SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 08 | Aug 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1003
Android Application For Decentralized Family Locator
Deepika K1
Dept of MCA, Vidya Vikas Institute of Engineering And Technology, Karnataka, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Android Application for Decentralized Family
Locator is a application that would eliminate the needfora
central server and allow family members to see the
whereabouts of other family members in real-time.
Families with members who frequently travel or who
reside in several locations throughoutthe world might find
this to be extremely helpful. The programme would locate
each family member using the GPS capabilities of their
phone and would automatically update the position data.
Family members would be able to communicate with one
another by sending messages and viewing each other's
locations on a map. This decentralized Application
promises the highest levels of data protection, and
accuracy .Despite the fact that numerous program with a
similar function are available, they are all under the
jurisdiction of one single entity, which has complete
control over all data.
The security of user data is undermined or compromised
if the central authority fails, and there is a possibility that
data will be wiped. This decentralized Application makes
use of blockchain technology in the backend to overcome
this problem. Blockchain is a distributed ledger with
several benefits over a centralized organization.
Blockchain guarantees that data is easily accessibleacross
numerous nodes, that data is tamper proof and user have
control over the application.
KeyWords:GPS,Decentralized Application, Blockchain,
Android Application.
1. INTRODUCTION
People nowadays expect information about the where
abouts of anything for tracking purposes, thanks to recent
technical advancements in modern science. We currently
desire additional location-based servicesinordertobemore
advanced and to save time and money. GPS is a technology
that is already in place and that anyone can use without
restriction.
Having the ability to use GPSto construct this system,wewill
require a GPS device to compute the location using GPS data.
As a result, we chose an Android device to make these
computationsbecauseitisinexpensiveandprovidesavariety
of functions, including GPS service. As a result, this system
was created to track a person's whereabouts using block
chain technology, which offers greater benefits and security.
The current family locator app is centralized, which means
that users have little control over their own personal
information. It is also less securebecause iftheappishacked,
all of the data is lost, whereas this is not the case with a
decentralized app because it is distributed across a network.
Additionally, it allows people more control over their
personal data. The presented decentralized networking is
based on open-source technologies. A Decentralized
Application (dApp) is a programme or application that runs
on the block chain network. A dApp GPS Tracker is a sort of
decentralized application that tracks the user's location. The
primary goal of this project is to create a safe location
tracking system for friends and family members.
2. Existing System
Currently available Androidfamilylocatorappsonlyfocuson
using GPS to track the location of a family member and then
sharing that information with the rest of the family. This can
be done in real time or by tracking the whereabouts over
time and then informing the family. It also has a security
disadvantage.
Disadvantages:
• It is challenging for the other family members to locate a
lost family member.
• The app's potential to drainyour phone's batteryisanother
drawback. To continuously track the where abouts of family
members, the software consumes a lot of battery life.
•Individuals may easily have their personal information
taken and face numerous privacy difficulties.
3. Proposed System
We are developing a decentralized family location app for
Android to address current issues. For starters, because the
programme is decentralized, it is much more difficult for
someone to get into the system and track users' locations
without their consent. Second, because the programme is
decentralized, it does not rely on a single server, reducing
the likelihood of downtime. There arenumerouscentralized
families locating apps accessible, but a new generation of
apps is starting to emerge that use decentralized
technologies. This means that the app stores and manages
data across a network of dispersed servers rather than a
single server. This provides a number of benefits, including
improved security and privacy as well as increased
resilience in the case of server outage.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 08 | Aug 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1004
Advantages:
• We implement the Block chain concept in the Android
application for the
decentralized social network to protect user privacy.
• Decentralized app is more scalable and resilient.
4. System Design
System design is the process of creating a system, typicallya
computer system, in compliance with a set of requirements.
The system design process moves on to the requirements
specification step once the feasibility research is finished.
The requirements for the systemarepreciselyestablished in
this phase. The aim of the design method is to provide a
model or image of a system that might be used to construct
that system later. The title of this version is "gadget layout."
It is a plan for fixing the system's issues. The device layout is
the most creative and challenging phase in the gadget
development life cycle.
4.1 Context Diagram
An overview of a system called a context diagram displays
the boundaries of the system aswell asinteractionsbetween
the system and its surroundings. Context diagrams are
helpful for comprehending a system's large picture as well
as for recognizing the key components and connections
between them.
As may be seen below, the Context Diagram suggests
delivering a stage 1 DFD by treating the entire machine as a
single system.
