Vous êtes sur la page 1sur 36


Mobile devices, such as smart phones and PDAs, are playing an increasingly
important role in peoples lives. Location based services take advantage of user
location information and provides mobile users with a unique style of resource and
services. Nowadays more and more location-based applications and services
provide users about their locations information. As location proof plays a critical
role in enabling these applications, they are location-sensitive. The common theme
across all these applications is that they offer a reward or benefit to users locating
them in a certain geographical location. But users want their exact locations to be
pointed. There are many kinds of location-sensitive applications. One category is
location-based access control.
To introduce this project is our purpose is to mark the mobile phone smarter as that
we not seen in early days. To make this application user convenient so that user
can track the location of other user, parent can know the child location and user
can find the location of their mobile phone in case of mobile phone is lost.
Our aim to is to develop the android based application where the both the user has
the android application and any user of the application can know the current
location of the user when the both the user make the communication with each
There are several other reasons to develop this application is, these days mobile
theft is on the rise. On a rough estimate, there are 1.2 million to 2 million handsets
lost or stolen in the country every month. Assuming that these are low-end
handsets (priced between Rs 4,500 and Rs 5,000 each) the total lost or stolen value
of mobile handsets would be around Rs 400 crore every year. a lot of money
involved. Mobile phones have now become the most important device as it doubles
up as a wallet, not to mention its conventional uses of communication. It holds a
lot of data, e-mail accounts, power point presentation files and documents, and
protecting this is as important as protecting your wallet.So developing a mobile
tracking device will be very helpful in overcoming the problems. This software
application will help us to control and track our phone if it has been lost or stolen
by somebody. If the phone is lost, the user can be assured that it would not fall into
the wrong hands. The Global Positioning System (GPS) is a space-based global
navigation satellite system (GNSS) that provides location and time information in
all weather, anywhere on or near the Earth, where there is an unobstructed line of
sight to four or more GPS satellites. It is maintained by the United States
government and is freely accessible by anyone with a GPS receiver with some
technical limitations which are only removed for military users.Since the phones
today are essentially smartphones with features such as GPS ,microprocessor etc
we can make use of them to track the phone down with good accuracy.There are
lot of applications present in the market but we will be creating one which will
overcome some of the drawbacks in the mobile tracking applications already
Our project aims to create an ANDROID application which will track down the
phone wherever it is. This application will be installed on the phone and will give
the exact coordinates of the phone.
When activated the cellophane will use the get coordinates/ location from a
location provider which can be a GPS.
The coordinates will be forwarded to the online web server and the location will be
displayed using a embedded Google map.
This project is based on tracking of mobile phone in various scenarios. The various
functionality and roles of actors are given below:-

System scope:

The system will be deployed as an application on Android which will effectively
enable the user to utilize the inbuilt gps capabilities of android phones and hence
recover the phone.

The developed software will be deployed on individual on phones and could be
used as and when the situation demands.
This application will be highly useful for people who have important data with
them on their mobile or have expensive phones. This will help in saving thousands
of money.

Statement of Problem:-
The problem of statements is as follows,
Since the previous application take long time to send the GPS location to the
server, so that the finding the current location is difficult.
According to the other application process the user of the system must login
to the system to use the application.
That give the problem to the user, because if the user want the current location or
any user want the current location of the other the that user must login to the
application to track to the location.
There is other problem in the existing the system is the application is not sending
the user current location in timely.
Other issues is if the mobile user lost the mobile phone then finding the mobile is
much more complex task since because of required the login to the system.
Since the user is changing the current location regularly the change location data
is not update properly.

Why the particular topic is chosen:-
The main purpose of the project is to track the exact current location of the mobile
The reason to choose the particular topic is, because of the GPS technique is track
the exact location of the mobile phone. So that the user can find the current
location of the other users.
Another reason for this project is it can be use when the user lost the mobile phone.
Since this application is not using the login and registration process this application
can directly tack the mobile location.

Important of Purpose Investigation:-
Following are the important of purpose investigation,
The purpose is not using the user login/registration process.
The purpose continuously sends the user current location to the
The purpose used the GPS so it tracks the location of the mobile
The purpose system can be used to find the lost mobile phone.

