You are on page 1of 49

TRAFFIC MONITORING AUTOMATION USING QR CODE

A Thesis by

Arlalejo, Ramil J.
Bautista, Sunnie P.
Dairo, John Michael P.
Enderez, Lito M.
Villarmia, Locelyn V.

Submitted to the College of Information Technology


Surigao del Sur State University – Main Campus

In Partial Fulfillment
of the Requirements for the Degree of
Bachelor of Science in Computer Science

March 2020
ii

APPROVAL SHEET

This Thesis entitled TRAFFIC MONITORING AUTOMATION USING QR CODE, prepared


and submitted by Arlalejo, Ramil J., Bautista, Sunnie P., Dairo, John Michael P., Enderez, Lito
M., Villarmia, Locelyn V., in partial fulfillment of the requirements for the degree Bachelor of Science
in Computer Science is hereby accepted.

Alimboyong, Catherine
Research Paper Adviser

[Name of Chair]
Chair, Defense Panel

[Name of Panel Member] [Name of Panel Member]


Panel Member Panel Member

Accepted and approved for the conferral of the degree Bachelor of Science in Computer Science.

Born Christian A. Isip, DTE


Dean, College of ITE
iii

DEDICATION
iv

ACKNOWLEDGMENTS
v

TABLE OF CONTENTS
APPROVAL SHEET .................................................................................................... ii

DEDICATION ............................................................................................................. iii

ACKNOWLEDGMENTS............................................................................................. iv

LIST OF TABLES ..................................................................................................... vii

ABSTRACT ................................................................................................................ xi

1 INTRODUCTION ................................................................................................ 1

Background of the Study ............................................................................................... 1

Objectives of the Study .................................................................................................. 4

Significance of the Study ............................................................................................... 5

Scope and Delimitations ................................................................................................ 6

2 THEORETICAL FRAMEWORK ......................................................................... 7

Review of Related Literature ......................................................................................... 7

2.1.1 Overview of your Study ........................................................................................ 7

2.1.2 Arduino Applications .............................................Error! Bookmark not defined.

2.1.3 QR Code Applications ...........................................Error! Bookmark not defined.

2.1.4 Face Recognition ..................................................Error! Bookmark not defined.

Concept of the Study.................................................................................................... 20

Definition of Terms ....................................................................................................... 21

3 OPERATIONAL FRAMEWORK ....................................................................... 23


vi

3.1. Materials ........................................................................................................................ 23

3.1.1. Software......................................................................................................... 23

3.1.2. Hardware ....................................................................................................... 24

3.1.3. Data ............................................................................................................... 24

3.1.4. Gantt Chart of Activities ................................................................................. 25

3.2. Methods ......................................................................................................................... 25

3.2.1. Data Gathering Procedure ............................................................................. 26

3.2.2. Proposed System Design .............................................................................. 27

4. RESULTS AND DISCUSSION ......................................................................... 29

4.1. System Process and Design ........................................................................................ 29

4.1.1 Modules ............................................................................................................. 29

5. SUMMARY, CONCLUSIONS, AND RECOMMENDATIONS ........................... 30

5.1. Summary ....................................................................................................................... 30

5.2. Conclusions .................................................................................................................. 30

5.3. Recommendations ....................................................................................................... 30

REFERENCES .......................................................................................................... 31

APPENDICES ........................................................................................................... 35

BIONOTE .................................................................................................................. 38
vii

LIST OF TABLES

Table 3-1. Applications ..................................................................................................................... 23

Table 3-2. Extraction & Classification Computer .............................................................................. 24

Table 3-3. Number of Instances and Classes used for Experiment.....Error! Bookmark not defined.

Table 3-4. Data ................................................................................................................................ 24

Table 3-5. Hyper-parameters ..............................................................Error! Bookmark not defined.

Table 4-1. Input Image Specifications for Pre-trained CNN ArchitecturesError! Bookmark not

defined.

Table 4-2. Confusion Matrix ................................................................Error! Bookmark not defined.

Table 4-3. Input Image Specifications (Proposed Novel Architecture) Error! Bookmark not defined.

Table 4-4. Confusion Matrix ................................................................Error! Bookmark not defined.

Table 4-5. Input Image Specifications (Pre-trained AlexNet Model and Novel Architecture) ...... Error!

Bookmark not defined.

Table 4-6. Input Image Specifications (Pre-trained VGG16 Model and Novel Architecture) ...... Error!

Bookmark not defined.

Table 4-7. Input Image Specifications (Pre-trained GoogLeNet Model and Novel Architecture) Error!

Bookmark not defined.


viii

Table 4-8. Input Image Specifications (Pre-trained ResNet-50 Model and Novel Architecture) . Error!

