You are on page 1of 37

Abstract

Vehicle towing is the procedure of towing away vehicles parked in non parking areas or

areas causing hindrance to ongoing traffic, including wrecked vehicles. Such vehicles are

either locked by a jammer or are taken away by the traffic regulatory team, after which

the vehicle owner must pay the requested fine to retrieve the vehicle. This procedure is

followed all around the world to penalize citizens who park their vehicles in non parking areas

or whose in areas that obstruct ongoing traffic.

In this project, we will design an automated vehicle towing system that is implemented

using applications for the user and the other for the traffic regulatory (TRT) team. The details

of the vehicle would also be updated and linked with database. Our complete system consists of

a application for the user and for the traffic police regulatory team. When vehicle is towed traffic

police enters the details of vehicle into application. Alert message will be sent automatically the

vehicle owner.
Introduction

Wheel jammers are used by the traffic regulator team to jam the wheel. To free your car

from this heinous (but effective) device you must go to the Traffic police station, pay the fine

and return to your car to await release. The officials will come with the key and unlock the

jammer.

If the vehicle is causing hindrance to traffic it may be towed away, then towing and

storage charges are also to be paid. This whole process takes a lot of time, requires

manpower and is not transparent (may involve corruption). There are chances that vehicle is

damaged while towing it. It might be difficult to locate the station where the fine is to be paid in

an unknown area.

The developed system consists of a application for the user and for the traffic police regulatory

team. When vehicle is towed traffic police enters the details of vehicle into application. Alert

message will be sent automatically the vehicle owner.

The complete vehicle towing system includes a tedious series of procedures that need to

be followed and are time consuming. Keeping in mind, that all users need to be penalized

equally, this project puts forth an automated vehicle towing system. This system notifies the user

alert message online thereby avoiding going to the traffic police. As a developing nation, this

project is an added perk to the digital India movement.


The steel mill industry is a relatively new branch for Caterpillar. Since 1963, they have been

helping customers around the world in the mining industry. They began with the 980 medium

wheel loader; from there they developed two different machines. Today they have a complete

line of wheel loaders in many different configurations to meet the requirements in all regions of

the world. The 980H Medium Wheel Loader and the 990H Large Wheel Loader are designed to

work in the steel mill industry. The focus of our project is the 980H Medium Wheel Loader.

Due to the nature of its purpose, this vehicle is exposed to extremely high temperatures and a

harsh environment. Is this same harsh environment that makes the braking system falter

sometimes in the slag pit. There is a wide variety of clientele for this vehicle and they are able to

come up with solutions for with these inconvenient mishaps on their own. It is Caterpillar’s

intention to be able to provide a solution for all of its clients and create a uniform solution for all.
Existing System

In existing system when perpetrator park vehicle in no parking area and goes away. The vehicles

are towed and perpetrator unaware that his/her vehicle towed or theft by someone. Jammers are

used to lock the vehicles by jamming its tires, thus making it unable to move the vehicle.

This method poses an advantage over other methods deems the vehicle unmovable until

the perpetrator pays the fine.

What is a ‘Non Parking’ area?

Parking in most cities and towns isn’t usually a problem. However, parking is restricted or

prohibited in many streets. Parking regulations may vary according to the area of a city, the time

of day, the day of the week or even the season. Usually suburban areas are unrestricted, except

perhaps for the main thoroughfares and town center (downtown) areas, where on-street parking

is usually metered. In some towns there are parking regulations during rush-hours on major

thoroughfares, where no parking is permitted on one or both sides of the street at certain times

(this may also include streets with parking meters in town centers). In winter, some streets

designated as „snow streets‟, don‟t permit parking there when the piled up snow exceeds a

certain depth (shown on a sign), in order to leave the road free for snow plows. In some streets,

there are parking restrictions at certain times only, e.g. no parking between 9am and 11am

