Professional Documents
Culture Documents
Vehicle towing is the procedure of towing away vehicles parked in non parking areas or
areas causing hindrance to ongoing traffic, including wrecked vehicles. Such vehicles are
either locked by a jammer or are taken away by the traffic regulatory team, after which
the vehicle owner must pay the requested fine to retrieve the vehicle. This procedure is
followed all around the world to penalize citizens who park their vehicles in non parking areas
In this project, we will design an automated vehicle towing system that is implemented
using applications for the user and the other for the traffic regulatory (TRT) team. The details
of the vehicle would also be updated and linked with database. Our complete system consists of
a application for the user and for the traffic police regulatory team. When vehicle is towed traffic
police enters the details of vehicle into application. Alert message will be sent automatically the
vehicle owner.
Introduction
Wheel jammers are used by the traffic regulator team to jam the wheel. To free your car
from this heinous (but effective) device you must go to the Traffic police station, pay the fine
and return to your car to await release. The officials will come with the key and unlock the
jammer.
If the vehicle is causing hindrance to traffic it may be towed away, then towing and
storage charges are also to be paid. This whole process takes a lot of time, requires
manpower and is not transparent (may involve corruption). There are chances that vehicle is
damaged while towing it. It might be difficult to locate the station where the fine is to be paid in
an unknown area.
The developed system consists of a application for the user and for the traffic police regulatory
team. When vehicle is towed traffic police enters the details of vehicle into application. Alert
The complete vehicle towing system includes a tedious series of procedures that need to
be followed and are time consuming. Keeping in mind, that all users need to be penalized
equally, this project puts forth an automated vehicle towing system. This system notifies the user
alert message online thereby avoiding going to the traffic police. As a developing nation, this
helping customers around the world in the mining industry. They began with the 980 medium
wheel loader; from there they developed two different machines. Today they have a complete
line of wheel loaders in many different configurations to meet the requirements in all regions of
the world. The 980H Medium Wheel Loader and the 990H Large Wheel Loader are designed to
work in the steel mill industry. The focus of our project is the 980H Medium Wheel Loader.
Due to the nature of its purpose, this vehicle is exposed to extremely high temperatures and a
harsh environment. Is this same harsh environment that makes the braking system falter
sometimes in the slag pit. There is a wide variety of clientele for this vehicle and they are able to
come up with solutions for with these inconvenient mishaps on their own. It is Caterpillar’s
intention to be able to provide a solution for all of its clients and create a uniform solution for all.
Existing System
In existing system when perpetrator park vehicle in no parking area and goes away. The vehicles
are towed and perpetrator unaware that his/her vehicle towed or theft by someone. Jammers are
used to lock the vehicles by jamming its tires, thus making it unable to move the vehicle.
This method poses an advantage over other methods deems the vehicle unmovable until
Parking in most cities and towns isn’t usually a problem. However, parking is restricted or
prohibited in many streets. Parking regulations may vary according to the area of a city, the time
of day, the day of the week or even the season. Usually suburban areas are unrestricted, except
perhaps for the main thoroughfares and town center (downtown) areas, where on-street parking
is usually metered. In some towns there are parking regulations during rush-hours on major
thoroughfares, where no parking is permitted on one or both sides of the street at certain times
(this may also include streets with parking meters in town centers). In winter, some streets
designated as „snow streets‟, don‟t permit parking there when the piled up snow exceeds a
certain depth (shown on a sign), in order to leave the road free for snow plows. In some streets,
there are parking restrictions at certain times only, e.g. no parking between 9am and 11am
Monday to Thursday for certain reasons. Some streets have signs prohibiting parking on certain
days for street cleaning, e.g. 2am to 7am (offending vehicles are towed away), although times
aren‟t always shown. Parking may even be prohibited overnight, e.g. 1am or 2am to 6am or 7am,
in some areas. If you have visitors who must park overnight on the street, inform your local
police. In some cities, parking restrictions are indicated by the kerb(Americans spell it curb)
color; for example, a red kerb indicates no parking at any time, a yellow kerb may signify a
limited truck loading zone, a green kerb a limited parking period, a blue kerb disabled parking
only, and a white kerb passenger loading and unloading. No parking areas, e.g. at street corners,
may be indicated by yellow lines. Always read all parking signs carefully. Apart from the
obvious illegal parking spots, such as across entrances and at bus stops, be careful not to park
within ten feet (3m) of a fire hydrant, often indicated by a large gap between parked cars, as
you‟re liable to have your car towed away. Other restricted areas are in front of fire and
ambulance stations and schools, often indicated by a red kerb, and on bus stops and taxi ranks,
where you may stop briefly, but mustn‟t get out of your car. Reserved parking spots for disabled
motorists are provided in most towns and cities. In all states, disabled residents are issued with
special registration plates, allowing parking privileges in designated spaces close to all public
What is ‘Vehicle Towing’? Vehicle towing is the procedure of towing away vehicles parked in
non-parking areas or in areas causing hindrance to the ongoing traffic, and wrecked vehicles.