Bookmark not defined.

Table 4-9. Confusion Matrix ................................................................Error! Bookmark not defined.

Table 4-10. Comparative Improvement ...............................................Error! Bookmark not defined.

LIST OF FIGURES

Figure 2-1. Artificial Neural Network Architecture ...............................Error! Bookmark not defined.

Figure 2-2. Pre-trained LeNet5 Architecture .................................................................................... 16

Figure 2-3. Pre-trained AlexNet Architecture ......................................Error! Bookmark not defined.

Figure 2-4. Pre-trained VGG Architecture ...........................................Error! Bookmark not defined.

Figure 2-5. Pre-trained GoogLeNet Architecture ................................Error! Bookmark not defined.

Figure 2-6. Pre-trained SqueezeNet Architecture ...............................Error! Bookmark not defined.

Figure 2-7. Pre-trained T-CNN Architecture........................................Error! Bookmark not defined.

Figure 2-8. Pre-trained R-CNN Architecture .......................................Error! Bookmark not defined.

Figure 2-9. Pre-trained Fast R-CNN Architecture ...............................Error! Bookmark not defined.

Figure 2-10. Pre-trained Faster R-CNN ..............................................Error! Bookmark not defined.


ix

Figure 2-11. General steps applied for Image-based classification processError! Bookmark not

defined.

Figure 2-12. Literature Map ................................................................Error! Bookmark not defined.

Figure 2-13. Conceptual Framework of the Study............................................................................ 20

Figure 3-1 Sample images from Kaggle dataset .................................Error! Bookmark not defined.

Figure 3-2. Flow of Implementation ....................................................Error! Bookmark not defined.

Figure 3-3 Matlab Code for Image Resizing .......................................Error! Bookmark not defined.

Figure 3-4. Image Resize....................................................................Error! Bookmark not defined.

Figure 3-5. Histogram Equalization .....................................................Error! Bookmark not defined.

Figure 3-6. Image Rotate ....................................................................Error! Bookmark not defined.

Figure 3-7. Color Space Conversion ...................................................Error! Bookmark not defined.

Figure 3-8. (a) Sample of original plant images and (b) Sample of augmented plant images .......... 27

Figure 3-9. Pre-trained AlexNet Architecture ......................................Error! Bookmark not defined.

Figure 3-10. Pre-trained VGG16 Architecture .....................................Error! Bookmark not defined.

Figure 3-11. Pre-trained GoogLeNet Architecture...............................Error! Bookmark not defined.

Figure 3-12. Pre-trained ResNet-50 Architecture ................................Error! Bookmark not defined.


x

Figure 3-13. Proposed CNN Architecture ...........................................Error! Bookmark not defined.

Figure 4-1 Screenshots during Model Training ................................................................................ 29

Figure 4-2 Performance of Pre-trained CNN Architectures .................Error! Bookmark not defined.

Figure 4-3 Screenshots during Model Training ...................................Error! Bookmark not defined.

Figure 4-4. Performance Result of Proposed Novel Architecture .......Error! Bookmark not defined.

Figure 4-5. Sample of Incorrectly Classified .......................................Error! Bookmark not defined.

Figure 4-6 Sample of Correctly Classified Images ..............................Error! Bookmark not defined.

Figure 4-7. Performance Results of Pre-trained AlexNet vs Proposed Novel Architecture ........ Error!

Bookmark not defined.

Figure 4-8. Performance Results of Pre-trained VGG16 vs Proposed Novel Architecture ......... Error!

Bookmark not defined.

Figure 4-9. Performance Results of Pre-trained GoogLeNet vs Proposed Novel Architecture .. Error!

Bookmark not defined.

Figure 4-10. Performance Results of Pre-trained ResNet-50 vs Proposed Novel Architecture.. Error!

Bookmark not defined.


xi

ABSTRACT
1

1 INTRODUCTION

Background of the Study

Road traffic accidents are amongst the “biggest killers” across the world, according to the

first Global status report on road safety, World Health Organization (WHO).1 more than 1.25 million

people die each year on the roads and most of these deaths are occurring in low and middle income

countries. According to global status report on road safety 2015, road traffic accident is a

development issue for low and middle income countries as it lose approximately 3% of Gross

Domestic Product (GDP). Traffic Control and Management System is important nowadays so as to

have a safer and much reliable system.