Objective of the system:-
Finding the exact location of the current user.
Continuously sending the current location to the web server.
Not required to login to the application.

Review of the system:-
In this section we are going to discuss the various pros and cons of the above
mentioned software already present in the market and put forth our idea for
development of another more developed application.

Add extra to security to your phone if it is lost or stolen. Track its location and take
pictures on the internet through the Anti Droid Theft.
Anti Droid Theft is one of the oldest and most popular anti theft apps used to
secure your phone by using GPS tracking and other security features. It was

1.View position of phone using GPS
2.Track changes to SIM card / phone numbers
1. Needs password protect to uninstall app or make app hidden.
2. Time duration between GPS updates is very long.

Founded in early 2007, Mobile Defense has quickly become leaders in both
personal and enterprise mobile security. Mobile Defense was founded by Stuart
Saunders and Ken Adair. Between the two of them they have over three decades of
combined software development experience and have led large mobile initiatives
in banking, security, and device management. Mobile Defense was inspired by
their experience securing mobile devices for F500 executives and institutional
traders. Mobile Defense was the first security solution for Google Android devices,
originally developed as a contender in the first Google Android Developer
Challenge. Over the years our products have grown and evolved to keep pace with
rapidly changing mobile technology.
1. Find your phone if lost or stolen from Mobile Defenses website.
2. Send alerts to your phone with alarm sound and security pin.
3. Once successfully installed, the app is not detected on the phone.

1.No remote wipe.
2.Presently working only in U.S.Work is in progress to get it in other countries.
3.When you sign up for an account theres a waitlist before the user can register
4.This is a Beta version and it is expected that the service will have premium
charges at some future date.


Most android based free phone trackers available on the internet are not very
reliable as they dont offer an accurate reading of the coordinates. The aim of this
project is to design an application for phone tracking that uses the established
principles for calculating accurate gps readings and other features that are not
usually available on other applications.
Challenges in Determining User Location
Obtaining user location from a mobile device can be complicated. There are
several reasons why a location reading (regardless of the source) can contain errors
and be inaccurate. Some sources of error in the user location include:
Multitude of location sources
GPS, Cell-ID, and Wi-Fi can each provide a clue to users location.
Determining which to use and trust is a matter of trade-offs in accuracy,
speed, and battery-efficiency.
User movement
Because the user location changes, you must account for movement by re-
estimating user location every so often.
Varying accuracy
Location estimates coming from each location source are not consistent in
their accuracy. A location obtained 10 seconds ago from one source might
be more accurate than the newest location from another or same source.

Deciding when to start listening for updates
You might want to start listening for location updates as soon as your application
starts, or only after users activate a certain feature. Be aware that long windows of
listening for location fixes can consume a lot of battery power, but short periods
might not allow for sufficient accuracy.

Maintaining a current best estimate
You might expect that the most recent location fix is the most accurate. However,
because the accuracy of a location fix varies, the most recent fix is not always the
best. You should include logic for choosing location fixes based on several criteria.
The criteria also varies depending on the use-cases of the application and field
Here are a few steps you can take to validate the accuracy of a location fix:
Check if the location retrieved is significantly newer than the previous
Check if the accuracy claimed by the location is better or worse than the
previous estimate.
Check which provider the new location is from and determine if you trust it

Reduce the size of the window
A smaller window in which you listen for location updates means less interaction
with GPS and network location services, thus, preserving battery life. But it also
allows for fewer locations from which to choose a best estimate.
Set the location providers to return updates less frequently
Reducing the rate at which new updates appear during the window can also
improve battery efficiency, but at the cost of accuracy.

Restrict a set of providers
Depending on the environment where your application is used or the desired level
of accuracy, you might choose to use only the Network Location Provider or only
GPS, instead of both. Interacting with only one of the services reduces battery
usage at a potential cost of accuracy.

Existing System
Today mobile phone comes with the location tracking application which tracks the
mobile phone location. This application uses the GPS (Global Position System)
which is used for the location tracking.
The application uses the satellite system for the location tracking. This location
coordinate must send the server where the location point saves. But the sending
process is too late so the server is not update timely. This is big disadvantage of the
current system. Since because the user can change the location as needed. So the
server is not getting the accurate location of the mobile phone.
Although some application overcome this problem but such application is needed
to register the client to use the application. This creates the problem for the user
who is not login. So the server is not able to track the current location of the
mobile phone.
Drawback of the Existing System
Update location data is not in timely.
Some system use login/register process.
Difficult to identify the location of the mobile phone since the user change
the location frequently.