Fig 4.1 context diagram
4.2 Architectural Design
The design and construction of buildings is the practice of
architecture. It is a procedure that entails the preparation of
a blueprint or plan that will later be utilized to direct the
building's construction. The architect is in charge of the
building's general style, as well as its use and intent.
A decentralized family location app can easily be created
since each user might be portrayed as an actor. The initial
step of the process is for the user to sign up and create an
account within the programme. The server will produce a
special code after you enter so you can join the circle. The
user can join the circle after confirming, however to use the
software, they must have their location turned on.
Fig 4.2 Architectural Design
5. Detailed Design
It is often a human or a computer, and as such, it requires an
entity that is pertinent to the features of the device with
which it is interacting. Actors and use cases are both
identified after which the relationship between them is
established. It records each time an actor engages with the
system.
5.1 Use Case Diagram
In the Unified Modeling Language (UML),a usecasediagram
is a form of behavior diagram that illustrates how users (or
actors) interact with the system (or use cases). Its goal is to
illustrate graphically the interactions between actors, goals
(represented as use instances), and any dependenciesthose
use instances may have. The use case graphic's main goal is
to demonstrate. The system's rules'actorswill beportrayed.
Actor interaction is not shown in the use case graphic. The
boundaries of the gadget or use case may need to be
reevaluated if this interaction is necessary for a
comprehensive explanation of the needed behavior.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 08 | Aug 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1005
Fig 5.1: Use Case Diagram
5.2 Activity Diagram
A process or workflow is graphically represented in an
activity diagram. It is frequently used to simulate the
movement of events inside a system or organization. Both
straightforward and complex processes can be modelled
using activity diagrams. For modelling and describing
processes, activity diagrams are an invaluabletool.Theycan
be used to locate possible stumbling blocks and
inefficiencies as well as to enhance process comprehension.
It may also be used to show how a collection of use cases
works together to depict corporate workflows. An event is
typically carried out by several operations, especially when
the operation is intended to accomplish some of the many
tasks that require coordination. instances where sports are
involved, for instance.
Fig 5.2 Activity Diagram
6. System Testing
System testing is the process of confirming a complete,
integrated system's functionality to make sure it complies
with predetermined requirements. Frequently, system
testing is carried out as a "black-box test," which means that
test cases are created based on external specifications
without knowledge of the underlying workings of the
system.
Additionally, testing is the act of executing a programme
with the explicit intention of locating and fixing mistakes as
well as verifying the operation of the programme.
6.1 Unit Testing
The best approach to make sure your code is functioning as
expected is to run it through unit tests. Individual bits of
code can be tested to ensure they function as intended by
writing unit tests. When you are working with previously
written code or when you are making modifications to
existing code, unit tests are extremely crucial.
6.2 Integration Testing
The functionality of an application when it isintegratedwith
other apps is tested through the use of a sort of testingcalled
integration testing. The entire system is tested using a type
of black-box testing. Commonly, system testing comes first,
followed by integration testing.
6.3 System Testing
There are many ways to characterize system testing, but the
simplest definition is that validation is successful when the
system operates as the user could reasonably expect it to.
The system's practical, behavioral, and overall performance
criteria are all verified through validation testing.
6.4 Black Box Testing
A method of testing software known as "black box" does not
involve any knowledge of how the software being tested
operates internally. Any sort of software, including apps,
websites, and computer systems, can be tested using black
box testing.
6.5 White Box Testing
White box testing is a sort of testing where the testcreatoris
fully aware of the internal workings of the software being
tested. This enables them to develop tests that are explicitly
targeted at exercising the code rather than just checking the
operation of the product from a distance. By using the
machine's internal perspective, white container testing
creates test cases that are based on the internal organization
of the machine.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 08 | Aug 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1006
CONCLUSION
An excellent approach to keep track of family members,
especially if they are dispersed across many regions, would
be through a decentralized family locator app. Without
relying on a centralized server, this kind of tool would let
users know where other family members are in real-time.
As a result, it would be more challenging to follow a family's
movements and households would have more privacy
control. These websites allow a sizable number of internet
users to keep in touch, exchange messages, and also share
their actual location. In an emergency, this softwarewill also
assist parents in securing the safety of their kids. Users can
take back control of their ownership and privacy with the
help of decentralized applications.
REFERENCES
Books:
1. Programming Flutter: Native, Cross-Platform Apps the
Easy Way, by Carmine Zac Cagnino
2. Kotlin for Android Developers: Learn Kotlin the Easy
Way, by Antonio Leiva.
3. Dart: Learn Dart Well to Build Native IOS and Android
Mobile, by Sanjib Sinha.
Website:
www.pub.dev/flutter
www.dart.dev
www.javatpiont.com
Table 6 :Test Cases