Traffic in Metro Manila, based on the Global Satisfaction (Waze et al., 2015), is the "worst

traffic on Southeast Asia". Based on the 2015 Census of population by the Philippine Statistics

Authority, the highly urbanized cities of Metro Manila were listed as being some of the densest cities

in the world. However the existing system needs manual monitoring of traffic rule violation and

proposed system includes tracing vehicles automatically without manual help

Additionally, based on police data, speeding ranks second in the top causes of road

crashes, while wrong overtaking is third. Tanseco (2017) said that there were 32,369 reported road

crashes in the country last year. However, both the Philippines National Police (PNP) and

the Department of Transportation (DOTr) claimed that the figures being released by government

authorities is roughly only 15% of the total number. The two agencies decried the lack of a systematic

data-gathering method that can track all the vehicular accidents in the country (Ilagan et al., 2017).

Nevertheless, the existing designs of Traffic Signs Response (TSR) still do not provide

perfect solutions to make driving as safe as it was aspired. In most of the current TSR techniques,
2

the detection and recognition performance is negatively affected by the many issues. For example,

the traffic sign itself may be subject to deterioration and vandalism. Other factors affect the quality

of the sign images. Such factors include weather conditions, e.g. sunny, shady, rainy or foggy, as

well as locations, e.g. freeways, highways, boulevards, city streets, or country roads (Salahat et al.,

2015).

Due to having a high technological innovation, most of the things we are doing are

automated. Like computers are doing a lot of works, it seems like soon enough it will replace us from

tedious labor works. And in terms of traffic violation system, the plate number of certain vehicle

should be manually inputted in the system. Recently, the machine labor and manual labor are

combined here to create a working vehicle violation system using QR code for fast gathering of

information about the vehicle’s current situation particularly violations. Consequently, to monitor the

vehicle manually is still a very difficult task.

QR code is the type of matrix barcode which was first designed for the automotive industry

by Denso Wave in Japan. It is also a two-dimensional barcodes that contain alphanumeric text and

often feature URL (Uniform Resource Locator). The QR Code system has become admired outside

the automotive industry due to its fast readability and greater storage capacity compared to standard

Universal Product Code (UPC) barcodes. While the technology of mobile phones is constantly

emerging, especially in the area of mobile internet access, QR codes seem to be an adequate tool

to quickly and efficiently converse URLs to users. QR code being so versatile because of its

structural flexibility that it leads to so many diverse field for research such as increasing data

capacity, security applications such as different kinds of watermarking and steganography as well.
3

Some experiments have also been done for better recognition of the QR code image that includes

scratch removal techniques. The existing system is tedious and time consuming, it requires stopping

the vehicle, collecting the owner information, checking his license and collecting (Chaudhary et. al,

2017).

Many accidents happened due to infringement of traffic rules, driving the vehicle without

proper license. The authorities unsupportive of verifying the identity of every driver on a road and

whether the person driving a vehicle is licensed or not. Hence, defiance of traffic rules has become

more common (Ganesh et.al, 2017). And due to traffic congestion and increasing number of users

on road, it is difficult to identify every vehicle uniquely (Apurva et. al, 2017).

Chorgade et. al, (2018) and Umarani et. al, (2017) developed a system where the database of

users is stored on central database of the Regional Transportation Office (RTO) system. The

administrator can register the new users for service by verifying all documents. Administrator can

also view and manage the database of user as well as traffic police. The lost vehicle database is

also registered by the administrator. The registered user can retrieve the driving license in the form

of QR code. The traffic police can login to the android application and scan the QR code of the user

from his mobile application and the driving license will be fetched from the server. If the traffic police

want to check the driver’s vehicle documents, Registration Certificate (RC) book, insurance then

he/she have to insert the vehicle number of the driver then all the documents are viewed here. Also,

after inserting the vehicle number it will show that whether the vehicle is registered for lost vehicle

case or not. Traffic police can apply the ticket if the driver has violated some rules and the amount
4

of the ticket will be debited from his account. The traffic police can see the history of fine individual

driver. The overall database is updated to the central database server.

Internet on the smart-phones has also increased (Chorgade et. al, 2018). Therefore, considering

the future the reach of smart-phones, use of QR code in the vehicle monitoring application has been

proposed by a number of researchers. Thus, it reduces the efforts of the traffic police and the public

users. Likewise, use of QR code is helpful for quick reaction to emergency situations such as

accidents.

Statement of the Problem

This study is sought to answer the following question:

1. What mobile application can be developed to automatically monitor traffic violation


information?

2. What is the efficiency of the proposed system?

3. What is the level of acceptability of the proposed system?

4. What are the recommendations of the proposed system to help the targeted users?

Objectives of the Study

This study aims to develop a Traffic Violation Automation App Using QR code and applies

the new approach to improve the vehicle violation management in our society.

Specifically, this study sought to:

1. Develop a Traffic Monitoring Automation using QR code mobile application.


5

2. It dramatically reduces the time of searching the desired information about the

vehicle’s information and shows its recent violations.

