SlideShare a Scribd company logo
1 of 5
Download to read offline
TELKOMNIKA, Vol.16, No.2, April 2018, pp. 771~775
ISSN: 1693-6930, accredited A by DIKTI, Decree No: 58/DIKTI/Kep/2013
DOI: 10.12928/TELKOMNIKA.v16i2.7625  771
Received October 5, 2017; Revised January 28, 2018; Accepted February 12, 2018
Personal Security Tracking based on Android and Web
Application
Angry Ronald*
1
, Violitta Yesmaya
2
, Muhammad Danaparamita
3
Computer Science Department, School of Computer Science,
Bina Nusantara University, Jakarta, Indonesia 11480
*Corresponding author, e-mail: aadam@binus.edu
1
, vyesmaya@binus.edu
2
, mdanaparamita@binus.edu
3
Abstract
Nowadays, the frequency of abduction is increasing significantly. Information technology provide
many social media which is causing the leaked of personal information where abductor can find out the
information. Using social media, people can share location, life event, and anything related about their life
event, these become the useful information for the abductor. To anticipate this, a lot of personal tracking
device is developed, but the response is too late. Because, the family or relative of the victims will notice
that abduction had happen after the victim is lost. According to the problem, this research will focus on
develop the personal tracking device which trigger by the victims who own the phone based on android
and web application. Whenever the abduction happens, the victim just need to click the button and the
system will send a message to the relatives and family in their contact also trigger the notification to the
local security. Software development life cycle that will be used is scrum which is divided into several
processes like backlog, sprints, scrum meetings, and demos. The result of this research is android
application for user and web application for managing application.
Keywords: decision support system; tracking application; android application; web application
Copyright © 2018 Universitas Ahmad Dahlan. All rights reserved.
1. Introduction
Information technology provides many simplicities in human life. Social media is one of
the most popular simplicity to share life event in public. Instead of many benefits comes from it,
there are also become the way to collect information about the victim’s life event. Abduction is
one of the crimes which is increase significantly. There are a lot of tools and applications
developed to prevent this crime. But, most of them are trigger the victim’s family or relative. At
that time, the abduction process is already in progress. So, the number of abduction victims is
still high.
Children’s safety is one of the issues that need attention. This is because the lack of
supervision of parents against their children, especially when parents are working/traveling, not
be able to supervise their children throughout the day. Mobile tracking application supposed to
have several features such as tracking location, trigger, and notification alert [1].
Mobile tracker is focusing on tracking device which can locate the device, collect the
SIM Card information, collect contact information, and call log information. These features are
developing under the concept to track down lost phone [2]. Both research before are able to
collect the location of the user in the realtime whether using Global Positioning System or
Location Based System. These systems suggested on previous research are lack of several
feature such as do not store the history location, not be able to take different kinds of evidence
(such as photo and sound), and trigger by related of victims.
In this research, a new product is developed. The user which is in victim position is
having control of this application. This application will record location of the user in specific time
range which defined by the user, collect sound record in secret, and taking photo from every
camera of the user’s phone in secret. Whenever the user click the panic button, the application
will send the notification to their relatives and family member which is already registered in that
application by the user. Also, this will trigger a notification to the local security and send the
evidences to the server. The evidences are location, sound, and photo recorded secretly on the
user’s phone and will be taking repeatedly in specific time range. The application also stores the
location of the user’s phone since the application is activated. So, the local security could be
 ISSN: 1693-6930
TELKOMNIKA Vol. 16, No. 2, April 2018 : 771 – 775
772
able to respond quickly and accurately according to the data given. There are several
applications which are available in google play store such as GPS Tracker, Track Any Phone,
and Friend Locator: Phone Tracker. The comparison as shown in Table 1:
Table 1. Comparison Table of Family Locator, iLocateMobile, and Friend Locator.
Features
Family Locator-
GPS Tracker
Track Any Phone
(iLocateMobile)
Friend Locator:
Phone Tracker
Route assistance Yes No No
Tracking location Yes Yes Yes
Emergency alert Yes No Yes
Manage emergency contact Yes Yes Yes
Messaging Yes No Yes
History location No Yes No
Sound recording No No No
Photo taking No No No
Manage crime status No No No
Dual interface (for user and admin) No No No
2. Research Method
2.1. Location Based Services
Location Based Services (LBS) is a service provider that provides location information.
LBS is a value-added service from cellular services provider to collect location information of the
user. To collect the location, this service will collect information from the device of the user that
send back the signal from the tower and mapping it into the map to get the location. Even
though this service is provided by the cellular services provider, but the accuracy is quite lower
than GPS (Global Positioning System) which is depending on satellite to get the location [3].
2.2. Global Positioning System
Global Positioning System (GPS) is a feature that embedded to a tool that can send
and receive the signal from the satellite to collect the exact location of the user. Nowadays, GPS
is already attached to all smartphones that makes smartphone able to locate its own location.
Because of this feature send signals from the device to the satellite then the location is more
accurate rather than LBS [4].