Monday to Thursday for certain reasons. Some streets have signs prohibiting parking on certain

days for street cleaning, e.g. 2am to 7am (offending vehicles are towed away), although times

aren‟t always shown. Parking may even be prohibited overnight, e.g. 1am or 2am to 6am or 7am,

in some areas. If you have visitors who must park overnight on the street, inform your local
police. In some cities, parking restrictions are indicated by the kerb(Americans spell it curb)

color; for example, a red kerb indicates no parking at any time, a yellow kerb may signify a

limited truck loading zone, a green kerb a limited parking period, a blue kerb disabled parking

only, and a white kerb passenger loading and unloading. No parking areas, e.g. at street corners,

may be indicated by yellow lines. Always read all parking signs carefully. Apart from the

obvious illegal parking spots, such as across entrances and at bus stops, be careful not to park

within ten feet (3m) of a fire hydrant, often indicated by a large gap between parked cars, as

you‟re liable to have your car towed away. Other restricted areas are in front of fire and

ambulance stations and schools, often indicated by a red kerb, and on bus stops and taxi ranks,

where you may stop briefly, but mustn‟t get out of your car. Reserved parking spots for disabled

motorists are provided in most towns and cities. In all states, disabled residents are issued with

special registration plates, allowing parking privileges in designated spaces close to all public

facilities. Most cities provide free parking permits for residents.

What is ‘Vehicle Towing’? Vehicle towing is the procedure of towing away vehicles parked in

non-parking areas or in areas causing hindrance to the ongoing traffic, and wrecked vehicles.

This process aims in penalizing users who park their vehicles in such areas. The vehicles are

usually locked using jammers or are taken away to specific locations in cases where they cause

hindrance to the ongoing traffic. The image shown below is of the jammer which is used to lock

such vehicles.
Proposed System

Our proposed system mainly deals with automating the existing vehicle towing system.

 In this project traffic police enters the vehicle number directly, to our admin

side android application.

 Data for that particular vehicle stored in database

 The perpetrator is further notified with alert message for that towed vehicle.
Software Components
Android:

Android is a mobile operating system developed by Google. It is based on a modified version of

the Linux kernel and other open source software, and is designed primarily for touch screen

mobile devices such as smart phones and tablets.

SQL Server:

Microsoft SQL Server is a relational database management system developed by Microsoft. As a

database server, it is a software product with the primary function of storing and retrieving data

as requested by other software applications—which may run either on the same computer or on

another computer across a network.

Android:

Android is a mobile operating system developed by Google. It is based on a modified version of

the Linux kernel and other open source software, and is designed primarily for touch screen

mobile devices such as smart phones and tablets.

Android studio:

Android Studio is the official integrated development environment (IDE) for Android application

development. It is based on the IntelliJ IDEA, a Java integrated development environment for

software, and incorporates its code editing and developer tools.


Java:

Java is a popular general-purpose programming language and computing platform. It is fast,

reliable, and secure. 

SQL Server:

Microsoft SQL Server is a relational database management system developed by Microsoft. As a

database server, it is a software product with the primary function of storing and retrieving data

as requested by other software applications—which may run either on the same computer or on

another computer across a network.


UML Diagram

Activity diagram

Activity diagrams are graphical representations of workflows of stepwise activities and actions

with support for choice, iteration and concurrency. In the Unified Modeling Language, activity

diagrams are intended to model both computational and organizational processes (i.e.

workflows). Activity diagrams show the overall flow of control.


Sequence diagram

A sequence diagram is an interaction diagram that shows how objects operate with one another

and in what order. It is a construct of a message sequence chart. A sequence diagram shows

object interactions arranged in time sequence.


Use case diagram

The use case diagram is used to identify the primary elements and processes that form the

system. The primary elements are termed as "actors" and the processes are called "use cases."

The use case diagram shows which actors interact with each use case
Class diagram

The class diagram is the main building block of object oriented modeling. It is used both for

general conceptual modeling of the systematic of the application, and for detailed modeling

translating the models into programming code.


System Implementation Plan

An implementation methodology is a collection of practices, procedures and rules that must be

applied to perform a specific operation to provide deliverables at the end of each stage. The eight

principles listed below is built from a collection of procedures to establish an effective

implementation methodology framework. This framework provides flexibility to react and adapt

to the unique requirements of every project, incorporating the principles of:

1. Project Management Planning

2. Scope Requirements Specification

3. Risk Issues Management

4. Communication Training

5. Quality Management

6. Post-Implementation Review

7. Documentation G 8. Experience

Project Management

Planning Project management is the art and science of communicating between individuals with

different responsibilities, perspectives, and expectations so that the project team and the

sponsoring organization perceive value and quality in the end product. The implementation

process should be driven by solid project management principles and the concept of people
working in tandem. The project manager drives the collaborative process so team members work

together to accomplish agreed goals. Scope and Requirements Specification The implementation

approach should have an outcomes-based focus. This means that the process emphasizes on

identifying the business requirements that target an organization's specific goals and objectives.