3. The system shows the information about the vehicle in real time and it will provide

an accessible interface to input the driver’s violation directly into the database.

4. Lessen the work of traffic officer time by providing easy access in inputting violation

to the database.

Significance of the Study

The development of traffic violation monitoring using QR code opens an opportunity for other

researchers to compare the manual way of tracking the traffic violations to the automated or

intelligent traffic violation systems. Specifically, this study would prove beneficial to the following

entities:

Land Transportation Office. The outcome of this work will served as a tool of automation for

the office’s traffic administrator to quicken up the listing and billing of violations.

Drivers. The shorter time of getting the violation listed the better for the drivers for it will lessen

the traffic as the car can then move out after the violation is listed.

Traffic Enforcer. The automated application will aid the enforcers.

Traffic Administrators. The automation of sending the violations directly to the office
database avoids corruption from the officers. And the hassle of manually encoding the violations
from the tickets is taken away.

Future Researchers. The results reported in this work offers future researchers’ perspective

on the possibility to develop a classification model using deep learning algorithm. Exceeding
6

overflowing possibilities in the tasked of making the traffic violation listing automatic that can puddle

a pool of ideas for future studies.

Scope and Delimitations

This scholarly work focused on the development of Traffic Violation Automation App Using

QR Code that can be used to lessen the ticketing hassle of the traffic officer for it will be done in a

mobile device instead. It also provides a useful feature in documentation as it can also attach a

picture to become an evidence for the said offense. And searching the information of the vehicle will

be easy with the help of the application that scans QR code using internet. This study will be

implemented and tested in coordination with the Land Transportation Office in Tandag City, Surigao

del Sur.

.
7

2 THEORETICAL FRAMEWORK

Review of Related Literature

2.1.1 Overview of the Study

Traffic Violation Monitoring using QR code is an innovative approach which aims to lessen

the tedious work of traffic enforcer. With the help of the modernize technological practice it takes

away the workload of writing violation on the paper manually and transferring to the office database.

Instead of that, the enforcer will just input the violations and information on the mobile app then it

will automatically upload the data to the office database. Also, it will make viewing information

convenient to all users.

2.1.2 QR Code Applications

A QR code uses four standardized encoding modes (numeric, alphanumeric, byte/binary,

and kanji) to efficiently store data; extensions may also be used (Beulah et al., 2018).

QR code was created as an information container forming of two-dimensional by Toyota

subsidiary, Denso Wave in 1994. Data is encoded in QR optically readable format using QR code

generators. So, QR code can be captured and decoded by smart phones. It is capable of handling

up to several hundred times more information than the traditional bar codes unlike conventional bar

codes are only capable of storing twenty digits, according to different versions of QR code.
8

Chorghade et al., (2018) proposed a system in which the work of traffic police and driver

(user) is simplified. This technology enabled the traffic police to be more effective in controlling

repeat violators of traffic rules. Traffic Police had the database of registration numbers as well as the

history of driving license holders. When a traffic policeman would enter the details of any vehicle

caught violating traffic rules, it would give the complete details of that particular vehicle including the

name and address of owner and the make, model and other details of the vehicle. Not only this, the

details of the driving license holder would also be available. Therefore, enhanced penalties would

be imposed for repetition of violation of traffic rules. Also, the Radio Frequency Identification (RFID)

tag is used to identify the vehicle independently, as shown in Figure 2-1.

Figure 2-1 Shows the schematic diagram of RTO Automation Using QR code

Priya et al., (2016) designed a system called RFID Based Automated Control and Detection

System for Traffic Violation so as to meet and satisfy all those present constraints. The system was

designed with low power consuming devices. The information is transmitted and received using

active RFID tag and reader. Usage of active RFID device added up an advantage to this system so
9

that it can have a better coverage area. Along with verifying necessary documents speed is also

monitored and warns the user to have a safe drive. We did three simulation experiments with the

help of proteus software. The results help to attain a feasible solution for traffic system design.

Figure 2-2 Schematic Diagram in each unit of RFID based Automated Control and

Detection System for Traffic Violation

Salahat et al., (2015) proposed a paper; Evolutionary QR-based Traffic Sign Recognition

System for next generation intelligent vehicles that can perform simultaneous traffic sign detection,

tracking and recognition is presented. The proposed approach utilizes intensity images and the

depth images, in parallel, to robustly detect and track traffic signs on real-time. Additionally, the new

quick-response traffic signs recognition system, which utilizes QR- code plates as a supplement to
10

the conventional traffic signs, is proposed, inheriting the many advantages of the QR-codes, and

introducing the QR-TSR systems.