Propose System
To overcome the problem of the update location data, required to login in the
application to track the location we implement the new concept which is,
location data and send to the server with less time limit. This application is not
required the user to register and login process. Just both the user must the android
based application on their mobile phone system.
The propose system send the location point using the web service technique and
not using the sms based.
Application Working
The working of the application is as follows,
Every user installs the android based application on their mobile phone.
When the two users communicated with each other their current mobile
location is send to the web server.
When the any user wants the exact location of the other user the using the
android based application is it send the request to the web server and in
return the server send the response.

What Contributions is made this project?

Hardware and software requirements


256 MB RAM.
80 GB HDD.
Intel 1.66 GHz Processor Pentium 4
GPRS enabled Mobile Phone with Android.

Visual Studio 2008
MS SQL Server 2005
SDK for Android

Testing Technology

System testing is a critical phase implementation. Testing of the system involves
hardware devise and debugging of the computer programs and testing information
processing procedures. Testing can be done with text data, which attempts to
stimulate all possible conditions that may arise during processing. If structured
programming Methodologies have been adopted during coding the testing proceeds
from higher level to lower level of program module until the entire program is
tested as unit. The testing methods adopted during the testing of the system were
unit testing and integrated testing.


Unit testing focuses first on the modules, independently of one another, to locate
errors. This enables the tester to detect errors in coding and logical errors that is
contained within that module alone. Those resulting from the interaction between
modules are initially avoided.


Integration testing is a systematic technique for constructing the program structure
while at the same time to uncover the errors associated with interfacing. The
objective is to take unit-tested module and build a program structure that has been
detected by designing. It also tests to find the discrepancies between the system
and its original objectives. Subordinate stubs are replaced one at time actual
module. Tests were conducted at each module was integrated. On completion of
each set another stub was replaced with the real module.
Functional testing is a technique in which all the functionalities of the program are
tested to check whether all the functions that where proposed during the planning
phase are full filled.
This is also to check that if all the functions proposed are working properly.
This is further done in two phases:
- One before the integration to see if all the unit components work properly
- Second to see if they still work properly after they have been integrated
to check if some functional compatibility issues arise.


Expected Result

The client should be able to connect to the server properly without any
The connection establishment between the mobile device and the
server should take minimal time.
The mobile device should be able receive data from the server
Information provided by the application should be correct and as per
the users need.


Connection can be established easily provided that the server is on.
The connection with the server takes time as it uses Internet
Receiving data from the server takes time.
Information coming from the database is correct.


Expected Result

Response time should be unaffected irrespective of the no of users.
The introduction of the newer clients should not make the server to
work hap hazardously.
Continuous use of the server by different clients should not result into
the server getting slowed down.
Response time should not be degraded if there is congestion in


The speed of transmission was fine even when the newer clients
were getting added. The response of the server was satisfying even
with the introduction of newer client.
Theoretical analysis of the topic

Android for Mobile Application

Android is an operating system for mobile devices such as smart phones and tablet
computers. It is developed by the Open Handset Alliance led by Google..

released most of the Android code under the Apache License, a free software
license. The Android Open Source Project (AOSP) is tasked with the maintenance
and further development of Android.

Android consists of a kernel based on
the Linux kernel, with middleware, libraries and APIs written
in C and application software running on an application framework which includes
Java-compatible libraries based on Apache Harmony. Android uses the Dalvik
virtual machine with just-in-time compilation to run compiled Java code.

has a large community of developers writing applications ("apps") that extend the
functionality of the devices. Developers write primarily in a customized version of
Java. Apps can be downloaded from third-party sites or through online stores such
as Android Market, the app store run by Google.
ASP.NET is more than the next version of Active Server Pages (ASP); it is a
unified Web development platform that provides the services necessary for
developers to build enterprise-class Web applications. While ASP.NET is largely
syntax-compatible with ASP, it also provides a new programming model and
infrastructure that enables a powerful new class of applications. You can migrate
your existing ASP applications by incrementally adding ASP.NET functionality to
ASP.NET is a compiled .NET Framework -based environment. You can author
applications in any .NET Framework compatible language, including Visual Basic
and Visual C#. Additionally, the entire .NET Framework platform is available to
any ASP.NET application. Developers can easily access the benefits of the .NET
Framework, which include a fully managed, protected, and feature-rich application
execution environment, simplified development and deployment, and seamless
integration with a wide variety of languages.