More Related Content

Similar to Android Application For Decentralized Family Locator

Software Assurance CSS321Security Static Ana.docx
Software Assurance CSS321Security Static Ana.docxSoftware Assurance CSS321Security Static Ana.docx
Software Assurance CSS321Security Static Ana.docx
whitneyleman54422
 
127801976 mobile-shop-management-system-documentation
127801976 mobile-shop-management-system-documentation127801976 mobile-shop-management-system-documentation
127801976 mobile-shop-management-system-documentation
Nitesh Kumar
 

Similar to Android Application For Decentralized Family Locator (20)

Password security system for websites
Password security system for websitesPassword security system for websites
Password security system for websites
 
IRJET- An Efficient Automation Framework for Testing ITS Solution using Selenium
IRJET- An Efficient Automation Framework for Testing ITS Solution using SeleniumIRJET- An Efficient Automation Framework for Testing ITS Solution using Selenium
IRJET- An Efficient Automation Framework for Testing ITS Solution using Selenium
 
CRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECASTCRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECAST
 
IRJET- Sharing Session Key to Protect Data in Cloud Storage
IRJET- Sharing Session Key to Protect Data in Cloud StorageIRJET- Sharing Session Key to Protect Data in Cloud Storage
IRJET- Sharing Session Key to Protect Data in Cloud Storage
 
Bug Tracking System (BTS)
Bug Tracking System (BTS)Bug Tracking System (BTS)
Bug Tracking System (BTS)
 
Authentication system with Decentralized chat app
Authentication system with Decentralized chat appAuthentication system with Decentralized chat app
Authentication system with Decentralized chat app
 
Clone of an organization
Clone of an organizationClone of an organization
Clone of an organization
 
Real Time Moving Object Detection for Day-Night Surveillance using AI
Real Time Moving Object Detection for Day-Night Surveillance using AIReal Time Moving Object Detection for Day-Night Surveillance using AI
Real Time Moving Object Detection for Day-Night Surveillance using AI
 
Bt0081 software engineering
Bt0081 software engineeringBt0081 software engineering
Bt0081 software engineering
 
Wireless Network Intrinsic Secrecy
Wireless Network Intrinsic SecrecyWireless Network Intrinsic Secrecy
Wireless Network Intrinsic Secrecy
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
 
IRJET- Placement Portal
IRJET- Placement PortalIRJET- Placement Portal
IRJET- Placement Portal
 
IRJET - Android Application Service Call Management System
IRJET  -  	  Android Application Service Call Management SystemIRJET  -  	  Android Application Service Call Management System
IRJET - Android Application Service Call Management System
 
Software Assurance CSS321Security Static Ana.docx
Software Assurance CSS321Security Static Ana.docxSoftware Assurance CSS321Security Static Ana.docx
Software Assurance CSS321Security Static Ana.docx
 
Indoor localization Leveraging Human Perception of Textual Signs
Indoor localization Leveraging Human Perception of Textual SignsIndoor localization Leveraging Human Perception of Textual Signs
Indoor localization Leveraging Human Perception of Textual Signs
 
Android Based Smart Department
Android Based Smart DepartmentAndroid Based Smart Department
Android Based Smart Department
 
Cloud Storage and Security
Cloud Storage and SecurityCloud Storage and Security
Cloud Storage and Security
 
Employee record for admin application using android smartphone
Employee record for admin application using android smartphoneEmployee record for admin application using android smartphone
Employee record for admin application using android smartphone
 
127801976 mobile-shop-management-system-documentation
127801976 mobile-shop-management-system-documentation127801976 mobile-shop-management-system-documentation
127801976 mobile-shop-management-system-documentation
 
IRJET- Application Backup and Restore across Multiple Devices
IRJET-	 Application Backup and Restore across Multiple DevicesIRJET-	 Application Backup and Restore across Multiple Devices
IRJET- Application Backup and Restore across Multiple Devices
 