Figure 2-3 New QR-TSR system flowchart of Evolutionary QR-based Traffic Sign

Recognition System for Next Generation Intelligent Vehicles

Nandurkar et al., (2018) developed a Smart Vehicle Investigation System that aims the

implementation of a vehicle document check system where information of vehicle owner and vehicle

is stored in databases and afterwards they are retrieved by the traffic police by their smartphones

and the physical documents are not needed to be carried along thereby saving time in document

verification. Initially it assigned unique identity numbers and scan the RC, Insurance, PUC, License,

vehicle name and number and store it in the database at the back end. Using that information, it

needs the creation of QR code and stick it on an irreplaceable part of the vehicle. At the front end,
11

creation of an application with which traffic police can scan the QR code on the phone and all the

details about the owner of the vehicle and all the documents earlier stored will be shown on the

phone.

Figure 2-4 Smart Vehicle Investigation System’s Data Flow Diagram

Bansod et al., (2017) implemented the E-Challan System using QR-Code system that

eliminates the time taken in the challan issuing system and also it would remove black money

transaction which is present in current challan issuing system. Traffic violation can be controlled in

a better way. It will increase the efficiency of traffic police and with the current police strength, traffic

can be controlled. It will also help in curbing the corruption; which is the major issue of our country.

It will reduce traffic offences drastically. With the increasing usage of smart phones and wireless
12

network infrastructures, passengers are getting acquainted with obtaining information about

timetables, bus arrival time and etc. by means of mobile phones.

Figure 2-5 Conceptual Flow of Project in E-Challan System using QR-Code system

Figure 2-6 Encryption and Decryption of E-Challan System using QR-Code system

Krishnan et al., (2016) developed the Electronic-Secure Vehicle Authorization Mechanism

(e-SVAM) which work deals with the creation of a real-life android application, where all the

necessary details of a vehicle like RC-Book (Registration Certificate), Insurance Policy and vehicle’s

PUC (Pollution Under Control) certificates are coordinated and stored by the user. QR-Code, a highly

effective and fast readable technology is used for scanning various details of a vehicle. Similarly a
13

parallel application for the inspecting authority of a vehicle is also created to verify the credentials of

the vehicle. The inspecting authority needs to scan a unique QR-Code into the mobile application.

The simple UI provided in the application allows the faster recognition of the availability, or the lack

of availability, of the important documents pertaining to that particular vehicle. These applications

help in saving significant amount of time and resources which are at present spent on this task. In

view of the security risks of exposing personal details of users, greater care has also been given for

securing the data by using QR-Codes and securing access to those details.

Figure 2-7 Systems Architecture of Electronic-Secure Vehicle Authorization

Mechanism (e-SVAM)

Hemadre et al., (2016) developed a Securing Data for QR Code Recognition using Pallier

Cryptosystem to recognize the QR code that is placed on the windshield of the car. Usually this

system used the license plate that is been recognized, but for the more secure and errorless

recognition the proposed working is on QR code detection. This QR code is generated from the

license plate. QR code is two-dimensional barcode which is developed from the basics of one-

dimensional barcode. It uses bit stream concept. QR code consists of compressed information of
14

the license plate. Fetched QR code is preprocessed and decrypted to get code hidden in the QR

code.

Figure 2-8 System Procedure for QR Code Detection of Securing Data for QR Code

Recognition using Pallier Cryptosystem

2.1.3 Android Application

Android Application is a software application running on the Android platform which is built

for mobile device. Android is a mobile operating system based on a modified version of the Linux

kernel and other open source software, designed primarily for touchscreen mobile devices such as

smartphones and tablets. Android is developed by a consortium of developers known as the Open

Handset Alliance, with the main contributor and commercial marketer being Google.

Initially developed by Android Inc., which Google bought in 2005, Android was unveiled in

2007, with the first commercial Android device launched in September 2008. The current stable

version is Android 10, released on September 3, 2019. The core Android source code is known as

Android Open Source Project (AOSP), which is primarily licensed under the Apache License. This

has allowed variants of Android to be developed on a range of other electronics, such as game

consoles, digital cameras, PCs and others, each with a specialized user interface. Some well known
15

derivatives include Android TV for televisions and Wear OS for wearables, both developed by

Google.

Lacatan et al., (2017) made an Integrated Traffic Violation Apprehension and Payment

System Using NFC Technology project about how to eliminate the long process of issuing traffic

violations to caught drivers. The present project includes a device that can be used by traffic

enforcers. All the modules of the project are centralized to one Cloud Server; this is the central

storage for all the information needed in issuance of traffic violation as well as the records of drivers;

the records of drivers is handled by the Windows Application of the Administrator or the Personnel

in-charge. On the other hand, the handheld device to be used by the traffic enforcers is responsible

for issuance of traffic violation and can also receive payments for traffic fines with the used of NFC

Technology integrated to the device and on the driver’s license.


