Beruflich Dokumente
Kultur Dokumente
INTRODUCTION
users all over the world as the entry of smartphones in the market at affordable
prices has triggered their usage. We have experienced a major shift in the way we
access the internet today with mobiles becoming the primary access point for
internet usage. In today’s fast paced world, phones are not just used for calling,
playing games etc. but with smartphones we can schedule our complete day, check
emails, make conference calls, connect using social network and a perform a host of
other activities. The growth of mobile phone market has generated a huge demand
for various mobile applications. Numerous mobile phone applications are available
that simplify various tasks for the users due to which we saw an accelerated growth
This mobile application decides to tackle a problem that are commonly known in
safety in the area. Nowadays, guards have been implemented to watch over the
neighbourhood for any unwanted activities such as crime and vandalism. The issue
is that since neighbouring areas can be in different sizes; it can be hard to know
where the guards are. Since they are physically separated, it is quite a challenge to
communicate or to meet up, should there be anything to notify or discuss about. The
community wants an efficient way to post up news around the local neighbourhood
1
as well. The neighbours also want to have an easy way to locate and send an
has come a long way since its first teetering steps in the 1970’s. Each new
development since then has aimed to improve performance and extend the
A RFID system is made up of two parts: a tag or label and a reader. RFID
tags or labels are embedded with a transmitter and a receiver. The RFID component
on the tags have two parts: a microchip that stores and processes information, and
an antenna to receive and transmit a signal. The tag contains the specific serial
number for one specific object. To read the information encoded on a tag, a two-way
using an antenna. The tag responds with the information written in its memory bank.
The interrogator will then transmit the read results to an RFID computer program.
2
1.2 PROBLEM STATEMENT
i) Some of the guards that are supposed to patrol the neighbourhood are not
patrolling the neighbourhood area but they just stand around in certain areas.
iii) The guards have to physically meet up to each other to communicate and
1.3 OBJECTIVE
ii) To notify the guards with an emergency signal like notification sounds, lights
3
1.4 SCOPE OF THE PROJECT
User Scope
i) There are two users which are the guards and the households. It will be
a) Guards
application.
Using RFID tags to notify that they are patrolling the area.
b) Households
System Scope
i) The users will login to the system which will reveal the features
a) Guards
4
There will be notifications like sound, lights from the camera
b) Households
emergency.
households that the guards are patrolling the area and update
the location of the guards when the guards scanned their RFID
Tags.
i) The guards does not have to physically meet up to communicate with the help
ii) The households can locate where the guards are patrolling.
iii) Push notification feed allows the guards to get an emergency notification from
the household allowing the guards to know which household has sent the
emergency notification.
5
1.6 ASSUMPTION(S) AND LIMITATION(S)
Assumptions
Limitations
Operating System.
iii) Humans errors can still be made such as typo or misinformation on the
iv) Some RFID Tags or Cards can be duplicated which allows guards to have
6
CHAPTER II
LITERATURE REVIEW
The Digital age is rising day by day; the mobile app industry is an exciting
area to keep an eye on. It has grown immensely over the last decade and it is likely
that it’ll continue to do so. What does the future of mobile app development hold?
What can we expect, given the current state of the industry and with knowledge of
how it has evolved over the past few decades? With people nowadays relying on
their smart phones to do information gathering about literally anything and doing
general task, the future holds bright for many developers (Sebastion Anthony, 2012)
services and functions from each and every industry. In this process of convergence,
the Smartphone ‘s are the leading devices taking the front end and playing the role
introduced in the market, referring a new class of mobile phones that provides
7
mobile phone with advanced features and functionality beyond traditional
functionalities like making phone calls and sending text messages. The Smartphone
are equipped with the capabilities to display photos, play games, play videos,
built in apps for social web sites and surf the Web, wireless Internet and much more.
Due to same reasons the Smartphone‘s now become a common choice for
consumers along with the use in business as it was initially intended for business
users only. Initially the Smartphone‘s were only perceived for business use due to
their cost and application, but not today, today we are in a frenetic Smartphone
Mobile wireless phones are the most popular mobile wireless technology used
with more features, such as voice-activated dialling, a WAP browser, and two-
8
2.4 PREVENTION OF CRIME IN THE NEIGHBOURHOOD
For centuries the criminal justice system has worked in a very simple manner:
take away the "criminals" and put them behind gates and walls segregated from the
rest of the population. This method holds true today, except now people are
voluntarily surrounding themselves with concrete and metal fences to escape the so-
called "criminals" of society. Americans are scared and residential society is slowly
beginning to show it. An effective tool for some Neighbourhood Watch programs to
who walk or drive an area on a regular basis to report incidents and problems to the
police and provide a visible presence that deters criminal activity. They are in no way
always plan their work with the local authorities. A citizen patrol, can cover a
the police dispatcher through two-way radios or cellular phones (Edward J. Drew &
on. According to RFIDupdate.com, one of the catalysts for the RFID industry has
been mandates issued by Wal-Mart and the US Department of Defence (DOD) for
their suppliers to adopt RFID technology. Although the market has not grown quickly
9
2.6 SECURE USER TO TAG AUTHENTICATION
of attention in the security community, for several decades. Solutions range from
issue. In the first proposed solution by Czeckis et al. [13], users authenticate to an
it) in a certain pattern. However, this method assumes that RFID tags are equipped
RFID tag using a mobile phone. In it, a vibrating mobile phone is used to lock or
unlock RFID tags. While the usability of PIN-Vibra seems promising, it has a some
PINs encoded in phone vibrations, (2) the user’s phone must be present and
functional (e.g., not out of battery) whenever the tag has to be used, and (3)
themselves well to other applications that would help amortize their cost.