More from IRJET Journal

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 

Android Application For Decentralized Family Locator

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 08 | Aug 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1003 Android Application For Decentralized Family Locator Deepika K1 Dept of MCA, Vidya Vikas Institute of Engineering And Technology, Karnataka, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Android Application for Decentralized Family Locator is a application that would eliminate the needfora central server and allow family members to see the whereabouts of other family members in real-time. Families with members who frequently travel or who reside in several locations throughoutthe world might find this to be extremely helpful. The programme would locate each family member using the GPS capabilities of their phone and would automatically update the position data. Family members would be able to communicate with one another by sending messages and viewing each other's locations on a map. This decentralized Application promises the highest levels of data protection, and accuracy .Despite the fact that numerous program with a similar function are available, they are all under the jurisdiction of one single entity, which has complete control over all data. The security of user data is undermined or compromised if the central authority fails, and there is a possibility that data will be wiped. This decentralized Application makes use of blockchain technology in the backend to overcome this problem. Blockchain is a distributed ledger with several benefits over a centralized organization. Blockchain guarantees that data is easily accessibleacross numerous nodes, that data is tamper proof and user have control over the application. KeyWords:GPS,Decentralized Application, Blockchain, Android Application. 1. INTRODUCTION People nowadays expect information about the where abouts of anything for tracking purposes, thanks to recent technical advancements in modern science. We currently desire additional location-based servicesinordertobemore advanced and to save time and money. GPS is a technology that is already in place and that anyone can use without restriction. Having the ability to use GPSto construct this system,wewill require a GPS device to compute the location using GPS data. As a result, we chose an Android device to make these computationsbecauseitisinexpensiveandprovidesavariety of functions, including GPS service. As a result, this system was created to track a person's whereabouts using block chain technology, which offers greater benefits and security. The current family locator app is centralized, which means that users have little control over their own personal information. It is also less securebecause iftheappishacked, all of the data is lost, whereas this is not the case with a decentralized app because it is distributed across a network. Additionally, it allows people more control over their personal data. The presented decentralized networking is based on open-source technologies. A Decentralized Application (dApp) is a programme or application that runs on the block chain network. A dApp GPS Tracker is a sort of decentralized application that tracks the user's location. The primary goal of this project is to create a safe location tracking system for friends and family members. 2. Existing System Currently available Androidfamilylocatorappsonlyfocuson using GPS to track the location of a family member and then sharing that information with the rest of the family. This can be done in real time or by tracking the whereabouts over time and then informing the family. It also has a security disadvantage. Disadvantages: • It is challenging for the other family members to locate a lost family member. • The app's potential to drainyour phone's batteryisanother drawback. To continuously track the where abouts of family members, the software consumes a lot of battery life. •Individuals may easily have their personal information taken and face numerous privacy difficulties. 3. Proposed System We are developing a decentralized family location app for Android to address current issues. For starters, because the programme is decentralized, it is much more difficult for someone to get into the system and track users' locations without their consent. Second, because the programme is decentralized, it does not rely on a single server, reducing the likelihood of downtime. There arenumerouscentralized families locating apps accessible, but a new generation of apps is starting to emerge that use decentralized technologies. This means that the app stores and manages data across a network of dispersed servers rather than a single server. This provides a number of benefits, including improved security and privacy as well as increased resilience in the case of server outage.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 08 | Aug 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1004 Advantages: • We implement the Block chain concept in the Android application for the decentralized social network to protect user privacy. • Decentralized app is more scalable and resilient. 4. System Design System design is the process of creating a system, typicallya computer system, in compliance with a set of requirements. The system design process moves on to the requirements specification step once the feasibility research is finished. The requirements for the systemarepreciselyestablished in this phase. The aim of the design method is to provide a model or image of a system that might be used to construct that system later. The title of this version is "gadget layout." It is a plan for fixing the system's issues. The device layout is the most creative and challenging phase in the gadget development life cycle. 