16

Figure 2-9 Block Diagram of Integrated Traffic Violation Apprehension and Payment System

Using NFC Technology

Prakash et al., (2015) created the Traffic Detection System that is an Android application

that aims to determine the behavior of traffic in a particular location. It calculates the speed of the

vehicle and the level of congestion or the amount of traffic is determined on the basis of the values

of sensors. If any such obstruct found, then the driver is provided an option to send messages

regarding high traffic to his/her friends. After a distinct number of repeated low speed and breaks,

the location of the vehicle (latitude and longitude) send to a pre-specified contact (selected in case

of traffic congestion) through an SMS.

Figure 2-9 List of Algorithms of Traffic Detection System

Janahan et al., (2018) made Iot Based Smart Traffic Signal Monitoring System Using Vehicle

Counts that aims to decrease the wait time for the drivers to cross road signal. By using the clustering

algorithms model which is based on KNN algorithm, it is able to utilize in the traffic signal monitoring

systems and control it in an advanced controlling system. It defines the priority level of traffic in the
17

TMS on the basis on which least or highest priority. TMS using multiple IRs in IOT model to learn

vehicles count in real time then updates signal timing of every side traffic lights according’s to the

predicting factors using KNN algorithms. It uses IRs to collect signals from numerous inputs on basis

IOT model setup to learn vehicles count available in a traffic signal.

Figure 2-10 Traffic Monitoring System Architecture Diagram of made Iot Based

Smart Traffic Signal Monitoring System Using Vehicle Counts

Akinboro et al., (2017) developed the Mobile Road Traffic Management System Using

Weighted Sensors that able to provide real time traffic information to road users on their mobile

devices and also suggests alternative routes. That will provide the road users with relevant traffic

information needed to make intelligent decisions for a safe, faster and convenient trip. The traffic
18

management solution was developed using mobile devices and weighted sensors for scalable,

integrated traffic management solution that enables mitigation of traffic congestion.

Figure 2-11 Model Architecture for the Intelligent Traffic Control System of Mobile

Road Traffic Management System Using Weighted Sensors

Ankam et al., (2018) developed a Traffic Management System Using Android App that

perform traffic management system using android App. As the increase of vehicles also increase

the rule breakers of traffic as well as signals. So, the system is for maintaining the data of user who

break the rules. Also, it can generate QR code for security for vehicle owner details like personal
19

documents, vehicles documents and driving license. Therefore, the RTO administrator stores all the

information related to vehicle and driver and generates QR code.

Figure 2-12 Block Diagram of Traffic Management System Using Android App
20

Concept of the Study

The paradigm for the study is given in the figure below…….

Input Output
Process

 Data from traffic Traffic Monitoring


enforcer’s ticket Assign QR code from
violation
every vehicle then fetch
Automation using
 Driver’s License
Information QR Code
information from it. Add

 Vehicle’s Plate new information to the


Number
database.
 QR code

Figure 2-1. Conceptual Framework of the Study

The conceptual framework of study is best illustrated on the paradigm. In the input box, user

needs to scan the QR code in the vehicle’s plate number or driver’s license then encode the violation

committed by the driver. While in the process box, the QR code will be search in the database then

it will the fetch information from there. Also, it will add the new information that was inputted to the

database. Therefore, it came up with a system that so called the Traffic Monitoring Automation using

QR Code is made.
21

Definition of Terms

Android Application It is a software application running on the Android

platform.

Android System It is a mobile operating system based on a modified

version of the Linux kernel and other open

source software, designed primarily

for touchscreen mobile devices such

as smartphones and tablets.

Automated System It is operated by largely automatic equipment.

Backend It is a part of a computer system or application that is not

directly accessed by the user, typically responsible for

storing and manipulating data.

Database It is a data structure that stores organized information.

Infringement of Traffic Rules It is an offence against this Act or the Regulations by a

person driving a motor vehicle.

Liquid Crystal Display (LCD) It is a type of flat panel display which uses liquid crystals in

its primary form of operation.

Mobile Application It is mostly common referred to as an app, is a type of

application software designed to run on a mobile device,

such as a smartphone or tablet computer.


22

QR code It is a machine-readable code consisting of an array of

black and white squares, typically used for storing URLs or

other information for reading by the camera on a

smartphone.

Radio Frequency Identification It is based on electromagnetic waves and allows the

(RFID) automatic identification and localization of objects and

facilitates the capture of data significantly.