This is achieved through a systematic manner which sets out a solution roadmap that transforms

goals and objectives into functional requirements (critical success factors, csfs).

Risk Management Risk is associated with almost everything we do and is definitely associated

with software implementation projects. A risk is something that may happen, implying a

probability of less than 100 percentage, and if it does transpire, will have an adverse impact on

the project. If it has a probability of 100 percentage, in other words, it occurs then it becomes an

issue. Such an issue is handled differently to a risk. Risk management An effective methodology

approach addresses risk management in four stages:

Stage

1: Identification Stage

2: Quantification Stage

3: Response Stage

4: Control Issue management

Issues are really problems. To solve the problem, an action must be assigned to someone who

has to do something by a due date. Issues should be tracked by type, status and priority. The

methodology should encapsulate the following steps when managing issues:


1. Define what an issue is.

2. Keep log of issues that is easily accessible to everyone on the project.

3. Prioritize issues in terms of risk to project completion.

4. Assign an owner to the issue.

5. Most importantly, regularly monitor and report on the status of issues.

Communication Training

Communication Communicate formally, informally and frequently. Keep people informed so

that they will support the outcome of the project, understand what they need to do and the

implications, and alert the project team to issues. Communication should be targeted at two key

groups stakeholders such as staff, management, regulators, contractors and the project team.

Training

Training is essential for the uptake of the system by users. Some key considerations are:

Scheduling training Too early and all will be forgotten; The audience involved The training

strategy for management will be different for staff who are required to use the system as part of

their day-to-day activities;


Quality Management

Quality management ensures that the system meets or exceeds the customer expectations. It is a

method for ensuring that all the activities, procedures and documentation required to implement

a project are effective and efficient with respect to the system and its performance. The focus is

not only on the product but also on how to achieve it. Post-Implementation Review This stage

instigates learning from mistakes and identifying areas for improvement. In the context of quality

management, this is the review stage. At project sign-off,a project close-out meeting should be

held with all members of the project team, including stakeholders. Usually held as a workshop

scenario, project team members and stakeholders discuss and document project lessons learned

in the form of project outcomes, significant issues, benefits and risks.

Documentation An implementation methodology must be well documented. The

documentation should be content and audience-specific and usually comes in the form of:

Procedure An overview of the methodology, its phases, milestones and deliverables. This type of

documentation also includes templates that help promote efficiencies and streamline the

implementation process. This type of documentation is aimed at the project team.

Technical Describes the technical installation requirements for the information system. This type

of documentation is aimed at a technical audience.

End-User Refers to manuals for the end-user, system administrator and support staff. They

include resources such as training manuals, training aides (such as powerpoint slides) and

automated training material (such as animations).


Experience

Experience is a valuable commodity and vital ingredient for improving the success of any

project. Leveraging the knowledge, talent and skills acquired through years of operational

experience drives the development of a proven deployment methodology. It is not possible to

sustain a quality model without continual improvement initiatives. Software providers

implementation consultants should have extensive actual experience in addressing the day-to-day

issues with which their clients are confronted. They must be able to advise, instruct, apply

creative solutions, resolve process issues and leverage organizational resources. In this way, they

also help develop the methodology through refinements and application of best practices.
Software Development Life Cycle

The Waterfall Model Waterfall model is also called linear sequential model or classic life cycle

model. In our proposed system we need to follow a particular sequence thats why we are using

waterfall model in proposed system. This waterfall model paradigm begin at system level and

goes through analysis, design, coding and maintenance.


Different stages of waterfall mode

l: Communication: Project development process starts with communication between group

members. We need to specify all the requirements.

2. Planning: It includes complete estimation and scheduling of project.

3. Modeling: It includes detail requirement analysis and project design (algorithm and

flowchart).

4. Construction

a. Coding

b. Testing

5. Deployment: It includes software delivery, support and feedback from customer


Feasibility:

•The feasibility study is an evaluation and analysis of the potential of a proposed project which is

based on extensive investigation and research to support the process of decision making.

