
the latest programmable integrated circuits (ICs) technology as well as the most powerful state
of the art software. Using this system, the managers or users can conduct online web-based
tracking of vehicle fleet on server based maps.
MARUTHI, 2016 MARUTHI PROPOSED SMS BASED BUS TRACKING
SYSTEM USING OPEN SOURCE TECHNOLOGIES.
The system manage and control the transport using a tracking device to known the
scheduled vehicle and current location of vehicle via SMS using GPS tracking device. An alert
can also be sending to notify the updated location to the users through SMS. The transport using
a tracking device to know the scheduled vehicle and the current location of the vehicle via SMS
using a GPS tracking device. It uses the satellite technology and advanced computer modeling to
track vehicles on their routes
This system makes available detailed reports of the mission, location, fuel consumption
rates, speed limits, and other required information according to customers’ requests. The most
significant features of this system are its global covering, high positioning accuracy, easy
operation by the user at any location, and easy energy management. The proposed system
comprises different hardware and software parts which are presented in the following sections
with more details.
CHAPTER THREE
SYSTEM DESIGN AND ANALYSIS
3.0 INTRODUCTION
Chapter one discussed the overview, problem statements, objectives and scopes, contributions
and expected output of the project to get a better understanding of doing this project. This
chapter will describe on fleet tracking system using map matching search algorithm.
3.1 DESCRIPTION OF THE EXISTING SYSTEM
The existing system uses manual method, where the owner of the stolen vehicle reports the case
to the police or law enforcement agent and before any measure can be taken by these operative
bodies, they will want to know the vehicle's make, model and year as well as the reporter’s
identifying information before they can take any further steps, and the probability of getting the
vehicle back is low since the operatives might not know the exact path to trace the vehicle to,
unlike in the case of the proposed system where the monitoring part of the vehicle will be used to
trace the device inside the vehicle to know the vehicle’s location on Google map.
3.2 PROBLEMS OF THE EXISTING SYSTEM
The problems are itemized below.
1. Lack of proper, correct, accurate and concise information about the vehicle’s
whereabouts.
2. The delay associated with the finding of the stolen vehicle is annoying.
3. Time is been wasted during the cause of questioning the owner of the stolen vehicle.

3.3 DESCRIPTION OF THE PROPOSED SYSTEM


In this project, we built a transport tracking device, with two different phases. First phase is the
tracking part, which will be installed on android phone and embedded into a vehicle and
monitoring that vehicle in real time from the second phase.
Second phase is for monitoring the location of the tracking part through Google map which will
be on another android device, and the algorithm that was adopted is Map-matching search
algorithm. Map-matching search algorithm works as an intermediary between the first and the
second part, where it determine the positional output of the device inside the vehicle (first part)
in terms of its latitude and longitude and then converts it into X and Y coordinates and the
coordinate will be sent as a signal to the monitoring part (Google Map module) to determine the
vehicle location.

3.4 ADVANTAGES OF THE PROPOSED SYSTEM


The vehicle tracking system can be used in a number of areas
1. The accuracy of getting the correct location of stolen vehicle is very certain compare to
manual searching
2. Companies and start-ups that provide cabs can place the device in their vehicles to ensure
the safety of passengers and vehicle.
3. Schools could also install the device in school bus to keep a constant check on the route
of the bus for the sake of student’s safety.
4. It reduces the cost of managing car theft operation by the law enforcement agent.
5. It provides more security than other existing systems.