Traffic Sign Recognition (TSR) It is a technology by which a vehicle is able to recognize

the traffic signs put on the road e.g. “speed limit” or

“children” or “turn ahead”.

Uniform Resource Locator (URL) It is an address that shows where a particular page can be

found on the World Wide Web.


23

3 OPERATIONAL FRAMEWORK

3.1. Materials

3.1.1. Software

The software used in the study is shown Table 3-1.

Table 3-1. Applications


Name Purpose License
Built for Android to accelerate your
development and help you build the
Android Studio highest-quality apps for every Open Source
Android device.
A sophisticated text editor for code,
Sublime Text Open Source
markup and prose.

Android Studio served as the primary integrated development environment for system

development in android or simulation and also served as the main programming language.

Sublime Text served as the other integrated development environment for system

development or simulation and also served as the programming language for the system’s backend.
24

3.1.2. Hardware

The minimum computer specifications for executing the simulation of the model are listed in

Table 3-2. A computer with these specifications were used in the study.

Table 3-2. Classification Computer


Part Specification
Processor AMD A4-6300 APU with Radeon™ HD Graphics 3.70Ghz
Hard Disk Drive TOSHIBA DT01ACA050 ATA Device 465.76 GB
Memory 2 GB RAM
Network 1Gbps 1-port
Keyboard Generic USB
Mouse Generic USB

3.1.3. Data

The researchers use the following data for designing and creating the database for the

system as it gives the needed information:

Table 3-3. Data


Data Purpose Number of Data
Driver’s License Information Sample form for designing the system 1
the driver's license information
interface.
Traffic Ticket Note Sample form for designing the system 1
traffic violations interface.
Vehicles Information Sample form for designing the system 1
the Vehicle's information interface.
25

3.1.4. Gantt Chart of Activities

Table 3-3. Gantt Chart of Activities of Traffic Monitoring Automation using QR code

Activities Duration in 2019

August September October November December

Requirements Analysis

Project Planning and Proposal

Data Gathering

System Design

System Testing

System Implementation

System Evaluation

3.2. Methods

The general approach used in this study is shown in Figure 3-1. As the flow of the system

starts as the user would choose to view the system or to log-in as administrator. As the user logged-

in, input and editing violation would be accessible. Either the user would log-in or not, viewing of

information through QR code or searching it manually is optional. When the information is found it

would be then displayed. Changes on the violation information would be updated automatically in

the system’s database. Further, the user can stop the application by closing it.
26

START

VIEW LOG-IN

SCAN QR CODE INPUT NUMBER MANUALLY

EDIT INFORMATION/INPUT

SEARCH IN DATABASE VIOLATION

DISPLAY INFORMATION
STOP

3.2.1.
FIGURE 3-1 Flow Chart of Traffic Monitoring Automation using QR code
3.2.2. Data Gathering Procedure

First the researchers approached the officer in charge and traffic enforcers of land

transportation office (LTO) then proceed to ask several questions to provide the needed data for the

system. Furthermore, the researchers wrote and analyze the data gathered and to come

somethings to add on. Further on, the researchers acquired some data samples: (a) Driver’s License

Information, (b)Traffic Violation Ticket Note and (c)Vehicle Registration Information. With the data
27

samples the researchers have gathered. It became the base for designing the system’s interface.

Additionally, the researchers surfed on the internet to find useful information that might be helpful

for improving the system.

3.2.3. Proposed System Design

In the figure 3-2. The proposed system design is created so that it will be easy to use

application where the user only needs to click the buttons. And input the number needed or scan

the code to complete the desired result to be search.

Figure 3-2. Homepage


28

Figure 3-3 Enforcer Log-in interface

Figure 3-4 QR scan or Input Number Manually Interface


29

4. RESULTS AND DISCUSSION

4.1. System Process and Design

4.1.1 Modules

Figure 4-1 Screenshots during System Designing


30

5. SUMMARY, CONCLUSIONS, AND RECOMMENDATIONS

5.1. Summary

5.2. Conclusions

Based on the findings derived from this study, the following conclusions were drawn:

1.

2.

3.

5.3. Recommendations

Based on the findings of the study, the following recommendations are made:

1.

2.

3.

4.
31

REFERENCES

AK Priya, M Yamini, S Pavithra1, S Shalini devi, RFID Based Automated Control and Detection

System for Traffic Violation, International Journal of Innovative Research in Computer and

Communication Engineering (A High Impact Factor, Monthly, Peer Reviewed Journal) Vol.

