SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 08 | Aug 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1003
Android Application For Decentralized Family Locator
Deepika K1
Dept of MCA, Vidya Vikas Institute of Engineering And Technology, Karnataka, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Android Application for Decentralized Family
Locator is a application that would eliminate the needfora
central server and allow family members to see the
whereabouts of other family members in real-time.
Families with members who frequently travel or who
reside in several locations throughoutthe world might find
this to be extremely helpful. The programme would locate
each family member using the GPS capabilities of their
phone and would automatically update the position data.
Family members would be able to communicate with one
another by sending messages and viewing each other's
locations on a map. This decentralized Application
promises the highest levels of data protection, and
accuracy .Despite the fact that numerous program with a
similar function are available, they are all under the
jurisdiction of one single entity, which has complete
control over all data.
The security of user data is undermined or compromised
if the central authority fails, and there is a possibility that
data will be wiped. This decentralized Application makes
use of blockchain technology in the backend to overcome
this problem. Blockchain is a distributed ledger with
several benefits over a centralized organization.
Blockchain guarantees that data is easily accessibleacross
numerous nodes, that data is tamper proof and user have
control over the application.
KeyWords:GPS,Decentralized Application, Blockchain,
Android Application.
1. INTRODUCTION
People nowadays expect information about the where
abouts of anything for tracking purposes, thanks to recent
technical advancements in modern science. We currently
desire additional location-based servicesinordertobemore
advanced and to save time and money. GPS is a technology
that is already in place and that anyone can use without
restriction.
Having the ability to use GPSto construct this system,wewill
require a GPS device to compute the location using GPS data.
As a result, we chose an Android device to make these
computationsbecauseitisinexpensiveandprovidesavariety
of functions, including GPS service. As a result, this system
was created to track a person's whereabouts using block
chain technology, which offers greater benefits and security.
The current family locator app is centralized, which means
that users have little control over their own personal
information. It is also less securebecause iftheappishacked,
all of the data is lost, whereas this is not the case with a
decentralized app because it is distributed across a network.
Additionally, it allows people more control over their
personal data. The presented decentralized networking is
based on open-source technologies. A Decentralized
Application (dApp) is a programme or application that runs
on the block chain network. A dApp GPS Tracker is a sort of
decentralized application that tracks the user's location. The
primary goal of this project is to create a safe location
tracking system for friends and family members.
2. Existing System
Currently available Androidfamilylocatorappsonlyfocuson
using GPS to track the location of a family member and then
sharing that information with the rest of the family. This can
be done in real time or by tracking the whereabouts over
time and then informing the family. It also has a security
disadvantage.
Disadvantages:
• It is challenging for the other family members to locate a
lost family member.
• The app's potential to drainyour phone's batteryisanother
drawback. To continuously track the where abouts of family
members, the software consumes a lot of battery life.
•Individuals may easily have their personal information
taken and face numerous privacy difficulties.
3. Proposed System
We are developing a decentralized family location app for
Android to address current issues. For starters, because the
programme is decentralized, it is much more difficult for
someone to get into the system and track users' locations
without their consent. Second, because the programme is
decentralized, it does not rely on a single server, reducing
the likelihood of downtime. There arenumerouscentralized
families locating apps accessible, but a new generation of
apps is starting to emerge that use decentralized
technologies. This means that the app stores and manages
data across a network of dispersed servers rather than a
single server. This provides a number of benefits, including
improved security and privacy as well as increased
resilience in the case of server outage.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 08 | Aug 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1004
Advantages:
• We implement the Block chain concept in the Android
application for the
decentralized social network to protect user privacy.
• Decentralized app is more scalable and resilient.
4. System Design
System design is the process of creating a system, typicallya
computer system, in compliance with a set of requirements.
The system design process moves on to the requirements
specification step once the feasibility research is finished.
The requirements for the systemarepreciselyestablished in
this phase. The aim of the design method is to provide a
model or image of a system that might be used to construct
that system later. The title of this version is "gadget layout."
It is a plan for fixing the system's issues. The device layout is
the most creative and challenging phase in the gadget
development life cycle.
4.1 Context Diagram
An overview of a system called a context diagram displays
the boundaries of the system aswell asinteractionsbetween
the system and its surroundings. Context diagrams are
helpful for comprehending a system's large picture as well
as for recognizing the key components and connections
between them.
As may be seen below, the Context Diagram suggests
delivering a stage 1 DFD by treating the entire machine as a
single system.