3.5 METHODOLOGY
The system has 2 modules whereby each module work hand in hand together in order to achieve
the objectives of this project. The first module will handle tracking part, which will be installed
on android phone and embedded into a vehicle and the second module is for monitoring the
location of the first module.
3.6 Map-Matching Search Algorithm
Map-Matching Search Algorithm handles the positioning location and communication between
two or more devices over a short or long distance apart, using the signals emitted from them.
Map matching search algorithms essentially a way of comparing path geometries. In a typical
digital road map, the roads in the network are represented as piece wise linear curves. A simple
and intuitive way of performing map matching is to match the raw position estimated by the
positioning system to the nearest road segment. While this method, known as point-to-arc
mapping, is easy to implement it has many disadvantages.
A MAP MATCHING
C METHOD FOR GPS
D

CP2P3P4 E
D E
B
G F
B

A
A
Figure 3.1 Point-to-arc map matching. Figure 3.2 Arc-to-arc map matching.
Firstly, it does not make use of historical information about the vehicle’s motion and this can
result in mismatches similar to the case illustrated in Figure 1. The sequence of estimated
positions P0, P1, P2 and P3 indicate that the vehicle is traveling along the path comprising of
road segments AB and BC. However, since the previously estimated positions are not taken into
consideration, the point-to-arc method, the points P1and P2would be wrongly matched to the
closest road segment BE.
In route guidance systems, such mismatches are likely to result in wrong guidance instructions
being issued to the driver. Another shortcoming of the point-to-arc method is that the matched
position can oscillate between two closely situated parallel roads especially in dense urban street
networks.
Some of the drawbacks of the point-to-arc method can be overcome by another geometric
method known as arc-to-arc mapping. The arc-to-arc method matches the piece wise linear curve
formed by the sequence of estimated positions to a piece wise linear curve corresponding to a
path in the network based on their closeness or similarity. Results of field trials provided indicate
that while the arc-to-arc method consistently outperforms a simple point-to-arc method, it fails to
outperform a point-to-arc method that makes use of information about the vehicle heading. This
is possibly because arc-to-arc mapping can perform poorly in situations like the one illustrated in
Figure 2, where the piece wise linear curve formed by points P0,P1,P2,P3, and P4 is equally
close and similar to two candidate paths namely ABF and BCE.
Algorithms that make use of the geometric approach can be improved by incorporating
topological information such that only those road segments that are directly connected to the
current road of travel are considered. However, this can result in one wrong match leading to a
sequence of wrong matches. Another class of algorithms, known as probabilistic algorithms,
makes use of statistical error models of the positioning sensor to define a confidence region
within which the true vehicle position may lie. Only those roads that lie within this region are
considered for map matching. Although these algorithms can recover from wrong matches
quickly, they require more computation time. In dense urban road networks, it is often difficult to
precisely identify the road on which the vehicle is traveling. Rather, the map-matching algorithm
may only be able to determine that the vehicle is more likely to be on some roads and less likely
to be on certain other roads. Fuzzy logic has been proven to be an effective way to deal with such
ambiguous situations. Because map matching is a decision making process involving a degree of
ambiguity, fuzzy logic based algorithms are often employed to perform map matching.
In this work, we propose an efficient map-matching algorithm that can be implemented on
systems with low computational resources such as a handheld device (Android device). We
conceptually split the map matching problem into two tasks namely, correctly identifying the
road of travel and, determining the exact location of the vehicle on the identified road. We make
use of a simple fuzzy rule based inference system for identifying the road of travel.

3.7 Adaptation Of The Transport Tracking System With The Work ability Of The Map-
matching Search Algorithm
Map-Matching Search Algorithm handles the positioning location and communication
between two or more devices over a short or long distance apart(Using University of ilorin as a
case study), using the signals emitted from them.
The work ability of the proposed system is divided into two phases namely:
1. Tracking Part: The first phase will handle tracking part, which will be installed on
android phone and embedded into a vehicle and monitoring that vehicle in real time from
the second phase.
2. Monitoring Part: Second phase will be for monitoring the location of the tracking part
through Google map which will be on another android device, and the algorithm that will
be adopted is Map-matching search algorithm with fuzzy rule. This algorithm will work
as an intermediary between the first and the second part, where it will determine the
positional output of the device inside the vehicle (first phase) in terms of its latitude and
longitude and then converts it into X and Y coordinates and the coordinate will then be
sent as a signal to the monitoring part (Google Map module) to determine the vehicle
location.
Pseudo code for Map-matching Search Algorithm
1. Form X road list using range query
2. Calculate travel likelihood for all roads in X road list
3. Test if Vehicle is off-road
4. If Yes, Goto 1 otherwise proceed
5. Use Map GPS-estimated position to identified road of travel
6. Test if successor roads is generated
7. If No, Goto 2 otherwise proceed
8. Add successor roads to X road list forming new X road list and delete roads with low
travel likelihood
9. Goto 1 to Update X road list in every 0.5-1 sec
Figure 3.3 The map-tracking algorithm
Figure 3.4 The map-matching algorithm
Start