•Feasibility studies aim to objectively and rationally uncover the strengths and weaknesses of an

existing business or proposed venture, opportunities and threats present in the environment, the

resources required to carry through, and ultimately the prospects for success.

•A feasibility study evaluates the project’s potential for success; therefore, perceived objectivity

is an important factor in the credibility of the study for potential investors and lending

institutions.

•It must therefore be conducted with an objective, unbiased approach to provide information

upon which decisions can be based.

Types of Feasibility:

1. Legal Feasibility:

It involves any legal hassles that arise during the development of the system. My development

process would hamper, if I had used any tools and method that are pirated. But since I have used

all licensed software, and moreover the algorithms used have been developed by me, no legal

complications are involved.


2. Economic Feasibility:

Economical feasibility is the evolution of the development cost weighted against the ultimate

income or benefits derived from the developed system the resources that are required for the

system can be available easily. The system developed is basically developed for study purpose so

economic feasibility is not a major issue.

3. Technical Feasibility:

The technical feasibility takes into account technical factors like software and hardware. This

project mainly involved extensive writing of program for the various blocks. There is a use of

Java and its various libraries which are freely available on internet and has a rich set of functions.

4. Schedule Feasibility:

A project will fail if it takes too long to be completed before it is useful. Typically this means

estimating how long the system will take to develop, and if it can be completed in a given time

period using some methods like payback period. Schedule feasibility is a measure of how

reasonable the project timetable is.

Project Plan (schedule)


TYPE OF TESTING USED:-

White Box Testing

WHITE BOX TESTING (also known as Clear Box Testing, Open Box Testing, Glass Box
Testing, Transparent Box Testing, Code-Based Testing or Structural Testing) is a software
testing method in which the internal structure/design/implementation of the item being tested is
known to the tester. The tester chooses inputs to exercise paths through the code and determines
the appropriate outputs. Programming know-how and the implementation knowledge is essential.
White box testing is testing beyond the user interface and into the nitty-gritty of a system.

This method is named so because the software program, in the eyes of the tester, is like a
white/transparent box; inside which one clearly sees.

Black Box Testing

BLACK BOX TESTING, also known as Behavioral Testing is a software testing method in which
the internal structure/design/implementation of the item being tested is not known to the tester.
These tests can be functional or non-functional, though usually functional.
This method is named so because the software program, in the eyes of the tester, is like a black
box; inside which one cannot see.

Black Box testing method is applicable to the following levels of software testing:

 Integration Testing
 System Testing
 Acceptance Testing

UNIT TESTING:

Unit testing concentrates verification on the smallest element of the program the module. Using

the detailed design description important control paths are tested to establish errors within the

bounds of the module. In this system each sub module is tested individually as per the unit

testing such as campaign, lead, contact etc are tested individually. Their input field validations

are tested.

INTEGRATION TESTING:

Once all the individual units have been tested there is a need to test how they were put together

to ensure no data is lost across interface, one module does not have an adverse impact on another

and a function is not performed correctly. After unit testing each and every sub module is tested

with integrating each other.


SYSTEM TESTING FOR CURRENT SYSTEM:-

We are testing whether system is giving correct output or not. All the modules were integrated

and the flow of information among different modules was checked. It was also checked that

whether the flow of data is as per the requirements or not. It was also checked that whether any

particular module is non-functioning or not i.e. once the integration is over each and every

module is functioning in its entirety or not. In this level of testing we tested the following:-

Whether all the forms are properly working or not. Whether all the forms are properly linked or

not. whether all the images are properly displayed or not. Whether data retrieval is proper or not.

TEST CASES AND TEST RESULTS:-

Knowledge in general is not required. The tester is aware of what the software is supposed

to do but is not aware of how it does it. For instance, the tester is aware that a particular

Input returns a certain, invariable output but is not aware of how the software produces the

Output in the first place.


TEST CASES:

Test cases are built around specifications and requirements, i.e., what the application is supposed

to do. Test cases are generally derived from external descriptions of the software, including

specifications, requirements and design parameters. Although the tests used are primarily

functional in nature, non-functional tests may also be used. The test designer selects both valid

and invalid inputs and determines the correct output without any knowledge of the test objects

internal structure.