Using GPS, position of user will be able to be tracked by the longitude and latitude of
the user. Different transmitter having different accuracy. GPS on mobile device are having
several kinds of GPS transmitter which affecting the accuracy of the user position. The
transmitter been used on this research is A-GPS using Samsung Galaxy Tab 4. User’s device
has a configuration to upload user location for every specific interval time which is configure by
user. But, when incident is already triggered the device will change the status and send the
location with photo of front and back camera together with sound recording on phone.
In mobile phone, GPS works by transmit the signal to the satellites. The satellites
receive the signal and monitor the position by control station which are sent back the signals
through the satellites using ground antenna. The radio signals from satellites are pick up by
GPS receiver on mobile phone [7]. In order to used google maps API, GSM is needed. GPS will
focusing on collecting location while GSM will send the location which are longitude and latitude
to Google Maps API to display the maps [8].
2.3. Questionnaire
Questionnaire is one of the tool to acquire information by giving the constraint and
problem of the research on questions and collecting the feedback from the respondents as the
answer of that problem given [6]. To be able to collect the right information, the questionnaire
must be having principal requirement which are sequenced in a logical order, allowing a smoth
transition from on topic to the next. By applying these principal methods, participant should be
able to understand the purpose of research and able to give useful information [6].
TELKOMNIKA ISSN: 1693-6930 
Personal Security Tracking based on Android and Web Application (Angry Ronald)
773
3. Results and Analysis
In this section, the picture of the web application is shows. The result of this research is
android application and web application which are consists of many pages including main page
in android where user can access the panic button and trigger to the incident page on admin in
web application. On web application, admin can also track down the location which shown in
maps with the time range also can collect any other evidence in the real time. User can set the
configuration of range time to upload location in normally, but when incident happen the system
will collect the location per minute. Figure 1 shows Incident List’s Page on web application
where admin can see all the incidents happen. Figure 2 shows android main page where user
can easily press the panic button which change the status on the server and collecting the
evidence such as location periodically. Figure 3 shows the detail victims movement location in
maps since that day. Figure 4 shows the evidence page which already collected also on this
page admin can collect evidence such as photo from back and front camera and sound
evidence.
From 30 Respondents, below are the description of the feedback.
1. How fast you understand and remember how to use this application?
a. 20 Respondents response “Very Fast”.
b. 9 Respondents response “Fast”.
c. 1 Respondents response “Slow”.
2. How good are you using this application?
a. 20 Respondents response “Very Good”.
b. 10 Respondents response “Good”.
3. Is this application can fulfil your expectation about the problem?
a. 5 Respondents Strongly Agree.
b. 16 Respondents Agree.
c. 9 Respondents Neutral.
On the appendix, diagram of the process when the incident happen and collecting evidence will
be shown.
Figure 1. “List of incidents” page in web application Figure 2. Homescreen on
android application
 ISSN: 1693-6930
TELKOMNIKA Vol. 16, No. 2, April 2018 : 771 – 775
774
Figure 3. Incident’s page on web application
Figure 4. Evidence’s page on web application
4. Conclusion
According to the result application and questionnaire given, this product has an easy
and simple user interface. Also, this product can fulfill and solved the problem where the trigger
control is also located not only on admin control but also in user. This application can collect
different kinds of evidences such as photo, sound, and location which is not provide by other
applications.
References
[1] Kinage R, Kumari J, Zalke P, Kulkarni M. Mobile Tracking Application. International Journal of
Innovative Research in Science, Engineering and Technology. 2013; 2(3): 617-623.
[2] Shirin S, Dipina DB, Surekha MV. Mobile Tracker. International Journal on Cybernetics and
Informatics. 2016; 5(2): 213–219.
[3] Abhijeet T, Ahemad T, Ravindra S, Pranay D, Sumit H. Mobile Tracking Application for Locating
Friends using LBS. International Journal of Innovative Research in Computer and Communication
Engineering. 2013; 1(2): 303–308.
[4] Abha D, Hardik S, Krishna S. Global Positioning System for Object Tracking. International of
Computer Application. 2015; 109(8): 40-45
[5] Pressman RS, Maxim BR. Software Engineering: A Practitioner's Approach, Eighth Edition. Jakarta.
McGraw-Hill Education. 2010.
[6] Bird DK. The use of questionnaires for acquiring information on public perception of natural hazards
and risk mitigation–a review of current knowledge and practice. Natural Hazards and Earth System
Sciences. 2009; 9:1307-1325.
TELKOMNIKA ISSN: 1693-6930 
Personal Security Tracking based on Android and Web Application (Angry Ronald)
775
[7] Singal P, Chhillar RS. A Review on GPS and its Applications in Computer Science. International
Journal of Computer Science and Mobile Computing. 2014; 3(5):1295-1302.
[8] Verma P, Bhatia JS. Design and development of GPS-GSM based tracking system with Google Map
based monitoring. International Journal of Computer Science, Engineering and Application. 2013;
3(3):33-40
Appendix
Diagram 1. Process of when incident happen
Diagram 2. Process of collecting evidence
User Mobile Apps Web Apps
Start
Click “PANIC”
Button
Change status, trigger to send
alert to related registered
partner, and collecting
location per minute Change status, send alert to
related registered partner, and
collecting location per minute
End
Admin
Start
Click “Collect
Evidence”
Button
(Photo | Sound)
Collecting Evidence
(Photo | Sound)
Trigger Mobile Device to
Collect Evidence
(Photo | Sound) Silently
End
Mobile Apps Web Apps
Upload Evidence
(Photo | Sound)
Show Evidence list