Open database

Read location
Longitude & latitude

Is location
Valid?

Display location on map

Close database

Return

Figure3.5 The display of tracked device

Implementation of the above Algorithm in Transport Tracking System


1. Locate vehicle road list
2. Calculate travel location for the vehicle road list
3. Using fuzzy rule, Check if the Vehicle is off-road
4. If the vehicle is off-road, re-locate vehicle road list otherwise proceed
5. Use Map GPS-estimated position of the vehicle to determine the positional output of the
vehicle road list in terms of its latitude and longitude and then converts it into X and Y
coordinates.
6. Then send the coordinate as a signal to the monitoring part to identified road of travel
7. Test if next roads is generated
8. If No, Go to 2 otherwise proceed
9. Add next roads to X road list forming new X road list and delete roads with low travel
likelihood
10. Go to 1 to Update X road list
Figure 3.6 Transport Tracking System Use Case
3.8 System Design
1. Software design sits at the technical kernel of the software engineering process and is
applied regardless of the development paradigm and area of application. Design is the
first step in the development phase for any engineered product or system. The designer’s
goal is to produce a model or representation of an entity that will later be built.
Beginning, once system requirement have been specified and analyzed, system design is
the first of the three technical activities -design, code and test that is required to build and
verify software.

2. The importance can be stated with a single word “Quality”. Design is the place where
quality is fostered in software development. Design provides us with representations of
software that can assess for quality. Design is the only way that we can accurately
translate a customer’s view into a finished software product or system. Software design
serves as a foundation for all the software engineering steps that follow. Without a strong
design we risk building an unstable system – one that will be difficult to test, one whose
quality cannot be assessed until the last stage.

3. During design, progressive refinement of data structure, program structure, and


procedural details are developed reviewed and documented. System design can be viewed
from either technical or project management perspective. From the technical point of
view, design is comprised of four activities – architectural design, data structure design,
interface design and procedural design.
4. The standard measure of success in machine learning is the overall accuracy, which is
defined as the percentage of all applications classified correctly. Research papers
studying malware usually work with multi-classes in which each category has many more
benign than malicious applications. In this (imbalanced) case, the accuracy measure may
not be an adequate performance metric. For example, if a classifier correctly identifies
the entire data set as benign, the classifier achieves high accuracy results while failing to
detect the malicious applications.
5. In order to adequately reflect categorization performance, there are more accurate metrics
that can be used in imbalanced cases, including ‘recall’ and ‘precision’, which can be
combined into ‘F-measure’. These metrics would normally be calculated on each class
separately and then combined together to provide a weighted average.
CHAPTER FOUR
Design and Implementation Result and Discursion
4.1 Installation of tracking system
Output Design
Outputs from computer systems are required primarily to communicate the results of
processing to users. They are also used to provide a permanent copy of the results for later
consultation.
The outputs were needed to be generated as a hot copy and as well as queries to be viewed on the
screen. Keeping in view these outputs, the format for the output is taken from the outputs,
Figure 4.1: Home Page.
4.2 Starting the tracker

Figure 4.2: Android Mobile Menu Interface tracker activate


Input Design

Input design is a part of overall system design. The main objective during the input design is as
given below:
1. To produce a cost-effective method of input.
2. To achieve the highest possible level of accuracy.
3. To ensure that the input is acceptable and understood by the user.
4.3 Locating the vehicle

Figure 4.3 back end monitoring server showing the location of the tracked vehicle