This process aims in penalizing users who park their vehicles in such areas. The vehicles are
usually locked using jammers or are taken away to specific locations in cases where they cause
hindrance to the ongoing traffic. The image shown below is of the jammer which is used to lock
such vehicles.
Proposed System
Our proposed system mainly deals with automating the existing vehicle towing system.
In this project traffic police enters the vehicle number directly, to our admin
The perpetrator is further notified with alert message for that towed vehicle.
Software Components
Android:
the Linux kernel and other open source software, and is designed primarily for touch screen
SQL Server:
database server, it is a software product with the primary function of storing and retrieving data
as requested by other software applications—which may run either on the same computer or on
Android:
the Linux kernel and other open source software, and is designed primarily for touch screen
Android studio:
Android Studio is the official integrated development environment (IDE) for Android application
SQL Server:
database server, it is a software product with the primary function of storing and retrieving data
as requested by other software applications—which may run either on the same computer or on
Activity diagram
Activity diagrams are graphical representations of workflows of stepwise activities and actions
with support for choice, iteration and concurrency. In the Unified Modeling Language, activity
diagrams are intended to model both computational and organizational processes (i.e.
A sequence diagram is an interaction diagram that shows how objects operate with one another
and in what order. It is a construct of a message sequence chart. A sequence diagram shows
The use case diagram is used to identify the primary elements and processes that form the
system. The primary elements are termed as "actors" and the processes are called "use cases."
The use case diagram shows which actors interact with each use case
Class diagram
The class diagram is the main building block of object oriented modeling. It is used both for
general conceptual modeling of the systematic of the application, and for detailed modeling
applied to perform a specific operation to provide deliverables at the end of each stage. The eight
implementation methodology framework. This framework provides flexibility to react and adapt
4. Communication Training
5. Quality Management
6. Post-Implementation Review
7. Documentation G 8. Experience
Project Management
Planning Project management is the art and science of communicating between individuals with
different responsibilities, perspectives, and expectations so that the project team and the
sponsoring organization perceive value and quality in the end product. The implementation
process should be driven by solid project management principles and the concept of people
working in tandem. The project manager drives the collaborative process so team members work
together to accomplish agreed goals. Scope and Requirements Specification The implementation
approach should have an outcomes-based focus. This means that the process emphasizes on
identifying the business requirements that target an organization's specific goals and objectives.
This is achieved through a systematic manner which sets out a solution roadmap that transforms
goals and objectives into functional requirements (critical success factors, csfs).
Risk Management Risk is associated with almost everything we do and is definitely associated
with software implementation projects. A risk is something that may happen, implying a
probability of less than 100 percentage, and if it does transpire, will have an adverse impact on
the project. If it has a probability of 100 percentage, in other words, it occurs then it becomes an
issue. Such an issue is handled differently to a risk. Risk management An effective methodology
Stage
1: Identification Stage
2: Quantification Stage
3: Response Stage
Issues are really problems. To solve the problem, an action must be assigned to someone who
has to do something by a due date. Issues should be tracked by type, status and priority. The
Communication Training
that they will support the outcome of the project, understand what they need to do and the
implications, and alert the project team to issues. Communication should be targeted at two key
groups stakeholders such as staff, management, regulators, contractors and the project team.