More Related Content

What's hot

IRJET - Women’s Safety using IoT
IRJET - Women’s Safety using IoTIRJET - Women’s Safety using IoT
IRJET - Women’s Safety using IoTIRJET Journal
 
IRJET- A Survey on Child Safety & Tracking Management System
IRJET- A Survey on Child Safety & Tracking Management SystemIRJET- A Survey on Child Safety & Tracking Management System
IRJET- A Survey on Child Safety & Tracking Management SystemIRJET Journal
 
Sherlock: Monitoring sensor broadcasted data to optimize mobile environment
Sherlock: Monitoring sensor broadcasted data to optimize mobile environmentSherlock: Monitoring sensor broadcasted data to optimize mobile environment
Sherlock: Monitoring sensor broadcasted data to optimize mobile environmentijsrd.com
 
Child tracking system
Child tracking systemChild tracking system
Child tracking systembalaji1986
 
Paper id 71201905
Paper id 71201905Paper id 71201905
Paper id 71201905IJRAT
 
Sniffer Technology Complete Report
Sniffer Technology Complete ReportSniffer Technology Complete Report
Sniffer Technology Complete ReportChethanHR10
 
IRJET - Women Safety Device with GPS Tracking and Alerts
IRJET -  	  Women Safety Device with GPS Tracking and AlertsIRJET -  	  Women Safety Device with GPS Tracking and Alerts
IRJET - Women Safety Device with GPS Tracking and AlertsIRJET Journal
 
Cloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewCloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewIJSRD
 
IRJET- Enactment of Smart Child Monitoring System
IRJET- Enactment of Smart Child Monitoring SystemIRJET- Enactment of Smart Child Monitoring System
IRJET- Enactment of Smart Child Monitoring SystemIRJET Journal
 
A survey on hiding user privacy in location based services through clustering
A survey on hiding user privacy in location based services through clusteringA survey on hiding user privacy in location based services through clustering
A survey on hiding user privacy in location based services through clusteringeSAT Journals
 
IRJET- IoT based Smart Foot Device for Women Safety
IRJET- IoT based Smart Foot Device for Women SafetyIRJET- IoT based Smart Foot Device for Women Safety
IRJET- IoT based Smart Foot Device for Women SafetyIRJET Journal
 
Use biometrics for identity management of cloud users to enhanced the securit...
Use biometrics for identity management of cloud users to enhanced the securit...Use biometrics for identity management of cloud users to enhanced the securit...
Use biometrics for identity management of cloud users to enhanced the securit...Vineet Garg
 
76201975
7620197576201975
76201975IJRAT
 
Securing Mobile Cloud Using Fingerprint Authentication
Securing Mobile Cloud Using Fingerprint AuthenticationSecuring Mobile Cloud Using Fingerprint Authentication
Securing Mobile Cloud Using Fingerprint AuthenticationApurva Kini
 
Iaetsd location-based services using autonomous gps
Iaetsd location-based services using autonomous gpsIaetsd location-based services using autonomous gps
Iaetsd location-based services using autonomous gpsIaetsd Iaetsd
 
Location Sharing System Using GPS Technology for Minimizing SMS Delivery
Location Sharing System Using GPS Technology for Minimizing SMS DeliveryLocation Sharing System Using GPS Technology for Minimizing SMS Delivery
Location Sharing System Using GPS Technology for Minimizing SMS DeliveryIJERA Editor
 