ADVANTAGES OF THE PROPOSED SYSTEM


The vehicle tracking system can be used in a number of areas

1. The accuracy of getting the correct location of stolen vehicle is very certain compare to
manual searching
2. Companies and start-ups that provide cabs can place the device in their vehicles to ensure
the safety of passengers and vehicle.
3. Schools could also install the device in school bus to keep a constant check on the route
of the bus for the sake of student’s safety.
4. It reduces the cost of managing car theft operation by the law enforcement agent.
5. It provides more security than other existing systems.
User interface systems can be broadly classified as:

1. User initiated interface the user is in charge, controlling the progress of the user/computer
dialogue. In the computer-initiated interface, the computer selects the next stage in the
interaction.

2. Computer initiated interfaces

In the computer initiated interfaces the computer guides the progress of the user/computer
dialogue. Information is displayed and the user response of the computer takes action or displays
further information.

User Initiated Interfaces

User initiated interfaces fall into two approximate classes:

1. Command driven interfaces: In this type of interface the user inputs commands or queries
which are interpreted by the computer.

2. Forms oriented interface: The user calls up an image of the form to his/her screen and fills in
the form. The forms oriented interface is chosen because it is the best choice.

Computer-Initiated Interfaces

The following computer – initiated interfaces were used:

1. The menu system for the user is presented with a list of alternatives and the user chooses one;
of alternatives.

2. Questions – answer type dialog system where the computer asks question and takes action
based on the basis of the users reply.

Right from the start the system is going to be menu driven, the opening menu displays the
available options. Choosing one option gives another popup menu with more options. In this
way every option leads the users to data entry form where the user can key in the data.
Error Message Design:

The design of error messages is an important part of the user interface design. As user is bound
to commit some errors or other while designing a system the system should be designed to be
helpful by providing the user with information regarding the error he/she has committed.

This application must be able to produce output at different modules for different inputs.

Performance Requirements

Performance is measured in terms of the output provided by the application.

Requirement specification plays an important part in the analysis of a system. Only when the
requirement specifications are properly given, it is possible to design a system, which will fit into
required environment. It rests largely in the part of the users of the existing system to give the
requirement specifications because they are the people who finally use the system. This is
because the requirements have to be known during the initial stages so that the system can be
designed according to those requirements. It is very difficult to change the system once it has
been designed and on the other hand designing a system, which does not cater to the
requirements of the user, is of no use.

The requirement specifications for the proposed system are broadly stated as given below:

1. The system will be able to interface with the existing system


2. The system will be accurate
3. The system will be better than the existing system

The existing system is completely dependent on the user to perform all the duties.

Software and Hardware Requirement

The following are the software requirement of the proposed system.

1. Operating system at least window XP and above


2. 512mb RAM and above
3. Android studio
4. emulator
5. Local storage (Backend)

Features of the Common Language Run Time

The common language runtime manages memory, thread execution, code execution, code safety
verification, compilation, and other system services. These features are intrinsic to the managed
code that runs on the common language runtime.

With regards to security, managed components are awarded varying degrees of trust, depending
on a number of factors that include their origin (such as the Internet, enterprise network, or local
computer). This means that a managed component might or might not be able to perform file-
access operations, registry-access operations, or other sensitive functions, even if it is being used
in the same active application.

The runtime enforces code access security. For example, users can trust that an executable
embedded in a Web page can play an animation on screen or sing a song, but cannot access their
personal data, file system, or network. The security features of the runtime thus enable legitimate
Internet-deployed software to be exceptionally featuring rich.

The runtime also enforces code robustness by implementing a strict type- and code-verification
infrastructure called the common type system (CTS). The CTS ensures that all managed code is
self-describing. The various Microsoft and third-party language compilers

Generate managed code that conforms to the CTS. This means that managed code can consume
other managed types and instances, while strictly enforcing type fidelity and type safety.