Training
Training is essential for the uptake of the system by users. Some key considerations are:
Scheduling training Too early and all will be forgotten; The audience involved The training
strategy for management will be different for staff who are required to use the system as part of
Quality management ensures that the system meets or exceeds the customer expectations. It is a
method for ensuring that all the activities, procedures and documentation required to implement
a project are effective and efficient with respect to the system and its performance. The focus is
not only on the product but also on how to achieve it. Post-Implementation Review This stage
instigates learning from mistakes and identifying areas for improvement. In the context of quality
management, this is the review stage. At project sign-off,a project close-out meeting should be
held with all members of the project team, including stakeholders. Usually held as a workshop
scenario, project team members and stakeholders discuss and document project lessons learned
documentation should be content and audience-specific and usually comes in the form of:
Procedure An overview of the methodology, its phases, milestones and deliverables. This type of
documentation also includes templates that help promote efficiencies and streamline the
Technical Describes the technical installation requirements for the information system. This type
End-User Refers to manuals for the end-user, system administrator and support staff. They
include resources such as training manuals, training aides (such as powerpoint slides) and
Experience is a valuable commodity and vital ingredient for improving the success of any
project. Leveraging the knowledge, talent and skills acquired through years of operational
implementation consultants should have extensive actual experience in addressing the day-to-day
issues with which their clients are confronted. They must be able to advise, instruct, apply
creative solutions, resolve process issues and leverage organizational resources. In this way, they
also help develop the methodology through refinements and application of best practices.
Software Development Life Cycle
The Waterfall Model Waterfall model is also called linear sequential model or classic life cycle
model. In our proposed system we need to follow a particular sequence thats why we are using
waterfall model in proposed system. This waterfall model paradigm begin at system level and
3. Modeling: It includes detail requirement analysis and project design (algorithm and
flowchart).
4. Construction
a. Coding
b. Testing
•The feasibility study is an evaluation and analysis of the potential of a proposed project which is
based on extensive investigation and research to support the process of decision making.
•Feasibility studies aim to objectively and rationally uncover the strengths and weaknesses of an
existing business or proposed venture, opportunities and threats present in the environment, the
resources required to carry through, and ultimately the prospects for success.
•A feasibility study evaluates the project’s potential for success; therefore, perceived objectivity
is an important factor in the credibility of the study for potential investors and lending
institutions.
•It must therefore be conducted with an objective, unbiased approach to provide information
Types of Feasibility:
1. Legal Feasibility:
It involves any legal hassles that arise during the development of the system. My development
process would hamper, if I had used any tools and method that are pirated. But since I have used
all licensed software, and moreover the algorithms used have been developed by me, no legal
Economical feasibility is the evolution of the development cost weighted against the ultimate
income or benefits derived from the developed system the resources that are required for the
system can be available easily. The system developed is basically developed for study purpose so
3. Technical Feasibility:
The technical feasibility takes into account technical factors like software and hardware. This
project mainly involved extensive writing of program for the various blocks. There is a use of
Java and its various libraries which are freely available on internet and has a rich set of functions.
4. Schedule Feasibility:
A project will fail if it takes too long to be completed before it is useful. Typically this means
estimating how long the system will take to develop, and if it can be completed in a given time
period using some methods like payback period. Schedule feasibility is a measure of how
WHITE BOX TESTING (also known as Clear Box Testing, Open Box Testing, Glass Box
Testing, Transparent Box Testing, Code-Based Testing or Structural Testing) is a software
testing method in which the internal structure/design/implementation of the item being tested is
known to the tester. The tester chooses inputs to exercise paths through the code and determines
the appropriate outputs. Programming know-how and the implementation knowledge is essential.
White box testing is testing beyond the user interface and into the nitty-gritty of a system.
This method is named so because the software program, in the eyes of the tester, is like a
white/transparent box; inside which one clearly sees.
BLACK BOX TESTING, also known as Behavioral Testing is a software testing method in which
the internal structure/design/implementation of the item being tested is not known to the tester.
These tests can be functional or non-functional, though usually functional.