AN IOT-BASED CROWD SOURCING SYSTEM FOR OBJECT TRACKING AND INFORMATION SHARING
AN IOT-BASED CROWD SOURCING SYSTEM FOR OBJECT TRACKING AND INFORMATION SHARINGAN IOT-BASED CROWD SOURCING SYSTEM FOR OBJECT TRACKING AND INFORMATION SHARING
AN IOT-BASED CROWD SOURCING SYSTEM FOR OBJECT TRACKING AND INFORMATION SHARINGijaia
 
Traffic detection system using android
Traffic detection system using androidTraffic detection system using android
Traffic detection system using androidEditor Jacotech
 

What's hot (20)

IRJET - Women’s Safety using IoT
IRJET - Women’s Safety using IoTIRJET - Women’s Safety using IoT
IRJET - Women’s Safety using IoT
 
IRJET- A Survey on Child Safety & Tracking Management System
IRJET- A Survey on Child Safety & Tracking Management SystemIRJET- A Survey on Child Safety & Tracking Management System
IRJET- A Survey on Child Safety & Tracking Management System
 
Sherlock: Monitoring sensor broadcasted data to optimize mobile environment
Sherlock: Monitoring sensor broadcasted data to optimize mobile environmentSherlock: Monitoring sensor broadcasted data to optimize mobile environment
Sherlock: Monitoring sensor broadcasted data to optimize mobile environment
 
Child tracking system
Child tracking systemChild tracking system
Child tracking system
 
Paper id 71201905
Paper id 71201905Paper id 71201905
Paper id 71201905
 
Sniffer Technology Complete Report
Sniffer Technology Complete ReportSniffer Technology Complete Report
Sniffer Technology Complete Report
 
IRJET - Women Safety Device with GPS Tracking and Alerts
IRJET -  	  Women Safety Device with GPS Tracking and AlertsIRJET -  	  Women Safety Device with GPS Tracking and Alerts
IRJET - Women Safety Device with GPS Tracking and Alerts
 
Cloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewCloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature Review
 
IRJET- Enactment of Smart Child Monitoring System
IRJET- Enactment of Smart Child Monitoring SystemIRJET- Enactment of Smart Child Monitoring System
IRJET- Enactment of Smart Child Monitoring System
 
A survey on hiding user privacy in location based services through clustering
A survey on hiding user privacy in location based services through clusteringA survey on hiding user privacy in location based services through clustering
A survey on hiding user privacy in location based services through clustering
 
Ej4301823826
Ej4301823826Ej4301823826
Ej4301823826
 
IRJET- IoT based Smart Foot Device for Women Safety
IRJET- IoT based Smart Foot Device for Women SafetyIRJET- IoT based Smart Foot Device for Women Safety
IRJET- IoT based Smart Foot Device for Women Safety
 
Use biometrics for identity management of cloud users to enhanced the securit...
Use biometrics for identity management of cloud users to enhanced the securit...Use biometrics for identity management of cloud users to enhanced the securit...
Use biometrics for identity management of cloud users to enhanced the securit...
 
Pros and cons of today
Pros and cons of todayPros and cons of today
Pros and cons of today
 
76201975
7620197576201975
76201975
 
Securing Mobile Cloud Using Fingerprint Authentication
Securing Mobile Cloud Using Fingerprint AuthenticationSecuring Mobile Cloud Using Fingerprint Authentication
Securing Mobile Cloud Using Fingerprint Authentication
 
Iaetsd location-based services using autonomous gps
Iaetsd location-based services using autonomous gpsIaetsd location-based services using autonomous gps
Iaetsd location-based services using autonomous gps
 
Location Sharing System Using GPS Technology for Minimizing SMS Delivery
Location Sharing System Using GPS Technology for Minimizing SMS DeliveryLocation Sharing System Using GPS Technology for Minimizing SMS Delivery
Location Sharing System Using GPS Technology for Minimizing SMS Delivery
 
AN IOT-BASED CROWD SOURCING SYSTEM FOR OBJECT TRACKING AND INFORMATION SHARING
AN IOT-BASED CROWD SOURCING SYSTEM FOR OBJECT TRACKING AND INFORMATION SHARINGAN IOT-BASED CROWD SOURCING SYSTEM FOR OBJECT TRACKING AND INFORMATION SHARING
AN IOT-BASED CROWD SOURCING SYSTEM FOR OBJECT TRACKING AND INFORMATION SHARING
 
Traffic detection system using android
Traffic detection system using androidTraffic detection system using android
Traffic detection system using android
 