The very first phase in any system developing life cycle is preliminary
investigation. The feasibility study is a major part of this phase. A measure of how
beneficial or practical the development of any information system would be to the
organization is the feasibility study.
The feasibility of the development software can be studied in terms of the
following aspects:
1.Operational Feasibility.
2.Technical Feasibility.
3.Economical feasibility.
4.Motivational Feasibility.
5.Legal Feasibility


The site will reduce the time consumed to maintain manual records and is not
tiresome and cumbersome to maintain the records. Hence operational feasibility is


At least 166 MHz Pentium Processor or Intel compatible processor.
At least 16 MB RAM.
14.4 kbps or higher modem.
A video graphics card.
A mouse or other pointing device.
At least 3 MB free hard disk space.
Microsoft Internet Explorer 4.0 or higher.


Once the hardware and software requirements get fulfilled, there is no need for
the user of our system to spend for any additional overhead.
For the user, the web site will be economically feasible in the following aspects:
The web site will reduce a lot of paper work. Hence the cost will be
Our web site will reduce the time that is wasted in manual processes.
The storage and handling problems of the registers will be solved.


The licensed copy of the required software is quite cheap and easy to get. So
from legal point of view the proposed system is legally feasible.

Steps Towards Implementation

System Development Life Cycle:

The System Development Life Cycle is the process of developing
information systems through investigation, analysis, design, implementation, and
maintenance. The System Development Life Cycle (SDLC) is also known as
Information Systems Development or Application Development.

Steps involved in the System Development Life Cycle :
Below are the steps involved in the System Development Life Cycle. Each phase
within the overall cycle may be made up of several steps.

Step 1: Software Concept
The first step is to identify a need for the new system. This will include
determining whether a business problem or opportunity exists, conducting a
feasibility study to determine if the proposed solution is cost effective, and
developing a project plan.
This process may involve end users who come up with an idea for improving
their work. Ideally, the process occurs in tandem with a review of the
organization's strategic plan to ensure that IT is being used to help the organization
achieve its strategic objectives. Management may need to approve concept ideas
before any money is budgeted for its development.

Step 2: Requirements Analysis
Requirements analysis is the process of analyzing the information needs of
the end users, the organizational environment, and any system presently being
used, developing the functional requirements of a system that can meet the needs
of the users. Also, the requirements should be recorded in a document, email, user
interface storyboard, executable prototype, or some other form. The requirements
documentation should be referred to throughout the rest of the system development
process to ensure the developing project aligns with user needs and requirements.
Professionals must involve end users in this process to ensure that the new
system will function adequately and meets their needs and expectations.

Step 3: Architectural Design
After the requirements have been determined, the necessary specifications for the
hardware, software, people, and data resources, and the information products that
will satisfy the functional requirements of the proposed system
can be determined. The design will serve as a blueprint for the system and helps
detect problems before these errors or problems are built into the final system.
Professionals create the system design, but must review their work with the users
to ensure the design meets users' needs.
Step 4: Coding and Debugging
Coding and debugging is the act of creating the final system. This step is
done by software developer.
Step 5: System Testing The
system must be tested to evaluate its actual functionality in relation to expected or
intended functionality. Some other issues to consider during this stage would be
converting old data into the new system and training employees to use the new
system. End users will be key in determining whether the developed system meets
the intended requirements, and the extent to which the system is actually used.
Step 6: Maintenance
Inevitably the system will need maintenance. Software will definitely undergo
change once it is delivered to the customer. There are many reasons for the change.
Change could happen because of some unexpected input values into the system. In
addition, the changes in the system could directly affect the software operations.
The software should be developed to accommodate changes that could happen
during the post implementation period.
There are various software process models like:-
Prototyping Model
RAD Model
The Spiral Model
The Waterfall Model
The Iterative Model
Of all these process models weve used the Iterative model(The Linear Sequential
Model) for the development of our project.
The Iterative model
The waterfall model derives its name due to the cascading effect from one
phase to the other as is illustrated in Figure1.1. In this model each phase well
defined starting and ending point, with identifiable deliveries to the next phase.
This model is sometimes referred to as the linear sequential model or the
software life cycle.