Fig 4.1 context diagram
4.2 Architectural Design
The design and construction of buildings is the practice of
architecture. It is a procedure that entails the preparation of
a blueprint or plan that will later be utilized to direct the
building's construction. The architect is in charge of the
building's general style, as well as its use and intent.
A decentralized family location app can easily be created
since each user might be portrayed as an actor. The initial
step of the process is for the user to sign up and create an
account within the programme. The server will produce a
special code after you enter so you can join the circle. The
user can join the circle after confirming, however to use the
software, they must have their location turned on.
Fig 4.2 Architectural Design
5. Detailed Design
It is often a human or a computer, and as such, it requires an
entity that is pertinent to the features of the device with
which it is interacting. Actors and use cases are both
identified after which the relationship between them is
established. It records each time an actor engages with the
system.
5.1 Use Case Diagram
In the Unified Modeling Language (UML),a usecasediagram
is a form of behavior diagram that illustrates how users (or
actors) interact with the system (or use cases). Its goal is to
illustrate graphically the interactions between actors, goals
(represented as use instances), and any dependenciesthose
use instances may have. The use case graphic's main goal is
to demonstrate. The system's rules'actorswill beportrayed.
Actor interaction is not shown in the use case graphic. The
boundaries of the gadget or use case may need to be
reevaluated if this interaction is necessary for a
comprehensive explanation of the needed behavior.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 08 | Aug 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1005
Fig 5.1: Use Case Diagram
5.2 Activity Diagram
A process or workflow is graphically represented in an
activity diagram. It is frequently used to simulate the
movement of events inside a system or organization. Both
straightforward and complex processes can be modelled
using activity diagrams. For modelling and describing
processes, activity diagrams are an invaluabletool.Theycan
be used to locate possible stumbling blocks and
inefficiencies as well as to enhance process comprehension.
It may also be used to show how a collection of use cases
works together to depict corporate workflows. An event is
typically carried out by several operations, especially when
the operation is intended to accomplish some of the many
tasks that require coordination. instances where sports are
involved, for instance.
Fig 5.2 Activity Diagram
6. System Testing
System testing is the process of confirming a complete,
integrated system's functionality to make sure it complies
with predetermined requirements. Frequently, system
testing is carried out as a "black-box test," which means that
test cases are created based on external specifications
without knowledge of the underlying workings of the
system.
Additionally, testing is the act of executing a programme
with the explicit intention of locating and fixing mistakes as
well as verifying the operation of the programme.
6.1 Unit Testing
The best approach to make sure your code is functioning as
expected is to run it through unit tests. Individual bits of
code can be tested to ensure they function as intended by
writing unit tests. When you are working with previously
written code or when you are making modifications to
existing code, unit tests are extremely crucial.
6.2 Integration Testing
The functionality of an application when it isintegratedwith
other apps is tested through the use of a sort of testingcalled
integration testing. The entire system is tested using a type
of black-box testing. Commonly, system testing comes first,
followed by integration testing.
6.3 System Testing
There are many ways to characterize system testing, but the
simplest definition is that validation is successful when the
system operates as the user could reasonably expect it to.
The system's practical, behavioral, and overall performance
criteria are all verified through validation testing.
6.4 Black Box Testing
A method of testing software known as "black box" does not
involve any knowledge of how the software being tested
operates internally. Any sort of software, including apps,
websites, and computer systems, can be tested using black
box testing.
6.5 White Box Testing
White box testing is a sort of testing where the testcreatoris
fully aware of the internal workings of the software being
tested. This enables them to develop tests that are explicitly
targeted at exercising the code rather than just checking the
operation of the product from a distance. By using the
machine's internal perspective, white container testing
creates test cases that are based on the internal organization
of the machine.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 08 | Aug 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1006
CONCLUSION
An excellent approach to keep track of family members,
especially if they are dispersed across many regions, would
be through a decentralized family locator app. Without
relying on a centralized server, this kind of tool would let
users know where other family members are in real-time.
As a result, it would be more challenging to follow a family's
movements and households would have more privacy
control. These websites allow a sizable number of internet
users to keep in touch, exchange messages, and also share
their actual location. In an emergency, this softwarewill also
assist parents in securing the safety of their kids. Users can
take back control of their ownership and privacy with the
help of decentralized applications.
REFERENCES
Books:
1. Programming Flutter: Native, Cross-Platform Apps the
Easy Way, by Carmine Zac Cagnino
2. Kotlin for Android Developers: Learn Kotlin the Easy
Way, by Antonio Leiva.
3. Dart: Learn Dart Well to Build Native IOS and Android
Mobile, by Sanjib Sinha.
Website:
www.pub.dev/flutter
www.dart.dev
www.javatpiont.com
Table 6 :Test Cases