In addition, the managed environment of the runtime eliminates many common software issues.
For example, the runtime automatically handles object layout and manages references to objects,
releasing them when they are no longer being used. This automatic memory management
resolves the two most common application errors, memory leaks and invalid memory references.

Language support

Language: android studio and emulator

Local storage (Backend)


Relational Database

Sometimes all the information of interest to a business operation can be stored in one table.
Local storage is used to for the backend which makes it very easy to link the data in multiple
tables. Matching data to its categories. This is what makes the local storage stores data in two or
more tables and enables you to define relationships between the tables and enables you to define
relationships between the tables.

Data Abstraction

A major purpose of a database system is to provide users with an abstract view of the data. This
system hides certain details of how the data is stored and maintained. Data abstraction is divided
into three levels.

Physical level: This is the lowest level of abstraction at which one describes how the data are
actually stored.

Conceptual Level: At this level of database abstraction all the attributed and what data are
actually stored is described and entries and relationship among them.

View level: This is the highest level of abstraction at which one describes only part of the
database.

Advantages of RDBMS

·Redundancy can be avoided

·Inconsistency can be eliminated

·Data can be Shared

·Standards can be enforced

·Security restrictions can be applied

·Integrity can be maintained

·Conflicting requirements can be balanced


·Data independence can be achieved.

E – R Diagrams

·The relation upon the system is structure through a conceptual ER-Diagram, which not only
specifics the existential entities but also the standard relations through which the system exists
and the cardinalities that are necessary for the system state to continue.

·The entity Relationship Diagram (ERD) depicts the relationship between the data objects. The
ERD is the notation that is used to conduct the date modeling activity the attributes of each data
object noted is the ERD can be described resign a data object descriptions.

System Testing and Implementation

Software testing is a critical element of software quality assurance and represents the ultimate
review of specification, design and coding. In fact, testing is the one step in the software
engineering process that could be viewed as destructive rather than constructive.

A strategy for software testing integrates software test case design methods into a well-planned
series of steps that result in the successful construction of software. Testing is the set of activities
that can be planned in advance and conducted systematically. The underlying motivation of
program testing is to affirm software quality with methods that can economically and effectively
apply to both strategic to both large and small-scale systems.

Strategic Approach to Software Testing

The software engineering process can be viewed as a spiral. Initially system engineering defines
the role of software and leads to software requirement analysis where the information domain,
functions, behavior, performance, constraints and validation criteria for software are established.
Moving inward along the spiral, we come to design and finally to coding. To develop computer
software we spiral in along streamlines that decrease the level of abstraction on each turn.

A strategy for software testing may also be viewed in the context of the spiral. Unit testing
begins at the vertex of the spiral and concentrates on each unit of the software as implemented in
source code. Testing progress by moving outward along the spiral to integration testing, where
the focus is on the design and the construction of the software architecture. Talking another turn
on outward on the spiral we encounter validation testing where requirements established as part
of software requirements analysis are validated against the software that has been constructed.
Finally we arrive at system testing, where the software and other system elements are tested as a
whole.

Unit Testing

Unit testing focuses verification effort on the smallest unit of software design, the module. The
unit testing we have is white box oriented and some modules the steps are conducted in parallel.

1. White Box Testing

This type of testing ensures that

1. All independent paths have been exercised at least once


2. All logical decisions have been exercised on their true and false sides
3. All loops are executed at their boundaries and within their operational bounds
4. All internal data structures have been exercised to assure their validity.

To follow the concept of white box testing we have tested each form .we have created
independently to verify that Data flow is correct, All conditions are exercised to check their
validity, All loops are executed on their boundaries.

2. Basic Path Testing

Established technique of flow graph with Cyclomatic complexity was used to derive test cases
for all the functions. The main steps in deriving test cases were:

Use the design of the code and draw correspondent flow graph.

Determine the Cyclomatic complexity of resultant flow graph, using formula:

V (G) =E-N+2 or

V (G) =P+1 or

V (G) =Number of Regions


Where V (G) is Cyclomatic complexity,

E is the number of edges,

N is the number of flow graph nodes,

P is the number of predicate nodes.