TEST DESIGN TECHNIQUES:-

Typically black box test design technique includes:

Decision table testing

All-pairs testing

State transition Analysis

Equivalence partitioning

Boundary value analysis

Cause effect graph

Error guessing
Software Quality Attributes:

1. Reliability:

Reliability is the ability of a system to remain operational over time. Reliability is measured as

the probability that a system will not fail to perform its intended functions over a specified time

interval.

2. Availability:

Availability defines the proportion of time that the system is functional and working. It can be

measured as a percentage of the total system downtime over a predefined period. Availability

will be affected by system errors, infrastructure problems, malicious attacks, and system load.

3. Portability:

This tool is portable because it can be installed on any operating system of windows. This tool

enables us to reuse the existing code instead of creating new code when moving software from

an environment to another. When the same operating system version is installed on two

compatible computers, it is often possible to transfer one or more program files between them.

4. Performance:

Performance is an indication of the responsiveness of a system to execute any action within a

given time interval. It can be measured in terms of latency or throughput. Latency is the time

taken to respond to any event. Throughput is the number of events that take place within a given

amount of time.

5. Security:
Security is the capability of a system to prevent malicious or accidental actions outside of the

designed usage, and to prevent disclosure or loss of information. A secure system aims to protect

assets and prevent unauthorized modification of information.

6. Maintainability:

Maintainability is the ability of the system to undergo changes with a degree of ease. These

changes could impact components, services, features, and interfaces when adding or changing

the applications functionality in order to fix errors, or to meet new business requirements.

Maintainability can also affect the time it takes to restore the system to its operational status

following a failure or removal from operation for an upgrade. Improving system maintainability

can increase availability and reduce the effects of run-time defects.

7. Robustness:

This system is Robust. Robustness reduces the impact of operational mistakes, erroneous input

data, and hardware errors. This software is robustness so that this is reduced the impact of

operational mistakes and erroneous input data.

Title:
Project problem statement feasibility assessment using NP-Hard, NP-Complete or satisfy ability

issues using modern algebra and/or relevant mathematical models.

Theory:

What is P?

• P is set of all decision problems which can be solved in polynomial time by a deterministic.

•Since it can be solved in polynomial time, it can be verified in polynomial time.

•Therefore P is a subset of NP.

What is N?

•”N” in ”NP” refers to the fact that you are not bound by the normal way a computer works,

which is step-by-step. The ”N” actually stands for ”Non- deterministic”. This means that you are

dealing with an amazing kind of computer that can run things simultaneously or could somehow

guess the right way to do things, or something like that.

•So this ”N” computer can solve lots more problems in ”P” time - for example it can just clone

copies of itself when needed.

•So, programs that takes dramatically longer as the problem gets harder (i.e. not in”P”) could be

solved quickly on this amazing ”N” computer and so are in ”NP”.

•Thus ”NP” means ”we can solve it in polynomial time if we can break the normal rules of step-

by-step computing”.

What is NP?
•”NP” means ”we can solve it in polynomial time if we can break the normal rules of step-by-

step computing”.

What is NP-Complete?

•Since this amazing ”N” computer can also do anything a normal computer can, we know that

”P” problems are also in ”NP”.

•So, the easy problems are in ”P” (and ”NP”), but the really hard ones are *only* in”NP”, and

they are called ”NP-complete”.

•It is like saying there are things that People can do (”P”), there are things that

•Super People can do (”SP”), and there are things *only* Super People can do (”SP-complete”).

What is NP-Hard?

•A problem is NP-hard if an algorithm for solving it can be translated into one for solving any

NP-problem (non- deterministic polynomial time) problem. NP- hard therefore means” at least as

hard as any NP-problem,” although it might, in fact, be harder.

”Our proposed system goes under the category of NP-complete Class because we are using LSB

algorithm for the Image Encryption and Decryption”. An algorithm is called nondeterministically

polynomial time algorithms when forgiven input there was more than one paths that the

algorithm can follow. Due to which one cannot determine which path is to be followed after

particular stage. Here We define many technique to find the appropriate result like cryptography,

stenography, Data hiding, Lossless and reversible scheme.