This method is named so because the software program, in the eyes of the tester, is like a black
box; inside which one cannot see.
Integration Testing
System Testing
Acceptance Testing
UNIT TESTING:
Unit testing concentrates verification on the smallest element of the program the module. Using
the detailed design description important control paths are tested to establish errors within the
bounds of the module. In this system each sub module is tested individually as per the unit
testing such as campaign, lead, contact etc are tested individually. Their input field validations
are tested.
INTEGRATION TESTING:
Once all the individual units have been tested there is a need to test how they were put together
to ensure no data is lost across interface, one module does not have an adverse impact on another
and a function is not performed correctly. After unit testing each and every sub module is tested
We are testing whether system is giving correct output or not. All the modules were integrated
and the flow of information among different modules was checked. It was also checked that
whether the flow of data is as per the requirements or not. It was also checked that whether any
particular module is non-functioning or not i.e. once the integration is over each and every
module is functioning in its entirety or not. In this level of testing we tested the following:-
Whether all the forms are properly working or not. Whether all the forms are properly linked or
not. whether all the images are properly displayed or not. Whether data retrieval is proper or not.
Knowledge in general is not required. The tester is aware of what the software is supposed
to do but is not aware of how it does it. For instance, the tester is aware that a particular
Input returns a certain, invariable output but is not aware of how the software produces the
Test cases are built around specifications and requirements, i.e., what the application is supposed
to do. Test cases are generally derived from external descriptions of the software, including
specifications, requirements and design parameters. Although the tests used are primarily
functional in nature, non-functional tests may also be used. The test designer selects both valid
and invalid inputs and determines the correct output without any knowledge of the test objects
internal structure.
All-pairs testing
Equivalence partitioning
Error guessing
Software Quality Attributes:
1. Reliability:
Reliability is the ability of a system to remain operational over time. Reliability is measured as
the probability that a system will not fail to perform its intended functions over a specified time
interval.
2. Availability:
Availability defines the proportion of time that the system is functional and working. It can be
measured as a percentage of the total system downtime over a predefined period. Availability
will be affected by system errors, infrastructure problems, malicious attacks, and system load.
3. Portability:
This tool is portable because it can be installed on any operating system of windows. This tool
enables us to reuse the existing code instead of creating new code when moving software from
an environment to another. When the same operating system version is installed on two
compatible computers, it is often possible to transfer one or more program files between them.
4. Performance:
given time interval. It can be measured in terms of latency or throughput. Latency is the time
taken to respond to any event. Throughput is the number of events that take place within a given
amount of time.
5. Security:
Security is the capability of a system to prevent malicious or accidental actions outside of the
designed usage, and to prevent disclosure or loss of information. A secure system aims to protect
6. Maintainability:
Maintainability is the ability of the system to undergo changes with a degree of ease. These
changes could impact components, services, features, and interfaces when adding or changing
the applications functionality in order to fix errors, or to meet new business requirements.
Maintainability can also affect the time it takes to restore the system to its operational status
following a failure or removal from operation for an upgrade. Improving system maintainability
7. Robustness:
This system is Robust. Robustness reduces the impact of operational mistakes, erroneous input
data, and hardware errors. This software is robustness so that this is reduced the impact of
Title:
Project problem statement feasibility assessment using NP-Hard, NP-Complete or satisfy ability
Theory:
What is P?
• P is set of all decision problems which can be solved in polynomial time by a deterministic.
What is N?
•”N” in ”NP” refers to the fact that you are not bound by the normal way a computer works,
which is step-by-step. The ”N” actually stands for ”Non- deterministic”. This means that you are
dealing with an amazing kind of computer that can run things simultaneously or could somehow
•So this ”N” computer can solve lots more problems in ”P” time - for example it can just clone
•So, programs that takes dramatically longer as the problem gets harder (i.e. not in”P”) could be
•Thus ”NP” means ”we can solve it in polynomial time if we can break the normal rules of step-
by-step computing”.
What is NP?
•”NP” means ”we can solve it in polynomial time if we can break the normal rules of step-by-
step computing”.
What is NP-Complete?