Determine the basis of set of linearly independent paths.

3. Conditional Testing

In this part of the testing each of the conditions were tested to both true and false aspects. And all
the resulting paths were tested. So that each path that may be generate on particular condition is
traced to uncover any possible errors.

4. Data Flow Testing

This type of testing selects the path of the program according to the location of definition and use
of variables. This kind of testing was used only when some local variable were declared.
The definition-use chain method was used in this type of testing. These were particularly useful
in nested statements.

5. Loop Testing

In this type of testing all the loops are tested to all the limits possible. The following exercise
was adopted for all loops:

·All the loops were tested at their limits, just above them and just below them.

·All the loops were skipped at least once.

·For nested loops test the inner most loop first and then work outwards.

·For concatenated loops the values of dependent loops were set with the help of connected loop.

·Unstructured loops were resolved into nested loops or concatenated loops and tested as above.

Each unit has been separately tested by the development team itself and all the input have been
validated.
System Security

The protection of computer based resources that includes hardware, software, data, procedures
and people against unauthorized use or natural

Disaster is known as System Security.

System Security can be divided into four related issues:

Security

Integrity

Privacy

Confidentiality

System Security: refers to the technical innovations and procedures applied to the hardware and
operation systems to protect against deliberate or accidental damage from a defined threat.

Data Security: is the protection of data from loss, disclosure, modification and destruction.

System Integrity: refers to the power functioning of hardware and programs, appropriate
physical security and safety against external threats such as eavesdropping and wiretapping.

Privacy: defines the rights of the user or organizations to determine what information they are
willing to share with or accept from others and how the organization can be protected against
unwelcome, unfair or excessive dissemination of information about it.

Confidentiality: is a special status given to sensitive information in a database to minimize the


possible invasion of privacy. It is an attribute of information that characterizes its need for
protection.
CHAPTER FIVE
SUMMARY, CONCLUSION AND RECOMMENDATIONS
5.1 SUMMARY
Transport tracking systems have become extremely advanced. Having one installed in a vehicle
is one of the ways that you can avoid someone tampering with it. This is also a great way to get
lower premiums on car insurance. There are many kinds of systems to choose from and most of
them are really affordable. Check online for the best deal you can get. Sometimes car owners
leave personal items in their cars like CD players, purses, and suitcase. These are temptations
that a thief might not be able to pass up. Never leave these kinds of items in your car where they
are visible to someone walking by. Tinted windows may also be something you might want to
have for your car. This would be the best way to keep the interior more private.

Due to the fact that man cannot work beyond his capacity, there is reduction in the total output of
the existing system of stolen vehicles recovery. The incidences that gave rise to inefficiencies of
the existing system and need for developing a new software based strategy include inability of
taken swift action immediately the report has been filed by the owner due to lack of the vehicle
details which will then be taken down, confirmation of stolen car if seen would not be easily
confirmed, report would have to be made to the owner before such car can be confirmed, and this
process might take a long time. Therefore this exclusive project (application) has been designed
to take appropriate care of such problems listed.

5.2 CONCLUSION

In today‘s world, the security of the vehicles is at stake. The incidents of theft are common. This
compels the consumer to install a tracking device, which will help them to know the location of
their lost or stolen vehicle. The vehicle-tracking device provide the user to know his/her
vehicle‘s location in real time. The product designed is user-friendly anyone with a little
knowledge of smartphone can use the system. It is easy to install the system in the vehicle and it
requires low maintenance. The coordinates received show the correct location on the Google
map using the android app.
5.3 RECOMMENDATION