Similar to Personal Security Tracking based on Android and Web Application

Mobile Device Application to locate an Interest Point using Google Maps
Mobile Device Application to locate an Interest Point using Google MapsMobile Device Application to locate an Interest Point using Google Maps
Mobile Device Application to locate an Interest Point using Google MapsEditor IJCATR
 
A women secure mobile app for emergency usage (go safe app)
A women secure mobile app for emergency usage (go safe app)A women secure mobile app for emergency usage (go safe app)
A women secure mobile app for emergency usage (go safe app)eSAT Journals
 
IRJET- Women Safety Application using Firebase and Geocoder
IRJET-  	  Women Safety Application using Firebase and GeocoderIRJET-  	  Women Safety Application using Firebase and Geocoder
IRJET- Women Safety Application using Firebase and GeocoderIRJET Journal
 
Security Application for Smart Phones and other Mobile Devices
Security Application for Smart Phones and other Mobile DevicesSecurity Application for Smart Phones and other Mobile Devices
Security Application for Smart Phones and other Mobile DevicesŃirjhor Ánjum
 
IRJET- Online Event Location Tracking using GPS
IRJET-  	  Online Event Location Tracking using GPSIRJET-  	  Online Event Location Tracking using GPS
IRJET- Online Event Location Tracking using GPSIRJET Journal
 
Hazards Reporting Based On Real-Time Field Data Collection Using Personal Mob...
Hazards Reporting Based On Real-Time Field Data Collection Using Personal Mob...Hazards Reporting Based On Real-Time Field Data Collection Using Personal Mob...
Hazards Reporting Based On Real-Time Field Data Collection Using Personal Mob...IJARIIT
 
Ijiret siri-hp-a-remote-phone-access-for-smartphone-events
Ijiret siri-hp-a-remote-phone-access-for-smartphone-eventsIjiret siri-hp-a-remote-phone-access-for-smartphone-events
Ijiret siri-hp-a-remote-phone-access-for-smartphone-eventsIJIR JOURNALS IJIRUSA
 
A mobile monitoring and alert sms system with remote configuration – a case s...
A mobile monitoring and alert sms system with remote configuration – a case s...A mobile monitoring and alert sms system with remote configuration – a case s...
A mobile monitoring and alert sms system with remote configuration – a case s...Editor Jacotech
 
A mobile monitoring and alert sms system with remote configuration – a case s...
A mobile monitoring and alert sms system with remote configuration – a case s...A mobile monitoring and alert sms system with remote configuration – a case s...
A mobile monitoring and alert sms system with remote configuration – a case s...Editor Jacotech
 
Cloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewCloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewIJSRD
 
WOMEN’s SAFETY APP
WOMEN’s SAFETY APPWOMEN’s SAFETY APP
WOMEN’s SAFETY APPIRJET Journal
 
10 bm60083 location_based_badge_on_a_mobile_phone
10 bm60083 location_based_badge_on_a_mobile_phone10 bm60083 location_based_badge_on_a_mobile_phone
10 bm60083 location_based_badge_on_a_mobile_phoneShashidhar Shenoy
 
Iisrt zz srikiran rao
Iisrt zz srikiran raoIisrt zz srikiran rao
Iisrt zz srikiran raoIISRT
 
A Review On Pocket Ambulance : Emergency Service
A Review On Pocket Ambulance : Emergency ServiceA Review On Pocket Ambulance : Emergency Service
A Review On Pocket Ambulance : Emergency ServiceIRJET Journal
 
Application Of Android Enabled Mobile Device For Personal Information Systems
Application Of Android Enabled Mobile Device For Personal Information SystemsApplication Of Android Enabled Mobile Device For Personal Information Systems
Application Of Android Enabled Mobile Device For Personal Information Systemsijasa
 

Similar to Personal Security Tracking based on Android and Web Application (20)

Mobile Device Application to locate an Interest Point using Google Maps
Mobile Device Application to locate an Interest Point using Google MapsMobile Device Application to locate an Interest Point using Google Maps
Mobile Device Application to locate an Interest Point using Google Maps
 
A017340104
A017340104A017340104
A017340104
 
A women secure mobile app for emergency usage (go safe app)
A women secure mobile app for emergency usage (go safe app)A women secure mobile app for emergency usage (go safe app)
A women secure mobile app for emergency usage (go safe app)
 
IRJET- Women Safety Application using Firebase and Geocoder
IRJET-  	  Women Safety Application using Firebase and GeocoderIRJET-  	  Women Safety Application using Firebase and Geocoder
IRJET- Women Safety Application using Firebase and Geocoder
 
Security Application for Smart Phones and other Mobile Devices
Security Application for Smart Phones and other Mobile DevicesSecurity Application for Smart Phones and other Mobile Devices
Security Application for Smart Phones and other Mobile Devices
 
IRJET- Online Event Location Tracking using GPS
IRJET-  	  Online Event Location Tracking using GPSIRJET-  	  Online Event Location Tracking using GPS
IRJET- Online Event Location Tracking using GPS
 
Hazards Reporting Based On Real-Time Field Data Collection Using Personal Mob...
Hazards Reporting Based On Real-Time Field Data Collection Using Personal Mob...Hazards Reporting Based On Real-Time Field Data Collection Using Personal Mob...
Hazards Reporting Based On Real-Time Field Data Collection Using Personal Mob...
 