The secure user-to-tag authentication solution described and tested in this paper is
most similar to Abadi et al.’s [7] proposal for authentication on smartcards, where a
10
2.7 REVIEW OF RELATED PRODUCTS
2.7.1 TrackView
The application allows GPS tracking in real time to get a live feed of the location of
the target. It has remote audio and video recording for seamless recording. The app
also has access to the camera of the device for capture. However, It does not have
any feature that is remotely close to chat functions. No bulletin boards to post news
feeds of the status and non-existent of the emergency notification button to notify
authorities.
11
2.7.2 Surveillance
The application save logs on anything that occurs. Real time alarm is also available
as the information will be sent to the e-mail of the user. It also features motion
detection; any motion the application detects it will capture a picture through the
camera of the device. However, there is no chat feature for communication and no
push notification feature to notify the user. There is no tracking feature through RFID
in this application.
12
2.7.3 AllGuard
notifications alarms when Tag holders has scanned their RFID tags, carries multiple
users and can create new alarms for other locations. The tags can be measured and
report in real time. The application utilises maps to track the location of tag holders.
13
2.8 Summary of Comparison
14
CHAPTER III
In this chapter will describe the coherent set of method used in carrying out this
project. The guidelines of the methodology chapter which consist of the research
approach and the workflow model in making the project successful is presented.
Agile mythology has small box iterations rather than phases. The output of each
iteration will be production release deliverable and could be evaluate and get early
feedback.
15
Agile refers more collaboration and interaction between different departments at
enterprise level and deliver the successful product with individual contribution.
describe the problem to be solved. The team defines the requirements for the
iteration, develops the code, and defines and runs integrated test scripts, and the
users verify the results. Verification occurs much earlier in the development process
iterative approach, and encourages rapid and flexible response to change (Nitin,
2013).
Every Agile project has a number of phases that lead it from the beginning until its
completion:
At this stage, the users formulates his requirements to the final product. He must
gather the user stories and prioritize them to know exactly what he needs. After that,
he must set the term of project performance. Usually, all agile projects have quite
short terms. That is one of the reasons for the name of this software development
method. For the requirements, it is required to know what the households want in the
application for easier way to post news and to notify the guards. It is also required to
16
know what guards want in the application, what ways to communicate with other
Planning Game. It is actually a meeting where the users announces all his
requirements to the final product and prioritizes them. After that, the Agile team
After the plan of the project is ready, the team starts to perform it. Usually, teams of
Agile developers work in short iterative cycles. Each cycle is dedicated to a certain
part of the final product. Such distances may last from 1 to 2 weeks. The
intermediate result is provided to the customer after each cycle. The plan of the cycle
may be changed according to the user’s wishes. In this iteration, we are constantly
After all the cycles are finished and all the part of the product are tested, it is
provided to the customer. If the users are satisfied, the Agile project comes to its end
and if not it will start back in designing, prototyping and customer evaluation phase
until the customer satisfied with the system. In this stage, once everything has been
settled we will combine all the requirements as requested by the users into one
effective application, which then will be released. Any more updates will be made.
17
3.2 RESEARCH METHODOLOGY
The way of gathering information is through questionnaires. Questionnaires is a
simple but effective to gather information.
Tools
The tools that will be used to develop the application are as follows: -
TOOLS DESCRIPTION
18
Hardware
The Hardware that will be used to develop the application are as follows: -
HARDWARE DESCRIPTION
installed on it.
19
3.4 Project Schedule
20
3.5 Requirement List
21
3.6 Use Case Diagram
22
3.7 Sequence Diagrams
23
3.9 Collaborative Diagram
24
Figure 3.7: Collaborative Diagram for Guards
25
3.10 Activity Diagrams
26
Figure 3.9: Activity Diagram for Guards
27
3.11 State Machine Diagrams
28
3.12 Entity Class Diagram
29
3.13 Prototype of the User Interface
30
CHAPTER IV
4.1 SUMMARY
can make the area a safer place. With the power of technology, we can take
advantage of creating an application that can help our daily lives. This Mobile
Application System will help the guards to communicate with each other even if they
are not within walking near distance and household families will be able send
emergency signals to guards with a push of a button. The community will also be
4.2 CONCLUSION
To wrap it all up, this Mobile Application System is for the neighbourhood
community who wants to make their area a safer place with ease will greatly
appreciate this application. Technology has been advancing every day since the time
of man existed. The opportunity to create a mobile application that is truly open
31