Not to confused with Vehicle location data. A vehicle tracking system combines the use of
automatic vehicle location in individual vehicles with software that collects these fleet data for a
comprehensive picture of vehicle locations. Modern vehicle tracking systems commonly use
GPS or GLONASS technology for locating the vehicle, but other types of automatic vehicle
location technology can also be used. Vehicle information can be viewed on electronic maps via
the internet or specialized Google map or GPS device.
REFERENCES
Abid khan and Ravi Mishra, (2012) “GPS – Global System for Mobile Communications (GSM)
Based Tracking System”. Electronics and Electrical Engineering Department SSCET, CSVTU,
Bhilai, India.
Abid, Mishra, (2017) “GPS Navigation System”, Transportation Service using GPS
Al-Kheder, Maruthi (2015) “Intelligent Anti-Theft and Tracking System for Automobiles”,
International Journal of Machine Learning and Computing.
Almomani(2009) “System to monitor driving behavior of employee” International Journal of
Digital Information and Communications
Benjamin (2010) “Integrating Social Network Services with Vehicle Tracking Technologies”
International Journal of Advanced Computer Science and Applications.
G. Kiran Kumar, A. Mallikarjuna Prasad (2016) ”Public TransportationManagement Service
using GPS-GSM”, International Journal of Technology in Human Service Volume 34
Hui Hu &Lian Fang (2009). “Design and Implementation of Vehicle Monitoring System Based
on GPS/GSM/GIS” Third International Symposium on Intelligent Information Technology
Application ,School of Information Engineering, East China Jiao Tong University, Nanchang,
Jiangxi, China.
Iman M. Almomani, (2009) Ubiquitous GPS Vehicle Tracking and Management System.
Kakuda (2006) "Location Based Services for Mobiles: Technologies and Standards".
Krishna(2013) Public Transportation Management Service using GPS-GSM”, International
Journal of Research in Computer and Communication Technology,
Kumar Maurya ,Mandeep Singh,(2016) “Real Time Vehicle Tracking System using GSM and
GPS Technology-An Anti-theft Tracking System,” International Journal of Electronics and
Computer Science Engineering.
Lojack&Mukesh P.R (2013). “Real Time Web based Vehicle Tracking using GPS”, World
Academy of Science, Engineering and Technology.
Maruthi(2016) “SMS based bus tracking system using open source technologies”, Journal of
Advanced Tracking system and Technology
Manikandan (2012) "GPS Datum Conversion and Kalman Filtering for Reducing Positional
Errors", Asian Journal Of Computer Science And Information Technology1.
Mishra (2005) “Simple Bus Tracking System”, Journal of Advanced Computer Science and
Technology Research
Mohammed (2017). Smart On-Board Transportation Management System Using
GPS/GSM/GPRS Technologies to Reduce Traffic Violation in Developing Countries
Montaser et al. (2012). “Intelligent Anti-Theft and Tracking System for
Automobiles”.,Teknologi, Malaysia.
Patel Krishna Harshadbhai (2013). “Design of Global Positioning System (GPS) and Global
System for Mobile Communications (GSM) Based Vehicle Location and Tracking System.”
Limda, Vadodara, India.
Ramesh(2007) “Land vehicle application on android platform” Intelligent Systems and
Applications,
R.Ramani, (2013) “Vehicle Tracking and Locking System Based on GSM and GPS”, I.J.
Intelligent Systems and Applications.
RitikaRakul, (2015) “Combining model-based and heuristic techniques for tracking,”
Transportation on Electronic system, vol. 23
Sadaphalt (2001) “Design and Implementation Of vehicle Tracking System Using GPS”,
Journalof Information Engineering and Applications.
SaghaeiMoravvejFarsh (2016)“Intelligent Anti-Theft and Tracking System for Automobiles”,
International Journal of Machine Learning and Computing
Stephen Teang,(2007) D.A., "A New Approach of Automobile Localization System Using GPS
and GSM/GPRS Transmission," Electronics Technology.
Thomas (1998) “Real Time Web based Vehicle Tracking using GPS”, World Academy of
Science, Engineering and Technology.
Thuong et al., (2010) "A New Approach of Automobile Localization System Using GPS and
GSM/GPRS Transmission", Electronics Technology.
Xiao and Haidong, (2009)“Real Time Vehicle Tracking Using GPS and GSM”,Digital Control of
Dynamic Systems

You might also like