Ijiret siri-hp-a-remote-phone-access-for-smartphone-events
Ijiret siri-hp-a-remote-phone-access-for-smartphone-eventsIjiret siri-hp-a-remote-phone-access-for-smartphone-events
Ijiret siri-hp-a-remote-phone-access-for-smartphone-events
 
A mobile monitoring and alert sms system with remote configuration – a case s...
A mobile monitoring and alert sms system with remote configuration – a case s...A mobile monitoring and alert sms system with remote configuration – a case s...
A mobile monitoring and alert sms system with remote configuration – a case s...
 
A mobile monitoring and alert sms system with remote configuration – a case s...
A mobile monitoring and alert sms system with remote configuration – a case s...A mobile monitoring and alert sms system with remote configuration – a case s...
A mobile monitoring and alert sms system with remote configuration – a case s...
 
Cloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewCloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature Review
 
[IJET-V1I3P1] Authors :Sayli Nikumbh,Suchal Gujarathi,Shubham Pawar,S.P.Pingat
[IJET-V1I3P1] Authors :Sayli Nikumbh,Suchal Gujarathi,Shubham Pawar,S.P.Pingat[IJET-V1I3P1] Authors :Sayli Nikumbh,Suchal Gujarathi,Shubham Pawar,S.P.Pingat
[IJET-V1I3P1] Authors :Sayli Nikumbh,Suchal Gujarathi,Shubham Pawar,S.P.Pingat
 
WOMEN’s SAFETY APP
WOMEN’s SAFETY APPWOMEN’s SAFETY APP
WOMEN’s SAFETY APP
 
10 bm60083 location_based_badge_on_a_mobile_phone
10 bm60083 location_based_badge_on_a_mobile_phone10 bm60083 location_based_badge_on_a_mobile_phone
10 bm60083 location_based_badge_on_a_mobile_phone
 
Iisrt zz srikiran rao
Iisrt zz srikiran raoIisrt zz srikiran rao
Iisrt zz srikiran rao
 
A Review On Pocket Ambulance : Emergency Service
A Review On Pocket Ambulance : Emergency ServiceA Review On Pocket Ambulance : Emergency Service
A Review On Pocket Ambulance : Emergency Service
 
Mobile GPS Tracking
Mobile GPS TrackingMobile GPS Tracking
Mobile GPS Tracking
 
Meet health app
Meet health appMeet health app
Meet health app
 
Application Of Android Enabled Mobile Device For Personal Information Systems
Application Of Android Enabled Mobile Device For Personal Information SystemsApplication Of Android Enabled Mobile Device For Personal Information Systems
Application Of Android Enabled Mobile Device For Personal Information Systems
 
50120140501008
5012014050100850120140501008
50120140501008
 

More from TELKOMNIKA JOURNAL

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesTELKOMNIKA JOURNAL
 
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...TELKOMNIKA JOURNAL
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
 

More from TELKOMNIKA JOURNAL (20)

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...
 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...
 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antenna
 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fire
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio network
 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bands
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...
 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertainties
 
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...
 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensor
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...
 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networks
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imaging
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
 

Recently uploaded

What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 

Recently uploaded (20)