4, Issue 7, July 2016

Andrzej Sluzek, Baker Mohammad, Ehab Salahat, Hani Saleh, , Mahmoud Al-Qutayri, , and

Mohammad Ismail, Evolutionary QR-based Traffic Sign Recognition System for Next-

Generation Intelligent Vehicles, Ehab Salahat, Hani Saleh, Andrzej Sluzek, Mahmoud Al-

Qutayri, Baker Mohammad, and Mohammad Ismail, College of Engineering, Khalifa

University, Abu Dhabi, United Arab Emirates

Asha Krishnan, Shyjila P.A,Jubilant J.Kizhakethottam, Electronic-Secure Vehicle Authorization

Mechanism (e-SVAM), Global Colloquium in Recent Advancement and Effectual

Researches in Engineering, Science and Technology (RAEREST 2016)

Dynaneshwari Bhalshankar, Nikhil Ankam , Nidhi Kumari, Pooja Kumari, Prof.H.M. Kute, Traffic

Management System Using QR Code, International Journal of Innovative Research in

Computer and Communication Engineering, B. E Student, Department of Computer,

Sinhgad Academy of Engineering, Pune, Maharashtra, India1 Professor, Department of

Computer, Sinhgad Academy of Engineering, Pune, Maharashtra, India2, Vol. 6, Issue 5,

May 2018
32

Francisco Alonso ,Cristina Esteban, Luis Montoro & Sergio A. Useche |Christopher Crowther-

Dowey (2017) Knowledge, perceived effectiveness and qualification of traffic rules, police

supervision, sanctions and justice


33

Irina Albastroiu, Mihai Felea (2017) Exploring the potential of QR codes in higher education

considering the attitudes and interests among Romanian students

Jun-Ki Lee, Il-Sun L e e, Yong-Ju Kwon (2011) Scan & Learn! Use of Quick Response Codes &

Smartphones in a Biology Field Study

Komal Chorghade, Piyush Dahiwele, Prof. Prajakta Pise, Saurabh Deshmukh,

RTO Automation Using QR Code, International Research Journal of Engineering and

Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-

ISSN: 2395-0072

Luisito L. Lacatan1, Paul S. Gilber2, Seth B. Guerrero3, Ken L. Pascual4, Patrick M. Tolentino5

(2017) A Device for Integrated Traffic Violation Apprehension and Payment System Using

NFC Technology

Mrs. D.Anuradha, M.V. Durga Devi, K. Keerthana, K.Dhanasree, Smart Bus Ticket System using

QR Code in Android App, International Research Journal of Engineering and Technology

(IRJET), e-ISSN: 2395-0056, p-ISSN: 2395-0072 (online) www.irjet.net Volume: 05 Issue:

03 | Mar-2018

Ms. Sneha S. Hemadre, Ms. A. S. Gaikwad, Securing Data for QR Code Recognition using Pallier

Cryptosystem, International Journal of Research in IT & Management (IMPACT FACTOR –

5.96), (ISSN 2231-4334), Volume 6, Issue 4 (April , 2016)

Prachi Pawal,Priyanka Doke,,Shubham Gawali, Snehali Nandurkar,

Smart Vehicle Investigation System, International Journal of Innovative Studies in Sciences

and Engineering Technology (IJISSET) ISSN 2455-4863 (Online) www.ijisset.org Volume:


34

4 Issue: 6 | June 2018, Assistant Professor, CSE Department, N.K.Orchid College of

Engineering, Solapur, Maharashtra, India. 2 Student, CSE Department, N.K.O.C.E.T

Solapur, Maharashtra, India

Priyanka Bansod, Prof. Naziya Pathan, Trans-Seva: E-Challan System using QR-Code, Department

of Computer Science and Engineering M.Tech Student1, Assistant Professor2 Nuva

College of Engineering and Technology, Nagpur University, Maharashtra, India

Sudeep Kumar Shetty, Mackwin D'mello, Jagannath Purushothama, Priyanka Rent, V. Monisha

(2017) Awareness and obeyance of road traffic rules among motorists in Mangaluru

suburbs, India
35

APPENDICES

Appendix A: Confusion Matrix during Model Testing and Validation (Simulation 1)


36

Appendix B: Confusion Matrix during Model Testing and Validation (Simulation 2)


37

Appendix C: Confusion Matrices during Model Testing and Validation (Simulation 3)


38

BIONOTE

CATHERINE ROY ALIMBOYONG, is an Assistant Professor II at

the Surigao del Sur State University - Main Campus, Tandag City,

Surigao del Sur. She joined the academe in 2007 at the said

university.

She is a member of the Institute of Electronics and Electrical

Engineers (IEEE) and the Philippine Society of Information

Technology Educators (PSITE). Her research interests include data mining and machine learning

and she has had paper presentations in several international conferences. She also has several

publications in the said areas.

The author may be reached at catherinealimboyong@gmail.com.

You might also like