•Since this amazing ”N” computer can also do anything a normal computer can, we know that
•So, the easy problems are in ”P” (and ”NP”), but the really hard ones are *only* in”NP”, and
•It is like saying there are things that People can do (”P”), there are things that
•Super People can do (”SP”), and there are things *only* Super People can do (”SP-complete”).
What is NP-Hard?
•A problem is NP-hard if an algorithm for solving it can be translated into one for solving any
NP-problem (non- deterministic polynomial time) problem. NP- hard therefore means” at least as
”Our proposed system goes under the category of NP-complete Class because we are using LSB
algorithm for the Image Encryption and Decryption”. An algorithm is called nondeterministically
polynomial time algorithms when forgiven input there was more than one paths that the
algorithm can follow. Due to which one cannot determine which path is to be followed after
particular stage. Here We define many technique to find the appropriate result like cryptography,
In our proposed system, as the number of embedding bits in the cover image increases, the time
complexity increases significantly. Since the capacity to embed data increases. Note that the LSB
Class.
Algorithm is used:
Algorithm Steps:-
(1) Start.
(7) End.
•Our Project Is NP-Complete Our project comes into the NP Complete, because in particular
time it will not give the result. For the decision problem, so that it will give the solution for the
problem within polynomial time. The set of all decision problems whose solution can be
Performance Requirements:
The performance requirement is the connection of Bluetooth module which is mounted on robot
and the Bluetooth in a phone. High Speed: System should process requested task in parallel for
various action to give quick response. Then system must wait for process completion.
Safety Requirements:
If the connection of Bluetooth module which is mounted on robot and Bluetooth on mobile is
not establish then we are not able to access the robot or there is problem between any other
Security Requirements:
We will be using authentication for connection between Bluetooth module which mounted on
system and Bluetooth on mobile. So that only authenticate person can access the system.
Advantages
Fully Automated
Online Database
More efficient
Disadvantages
The system proposed will help reduce complexities in the existing system. The system will help
both the perpetrator and traffic regulatory team. It will bring transparency and a step towards
digitalization. The system proposed consists of applications. The applications will be used to
scan the number plate and alert message send to the vehicle owner. The system proposed will
help reduce complexities in the existing system. The system will help both the perpetrator and
traffic regulatory team. It will bring transparency and a step towards digitalization.
Future Scope
In future more techniques will be added to make process easier and time saving. For that we will
connect application with RTO so that fine will be calculated for towed vehicle and we will also
add payment gateways so that vehicle owner will able to pay fine immediately.
References
2) Vehicle Tracking and Locking System Using GPS and GSM.ndraneel Bhattacherjee 1 , Namrata Singh
2 , Sana Parveen 3 , Shalini 4 , Sneha Anand 5 , Vitasta Tiwari 6
Student, 4 th Year, Electrical and Electronics Engineering, IMS Engineering College, Ghaziabad,
India.International Advanced Research Journal in Science, Engineering and TechnologyISO 3297:2007
CertifiedVol. 4, Issue 2, February 2017.
3) Vehicle Monitoring and Theft Prevention System Using ARM Cortex.Nurul Hutha.S 1 and
ArunKumar. B 2 1M.E-Embedded System Technologies2Assistant professor Dept. of EEE. ISSN: 2278 –
7798International Journal of Science, Engineering and Technology Research (IJSETR) Volume 2, Issue
4, April 2013.
4) Vehicle Theft Detection and Tracking Based on GSM and GPS Prof. Shikalgar Parvin B. 1 , Mr.Suraj
Shivaji Sutar 2 ,Mr. Akash Nandkumar suryawashi 3 , Mr.Prasad Hindurav Zambre 4 ,Mr. Abhijit shivaji
kashid 5 Department of E&TC, Sanjeevan Engineering Institute&Technology,Panhala.
5) VEHICLE THEFT ALERT & ENGINE LOCK SYSTEM USING ARM7.Vol-3 Issue-3
2017.Prof.R.M.Sahu 1 , SonaliLole,Faculty, Department Of Electronics, PDEA’s College Of Engineering
Manjari(BK), Pune ,India 11Student, Department Of Electronics,PDEA’s College Of Engineering
Manajri