4.1 Context Diagram An overview of a system called a context diagram displays the boundaries of the system aswell asinteractionsbetween the system and its surroundings. Context diagrams are helpful for comprehending a system's large picture as well as for recognizing the key components and connections between them. As may be seen below, the Context Diagram suggests delivering a stage 1 DFD by treating the entire machine as a single system. Fig 4.1 context diagram 4.2 Architectural Design The design and construction of buildings is the practice of architecture. It is a procedure that entails the preparation of a blueprint or plan that will later be utilized to direct the building's construction. The architect is in charge of the building's general style, as well as its use and intent. A decentralized family location app can easily be created since each user might be portrayed as an actor. The initial step of the process is for the user to sign up and create an account within the programme. The server will produce a special code after you enter so you can join the circle. The user can join the circle after confirming, however to use the software, they must have their location turned on. Fig 4.2 Architectural Design 5. Detailed Design It is often a human or a computer, and as such, it requires an entity that is pertinent to the features of the device with which it is interacting. Actors and use cases are both identified after which the relationship between them is established. It records each time an actor engages with the system. 5.1 Use Case Diagram In the Unified Modeling Language (UML),a usecasediagram is a form of behavior diagram that illustrates how users (or actors) interact with the system (or use cases). Its goal is to illustrate graphically the interactions between actors, goals (represented as use instances), and any dependenciesthose use instances may have. The use case graphic's main goal is to demonstrate. The system's rules'actorswill beportrayed. Actor interaction is not shown in the use case graphic. The boundaries of the gadget or use case may need to be reevaluated if this interaction is necessary for a comprehensive explanation of the needed behavior.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 08 | Aug 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1005 Fig 5.1: Use Case Diagram 5.2 Activity Diagram A process or workflow is graphically represented in an activity diagram. It is frequently used to simulate the movement of events inside a system or organization. Both straightforward and complex processes can be modelled using activity diagrams. For modelling and describing processes, activity diagrams are an invaluabletool.Theycan be used to locate possible stumbling blocks and inefficiencies as well as to enhance process comprehension. It may also be used to show how a collection of use cases works together to depict corporate workflows. An event is typically carried out by several operations, especially when the operation is intended to accomplish some of the many tasks that require coordination. instances where sports are involved, for instance. Fig 5.2 Activity Diagram 6. System Testing System testing is the process of confirming a complete, integrated system's functionality to make sure it complies with predetermined requirements. Frequently, system testing is carried out as a "black-box test," which means that test cases are created based on external specifications without knowledge of the underlying workings of the system. Additionally, testing is the act of executing a programme with the explicit intention of locating and fixing mistakes as well as verifying the operation of the programme. 6.1 Unit Testing The best approach to make sure your code is functioning as expected is to run it through unit tests. Individual bits of code can be tested to ensure they function as intended by writing unit tests. When you are working with previously written code or when you are making modifications to existing code, unit tests are extremely crucial. 6.2 Integration Testing The functionality of an application when it isintegratedwith other apps is tested through the use of a sort of testingcalled integration testing. The entire system is tested using a type of black-box testing. Commonly, system testing comes first, followed by integration testing. 6.3 System Testing There are many ways to characterize system testing, but the simplest definition is that validation is successful when the system operates as the user could reasonably expect it to. The system's practical, behavioral, and overall performance criteria are all verified through validation testing. 6.4 Black Box Testing A method of testing software known as "black box" does not involve any knowledge of how the software being tested operates internally. Any sort of software, including apps, websites, and computer systems, can be tested using black box testing. 6.5 White Box Testing White box testing is a sort of testing where the testcreatoris fully aware of the internal workings of the software being tested. This enables them to develop tests that are explicitly targeted at exercising the code rather than just checking the operation of the product from a distance. By using the machine's internal perspective, white container testing creates test cases that are based on the internal organization of the machine.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 08 | Aug 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1006 CONCLUSION An excellent approach to keep track of family members, especially if they are dispersed across many regions, would be through a decentralized family locator app. Without relying on a centralized server, this kind of tool would let users know where other family members are in real-time. As a result, it would be more challenging to follow a family's movements and households would have more privacy control. These websites allow a sizable number of internet users to keep in touch, exchange messages, and also share their actual location. In an emergency, this softwarewill also assist parents in securing the safety of their kids. Users can take back control of their ownership and privacy with the help of decentralized applications. REFERENCES Books: 1. Programming Flutter: Native, Cross-Platform Apps the Easy Way, by Carmine Zac Cagnino 2. Kotlin for Android Developers: Learn Kotlin the Easy Way, by Antonio Leiva. 3. Dart: Learn Dart Well to Build Native IOS and Android Mobile, by Sanjib Sinha. Website: www.pub.dev/flutter www.dart.dev www.javatpiont.com Table 6 :Test Cases