The model consists of six distinct stages, namely:
1. In the requirements analysis phase
(a) The problem is specified along with the desired service objectives
(b) The constraints are identified
2. In the specification phase the system specification is produced from the
detailed definitions of (a) and (b) above. This document should clearly define
the product function.
3. In the system and software design phase, the system specifications are
translated into a software representation. The software engineer at this stage
is concerned with:
Data structure
Software architecture
Algorithmic detail
Interface representations
The hardware requirements are also determined at this stage along with a
picture of the overall system architecture. By the end of this stage should the
software engineer should be able to identify the relationship between the
hardware, software and the associated interfaces. Any faults in the
specification should ideally not be passed down stream.
4. In the implementation and testing phase stage the designs are translated
into the software domain
Detailed documentation from the design phase can significantly
reduce the coding effort.
Testing at this stage focuses on making sure that any errors are
identified and that the software meets its required specification.
5. In the integration and system testing phase all the program units are
integrated and tested to ensure that the complete system meets the software
requirements. After this stage the software is delivered to the customer
[Deliverable The software product is delivered to the client for
acceptance testing.]
6. The maintenance phase the usually the longest stage of the software. In
this phase the software is updated to:
Meet the changing customer needs
Adapted to accommodate changes in the external environment
Correct errors and oversights previously undetected in the testing
Enhancing the efficiency of the software
Observe that feed back loops allow for corrections to be incorporated into
the model. For example a problem/update in the design phase requires a revisit to
the specifications phase. When changes are made at any phase, the relevant
documentation should be updated to reflect that change.

Advantages of the Iterative Model:-
Testing is inherent to every phase of the Iterative model
It is an enforced disciplined approach
It is documentation driven, that is, documentation is produced at every

Disadvantages of the Iterative Model:-
The waterfall model is the oldest and the most widely used paradigm.
However, many projects rarely follow its sequential flow. This is due to the
inherent problems associated with its rigid format. Namely:
It only incorporates iteration indirectly, thus changes may cause
considerable confusion as the project progresses.
As The client usually only has a vague idea of exactly what is
required from the software product, this IM has difficulty
accommodating the natural uncertainty that exists at the beginning of the
The customer only sees a working version of the product after it has
been coded. This may result in disaster any undetected problems are
precipitated to this stage.

User Manual
About softwares:
Development of Android Application mainly consist of following
An activity represents the visual representation of an Android
application. activities use views, i.e. user interface widgets as for example
buttons and fragments to create the user interface and to interact with the user.
An Android application can have several activities.
2.Fragments :
Fragments are components which run in the context of an activity.
3.Views and layout manager:
Views are user interface widgets, e.g. buttons or text fields.
4.Device configuration specific layouts :
The user interface for Activities is typcally defined via XML files (layout files).
5.Content providers :
A content provider provides a structured interface to application data.
Via content provider your application can share data with other applications.
Android contains an SQLite database which is frequently used in conjunction with
a content provider. The SQLite database would store the data, which would be
accessed via the content provider.

Services perform tasks without providing a user interface. They can
communicate with other Android components and notify the user via the
notification framework in Android.
Intents are asynchronous messages which allow the application to request
functionality from other Android components, e.g. from services or activities.
An application can call a component directly (explicit Intent) or ask the Android
system to evaluate registered components based on the intent data (implicit
intents). For example the application could implement sharing of data via
an intent and all components which allow sharing of data would be available for
the user to select. Applications register themselves to an intent via an intent
Intents allow an Android application to start and to interact with components
from other Android applications.