More Related Content

PDF
IRJET- TRACKITUP-An Android Application to Track Multiple Users
PDF
Crowd Steering: Music Festival Case Study
PPTX
Enabling High Level Application Development In The Internet Of Things
PDF
DDS in a Nutshell
PDF
IRJET- Offline Location Detection and Accident Indication using Mobile Sensors
PDF
Interact2011 - Designing Inter-usable Systems
PDF
E Watch Dog Project Fiche Ict10call
PDF
Towards application development for the internet of things
IRJET- TRACKITUP-An Android Application to Track Multiple Users
Crowd Steering: Music Festival Case Study
Enabling High Level Application Development In The Internet Of Things
DDS in a Nutshell
IRJET- Offline Location Detection and Accident Indication using Mobile Sensors
Interact2011 - Designing Inter-usable Systems
E Watch Dog Project Fiche Ict10call
Towards application development for the internet of things

Similar to Android Application For Decentralized Family Locator (20)

PDF
Trip Tracking System
PDF
IRJET- Women Safety Application using Firebase and Geocoder
PDF
NIC Project Final Report
PDF
Advancement in Android Authentication System Using Direct Significance Service
PDF
IEEE 2015 C# Projects
PPTX
PDF
PDF
IEEE 2015 C# Projects
PDF
Androidbasedtaskschedulerandindicator (2).pdf
PDF
20111104 s4 overview
PPTX
Application development for the internet of things
PPTX
Project presentation3
PDF
[IJET-V1I3P1] Authors :Sayli Nikumbh,Suchal Gujarathi,Shubham Pawar,S.P.Pingat
PDF
50120140501008
PPT
UNIT 4 MOBILE AND PERVASIVE COMPUTING NOTES
PPTX
Practical Applications of Mobile Applications in Higher Ed
PDF
Location Provider with Privacy Using Localized Server and GPS
PDF
IRJET - Positioning and Tracking of a Person using Embedded Controller in a D...
PDF
Remote Data Acquisition from Android Mobile
PPTX
Ambient Device
Trip Tracking System
IRJET- Women Safety Application using Firebase and Geocoder
NIC Project Final Report
Advancement in Android Authentication System Using Direct Significance Service
IEEE 2015 C# Projects
IEEE 2015 C# Projects
Androidbasedtaskschedulerandindicator (2).pdf
20111104 s4 overview
Application development for the internet of things
Project presentation3
[IJET-V1I3P1] Authors :Sayli Nikumbh,Suchal Gujarathi,Shubham Pawar,S.P.Pingat
50120140501008
UNIT 4 MOBILE AND PERVASIVE COMPUTING NOTES
Practical Applications of Mobile Applications in Higher Ed
Location Provider with Privacy Using Localized Server and GPS
IRJET - Positioning and Tracking of a Person using Embedded Controller in a D...
Remote Data Acquisition from Android Mobile
Ambient Device
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Ad