What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 

Personal Security Tracking based on Android and Web Application

  • 1. TELKOMNIKA, Vol.16, No.2, April 2018, pp. 771~775 ISSN: 1693-6930, accredited A by DIKTI, Decree No: 58/DIKTI/Kep/2013 DOI: 10.12928/TELKOMNIKA.v16i2.7625  771 Received October 5, 2017; Revised January 28, 2018; Accepted February 12, 2018 Personal Security Tracking based on Android and Web Application Angry Ronald* 1 , Violitta Yesmaya 2 , Muhammad Danaparamita 3 Computer Science Department, School of Computer Science, Bina Nusantara University, Jakarta, Indonesia 11480 *Corresponding author, e-mail: aadam@binus.edu 1 , vyesmaya@binus.edu 2 , mdanaparamita@binus.edu 3 Abstract Nowadays, the frequency of abduction is increasing significantly. Information technology provide many social media which is causing the leaked of personal information where abductor can find out the information. Using social media, people can share location, life event, and anything related about their life event, these become the useful information for the abductor. To anticipate this, a lot of personal tracking device is developed, but the response is too late. Because, the family or relative of the victims will notice that abduction had happen after the victim is lost. According to the problem, this research will focus on develop the personal tracking device which trigger by the victims who own the phone based on android and web application. Whenever the abduction happens, the victim just need to click the button and the system will send a message to the relatives and family in their contact also trigger the notification to the local security. Software development life cycle that will be used is scrum which is divided into several processes like backlog, sprints, scrum meetings, and demos. The result of this research is android application for user and web application for managing application. Keywords: decision support system; tracking application; android application; web application Copyright © 2018 Universitas Ahmad Dahlan. All rights reserved. 1. Introduction Information technology provides many simplicities in human life. Social media is one of the most popular simplicity to share life event in public. Instead of many benefits comes from it, there are also become the way to collect information about the victim’s life event. Abduction is one of the crimes which is increase significantly. There are a lot of tools and applications developed to prevent this crime. But, most of them are trigger the victim’s family or relative. At that time, the abduction process is already in progress. So, the number of abduction victims is still high. Children’s safety is one of the issues that need attention. This is because the lack of supervision of parents against their children, especially when parents are working/traveling, not be able to supervise their children throughout the day. Mobile tracking application supposed to have several features such as tracking location, trigger, and notification alert [1]. Mobile tracker is focusing on tracking device which can locate the device, collect the SIM Card information, collect contact information, and call log information. These features are developing under the concept to track down lost phone [2]. Both research before are able to collect the location of the user in the realtime whether using Global Positioning System or Location Based System. These systems suggested on previous research are lack of several feature such as do not store the history location, not be able to take different kinds of evidence (such as photo and sound), and trigger by related of victims. In this research, a new product is developed. The user which is in victim position is having control of this application. This application will record location of the user in specific time range which defined by the user, collect sound record in secret, and taking photo from every camera of the user’s phone in secret. Whenever the user click the panic button, the application will send the notification to their relatives and family member which is already registered in that application by the user. Also, this will trigger a notification to the local security and send the evidences to the server. The evidences are location, sound, and photo recorded secretly on the user’s phone and will be taking repeatedly in specific time range. The application also stores the location of the user’s phone since the application is activated. So, the local security could be
  • 2.  ISSN: 1693-6930 TELKOMNIKA Vol. 16, No. 2, April 2018 : 771 – 775 772 able to respond quickly and accurately according to the data given. There are several applications which are available in google play store such as GPS Tracker, Track Any Phone, and Friend Locator: Phone Tracker. The comparison as shown in Table 1: Table 1. Comparison Table of Family Locator, iLocateMobile, and Friend Locator. Features Family Locator- GPS Tracker Track Any Phone (iLocateMobile) Friend Locator: Phone Tracker Route assistance Yes No No Tracking location Yes Yes Yes Emergency alert Yes No Yes Manage emergency contact Yes Yes Yes Messaging Yes No Yes History location No Yes No Sound recording No No No Photo taking No No No Manage crime status No No No Dual interface (for user and admin) No No No 2. Research Method 2.1. Location Based Services Location Based Services (LBS) is a service provider that provides location information. LBS is a value-added service from cellular services provider to collect location information of the user. To collect the location, this service will collect information from the device of the user that send back the signal from the tower and mapping it into the map to get the location. Even though this service is provided by the cellular services provider, but the accuracy is quite lower than GPS (Global Positioning System) which is depending on satellite to get the location [3]. 