2. Android Development Kit (SDK) :
The Android Software Development Kit (SDK) contains the necessary tools to
create, compile and package Android application. Most of these tools are
command line based.
The Android SDK also provides an Android device emulator, so that Android
applications can be tested without a real Android phone. You can create Android
virtual devices (AVD) via the Android SDK, which run in this emulator.
The Android SDK contains the Android debug bridge (adb) tool which allows to
connect to an virtual or real Android device.
3. Android Development Tools :
Google provides the Android Development Tools (ADT) to develop Android
applications with Eclipse. ADT is a set of components (plug-ins) which extend
the Eclipse IDE with Android development capabilities.
ADT contains all required functionalities to create, compile, debug and deploy
Android applications from the Eclipse IDE. ADT also allows to create and start
The Android Development Tools (ADT) provides specialized editors for
resources files, e.g. layout files. These editors allow to switch between the XML
representation of the file and a richer user interface via tabs on the bottom of the

VB.Net for Administrator server

Visual Basic is a programming language that is designed especially for windows
programming. It will explain most of the tools available for implementing GUI
based programs. After introducing the basic facilities and tools provided by Visual
Basic, we apply our knowledge to implementing a small VB program. Our
program will implement a visual interface for a commonly know stack abstract
data type.
VB.NET is still the only language in VS.NET that includes background
compilation, which means that it can flag errors immediately, while you type.
VB.NET is the only .NET language that supports late binding. In the VS.NET IDE,
VB.NET provides a dropdown list at the top of the code window with all the
objects and events; the IDE does not provide this functionality for any other
language. VB.NET is also unique for providing default values for optional
parameters, and for having a collection of the controls available to the developer.

Advantages of VB.NET :

Build Robust Windows-based Applications :

With new Windows Forms, developers using Visual Basic.Net can build
Windows-based applications that leverage the rich user interface features available
in the Windows operating system. All the rapid application development (RAD)
tools that developers have come to expect from Microsoft are found in Visual
Basic .NET, including drag-and-drop design and code behind forms. In addition,
new features such as automatic control resizing eliminate the need for complex
resize code.
Resolve Deployment and Versioning Issues Seamlessly:-
Visual Basic .NET delivers the answer to all of your application setup and
maintenance problems. With Visual Basic .NET, issues with Component Object
Model (COM) registration and DLL overwrites are relics of the past. Side-by-side
versioning prevents the overwriting and corruption of existing components
and applications.

Microsoft SQL Server 2005
Business today demands a different kind of data management
solution. Performance scalability, and reliability are essential, but businesses now
expect more from their key IT investment.
SQL Server 2005 exceeds dependability requirements and provides
innovative capabilities that increase employee effectiveness, integrate
heterogeneous IT ecosystems,and maximize capital and operating budgets. SQL
Server 2005 provides the enterprise data management platform your organization
needs to adapt quickly in a fast changing environment.
Benchmarked for scalability, speed, and performance, SQL Server 2005 is a
fully enterprise-class database product, providing core support for Extensible
Markup Language (XML) and Internet queries.
Easy-to-use Business Intelligence(BI) Tools
Through rich data analysis and data mining capabilities that integrate with
familiar applications such as Microsoft Office, SQL Server 2005 enables you to
provide all of your employees with critical, timely business information
tailored to their specific information needs. Every copy of SQL Server 2005
ships with a suite of BI services.
Self-Tuning and Management Capabilities
Revolutionary self-tuning and dynamic self-configuring features optimize
database performance, while management tools automate standard activities.
Graphical tools and performance, wizards simplify setup, database design, and
performance monitoring, allowing database administrators to focus on meeting
strategic business needs.
Data Management Application and Services
Unlike its competitors, SQL Server 2005 provides a powerful and
comprehensive data management platform. Every software license includes
extensive management and development tools, a powerful extraction,
transformation, and loading (ETL) tool, business intelligence and analysis services
such as Notification Service. The result is the best overall business value available.
Enterprise Edition includes the complete set of SQL Server data
management and analysis features are and is uniquely characterized by several
features that makes it the most scalable and available edition of SQL Server 2005
.It scales to the performance levels required to support the largest Web sites,
Enterprise Online Transaction Processing (OLTP) system and Data Warehousing
systems. Its support for failover clustering also makes it ideal for any mission
critical line-of-business application.