In our proposed system, as the number of embedding bits in the cover image increases, the time
complexity increases significantly. Since the capacity to embed data increases. Note that the LSB

algorithm is non-deterministic polynomial, so our proposed system comes under NP-Complete

Class.

NP-Complete class of problems: A problem is NP-Complete if it is NP-Hard and it is NP (i.e.

there exists a non-deterministic algorithm running in polynomial time which solves

it). Therefore, our system is NP-Complete.

Algorithm is used:

Algorithm Steps:-

(1) Start.

(2) Centralized server running.

(3) vehicle in non parking area.

(4) traffic police login application.

(5) type vehicle number

(6) alert message send to the vehicle owner.

(7) End.

•Our Project Is NP-Complete Our project comes into the NP Complete, because in particular

time it will not give the result. For the decision problem, so that it will give the solution for the
problem within polynomial time. The set of all decision problems whose solution can be

provided into polynomial time by using the attribute enhanced index.

Other Non- functional requirements.

Performance Requirements:

The performance requirement is the connection of Bluetooth module which is mounted on robot

and the Bluetooth in a phone. High Speed: System should process requested task in parallel for

various action to give quick response. Then system must wait for process completion.

Safety Requirements:

If the connection of Bluetooth module which is mounted on robot and Bluetooth on mobile is

not establish then we are not able to access the robot or there is problem between any other

connections in system, then we will check connections again and again

Security Requirements:

We will be using authentication for connection between Bluetooth module which mounted on

system and Bluetooth on mobile. So that only authenticate person can access the system.
Advantages

 Fully Automated

 Online Database

 More efficient

Disadvantages

 Only sends alert message not location details of vehicle


Conclusion

The system proposed will help reduce complexities in the existing system. The system will help

both the perpetrator and traffic regulatory team. It will bring transparency and a step towards

digitalization. The system proposed consists of applications. The applications will be used to

scan the number plate and alert message send to the vehicle owner. The system proposed will

help reduce complexities in the existing system. The system will help both the perpetrator and

traffic regulatory team. It will bring transparency and a step towards digitalization.

Future Scope

In future more techniques will be added to make process easier and time saving. For that we will

connect application with RTO so that fine will be calculated for towed vehicle and we will also

add payment gateways so that vehicle owner will able to pay fine immediately.
References

1) NEXT GENERATION AUTO THEFT PREVENTION AND TRACKING SYSTEM FOR

LAND VEHICLES.BAVYA R 1 MOHANAMURALI R 2ME Computer and Communication


Engineering Dr. Paul’s Engineering College Villupuram, TamilNadu, India.ICICES2014 -
S.A.Engineering College, Chennai, Tamil Nadu, India.

2) Vehicle Tracking and Locking System Using GPS and GSM.ndraneel Bhattacherjee 1 , Namrata Singh
2 , Sana Parveen 3 , Shalini 4 , Sneha Anand 5 , Vitasta Tiwari 6

Student, 4 th Year, Electrical and Electronics Engineering, IMS Engineering College, Ghaziabad,
India.International Advanced Research Journal in Science, Engineering and TechnologyISO 3297:2007
CertifiedVol. 4, Issue 2, February 2017.

3) Vehicle Monitoring and Theft Prevention System Using ARM Cortex.Nurul Hutha.S 1 and
ArunKumar. B 2 1M.E-Embedded System Technologies2Assistant professor Dept. of EEE. ISSN: 2278 –
7798International Journal of Science, Engineering and Technology Research (IJSETR) Volume 2, Issue
4, April 2013.

4) Vehicle Theft Detection and Tracking Based on GSM and GPS Prof. Shikalgar Parvin B. 1 , Mr.Suraj
Shivaji Sutar 2 ,Mr. Akash Nandkumar suryawashi 3 , Mr.Prasad Hindurav Zambre 4 ,Mr. Abhijit shivaji
kashid 5 Department of E&TC, Sanjeevan Engineering Institute&Technology,Panhala.

5) VEHICLE THEFT ALERT & ENGINE LOCK SYSTEM USING ARM7.Vol-3 Issue-3
2017.Prof.R.M.Sahu 1 , SonaliLole,Faculty, Department Of Electronics, PDEA’s College Of Engineering
Manjari(BK), Pune ,India 11Student, Department Of Electronics,PDEA’s College Of Engineering
Manajri

You might also like