2.2. Global Positioning System Global Positioning System (GPS) is a feature that embedded to a tool that can send and receive the signal from the satellite to collect the exact location of the user. Nowadays, GPS is already attached to all smartphones that makes smartphone able to locate its own location. Because of this feature send signals from the device to the satellite then the location is more accurate rather than LBS [4]. Using GPS, position of user will be able to be tracked by the longitude and latitude of the user. Different transmitter having different accuracy. GPS on mobile device are having several kinds of GPS transmitter which affecting the accuracy of the user position. The transmitter been used on this research is A-GPS using Samsung Galaxy Tab 4. User’s device has a configuration to upload user location for every specific interval time which is configure by user. But, when incident is already triggered the device will change the status and send the location with photo of front and back camera together with sound recording on phone. In mobile phone, GPS works by transmit the signal to the satellites. The satellites receive the signal and monitor the position by control station which are sent back the signals through the satellites using ground antenna. The radio signals from satellites are pick up by GPS receiver on mobile phone [7]. In order to used google maps API, GSM is needed. GPS will focusing on collecting location while GSM will send the location which are longitude and latitude to Google Maps API to display the maps [8]. 2.3. Questionnaire Questionnaire is one of the tool to acquire information by giving the constraint and problem of the research on questions and collecting the feedback from the respondents as the answer of that problem given [6]. To be able to collect the right information, the questionnaire must be having principal requirement which are sequenced in a logical order, allowing a smoth transition from on topic to the next. By applying these principal methods, participant should be able to understand the purpose of research and able to give useful information [6].
  • 3. TELKOMNIKA ISSN: 1693-6930  Personal Security Tracking based on Android and Web Application (Angry Ronald) 773 3. Results and Analysis In this section, the picture of the web application is shows. The result of this research is android application and web application which are consists of many pages including main page in android where user can access the panic button and trigger to the incident page on admin in web application. On web application, admin can also track down the location which shown in maps with the time range also can collect any other evidence in the real time. User can set the configuration of range time to upload location in normally, but when incident happen the system will collect the location per minute. Figure 1 shows Incident List’s Page on web application where admin can see all the incidents happen. Figure 2 shows android main page where user can easily press the panic button which change the status on the server and collecting the evidence such as location periodically. Figure 3 shows the detail victims movement location in maps since that day. Figure 4 shows the evidence page which already collected also on this page admin can collect evidence such as photo from back and front camera and sound evidence. From 30 Respondents, below are the description of the feedback. 1. How fast you understand and remember how to use this application? a. 20 Respondents response “Very Fast”. b. 9 Respondents response “Fast”. c. 1 Respondents response “Slow”. 2. How good are you using this application? a. 20 Respondents response “Very Good”. b. 10 Respondents response “Good”. 3. Is this application can fulfil your expectation about the problem? a. 5 Respondents Strongly Agree. b. 16 Respondents Agree. c. 9 Respondents Neutral. On the appendix, diagram of the process when the incident happen and collecting evidence will be shown. Figure 1. “List of incidents” page in web application Figure 2. Homescreen on android application
  • 4.  ISSN: 1693-6930 TELKOMNIKA Vol. 16, No. 2, April 2018 : 771 – 775 774 Figure 3. Incident’s page on web application Figure 4. Evidence’s page on web application 4. Conclusion According to the result application and questionnaire given, this product has an easy and simple user interface. Also, this product can fulfill and solved the problem where the trigger control is also located not only on admin control but also in user. This application can collect different kinds of evidences such as photo, sound, and location which is not provide by other applications. References [1] Kinage R, Kumari J, Zalke P, Kulkarni M. Mobile Tracking Application. International Journal of Innovative Research in Science, Engineering and Technology. 2013; 2(3): 617-623. [2] Shirin S, Dipina DB, Surekha MV. Mobile Tracker. International Journal on Cybernetics and Informatics. 2016; 5(2): 213–219. [3] Abhijeet T, Ahemad T, Ravindra S, Pranay D, Sumit H. Mobile Tracking Application for Locating Friends using LBS. International Journal of Innovative Research in Computer and Communication Engineering. 2013; 1(2): 303–308. [4] Abha D, Hardik S, Krishna S. Global Positioning System for Object Tracking. International of Computer Application. 2015; 109(8): 40-45 [5] Pressman RS, Maxim BR. Software Engineering: A Practitioner's Approach, Eighth Edition. Jakarta. McGraw-Hill Education. 2010. [6] Bird DK. The use of questionnaires for acquiring information on public perception of natural hazards and risk mitigation–a review of current knowledge and practice. Natural Hazards and Earth System Sciences. 2009; 9:1307-1325.
  • 5. TELKOMNIKA ISSN: 1693-6930  Personal Security Tracking based on Android and Web Application (Angry Ronald) 775 [7] Singal P, Chhillar RS. A Review on GPS and its Applications in Computer Science. International Journal of Computer Science and Mobile Computing. 2014; 3(5):1295-1302. [8] Verma P, Bhatia JS. Design and development of GPS-GSM based tracking system with Google Map based monitoring. International Journal of Computer Science, Engineering and Application. 2013; 3(3):33-40 Appendix Diagram 1. Process of when incident happen Diagram 2. Process of collecting evidence User Mobile Apps Web Apps Start Click “PANIC” Button Change status, trigger to send alert to related registered partner, and collecting location per minute Change status, send alert to related registered partner, and collecting location per minute End Admin Start Click “Collect Evidence” Button (Photo | Sound) Collecting Evidence (Photo | Sound) Trigger Mobile Device to Collect Evidence (Photo | Sound) Silently End Mobile Apps Web Apps Upload Evidence (Photo | Sound) Show Evidence list