Recently uploaded (20)

PPTX
UNIT 4 Total Quality Management .pptx
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PPTX
additive manufacturing of ss316l using mig welding
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PPTX
bas. eng. economics group 4 presentation 1.pptx
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
Welding lecture in detail for understanding
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PDF
composite construction of structures.pdf
PPTX
Sustainable Sites - Green Building Construction
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
UNIT 4 Total Quality Management .pptx
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
additive manufacturing of ss316l using mig welding
Embodied AI: Ushering in the Next Era of Intelligent Systems
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Automation-in-Manufacturing-Chapter-Introduction.pdf
Model Code of Practice - Construction Work - 21102022 .pdf
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
bas. eng. economics group 4 presentation 1.pptx
Operating System & Kernel Study Guide-1 - converted.pdf
Welding lecture in detail for understanding
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
UNIT-1 - COAL BASED THERMAL POWER PLANTS
composite construction of structures.pdf
Sustainable Sites - Green Building Construction
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...

Android Application For Decentralized Family Locator

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 08 | Aug 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1003 Android Application For Decentralized Family Locator Deepika K1 Dept of MCA, Vidya Vikas Institute of Engineering And Technology, Karnataka, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Android Application for Decentralized Family Locator is a application that would eliminate the needfora central server and allow family members to see the whereabouts of other family members in real-time. Families with members who frequently travel or who reside in several locations throughoutthe world might find this to be extremely helpful. The programme would locate each family member using the GPS capabilities of their phone and would automatically update the position data. Family members would be able to communicate with one another by sending messages and viewing each other's locations on a map. This decentralized Application promises the highest levels of data protection, and accuracy .Despite the fact that numerous program with a similar function are available, they are all under the jurisdiction of one single entity, which has complete control over all data. The security of user data is undermined or compromised if the central authority fails, and there is a possibility that data will be wiped. This decentralized Application makes use of blockchain technology in the backend to overcome this problem. Blockchain is a distributed ledger with several benefits over a centralized organization. Blockchain guarantees that data is easily accessibleacross numerous nodes, that data is tamper proof and user have control over the application. KeyWords:GPS,Decentralized Application, Blockchain, Android Application. 1. INTRODUCTION People nowadays expect information about the where abouts of anything for tracking purposes, thanks to recent technical advancements in modern science. We currently desire additional location-based servicesinordertobemore advanced and to save time and money. GPS is a technology that is already in place and that anyone can use without restriction. Having the ability to use GPSto construct this system,wewill require a GPS device to compute the location using GPS data. As a result, we chose an Android device to make these computationsbecauseitisinexpensiveandprovidesavariety of functions, including GPS service. As a result, this system was created to track a person's whereabouts using block chain technology, which offers greater benefits and security. The current family locator app is centralized, which means that users have little control over their own personal information. It is also less securebecause iftheappishacked, all of the data is lost, whereas this is not the case with a decentralized app because it is distributed across a network. Additionally, it allows people more control over their personal data. The presented decentralized networking is based on open-source technologies. A Decentralized Application (dApp) is a programme or application that runs on the block chain network. A dApp GPS Tracker is a sort of decentralized application that tracks the user's location. The primary goal of this project is to create a safe location tracking system for friends and family members. 2. Existing System Currently available Androidfamilylocatorappsonlyfocuson using GPS to track the location of a family member and then sharing that information with the rest of the family. This can be done in real time or by tracking the whereabouts over time and then informing the family. It also has a security disadvantage. Disadvantages: • It is challenging for the other family members to locate a lost family member. • The app's potential to drainyour phone's batteryisanother drawback. To continuously track the where abouts of family members, the software consumes a lot of battery life. •Individuals may easily have their personal information taken and face numerous privacy difficulties. 3. Proposed System We are developing a decentralized family location app for Android to address current issues. For starters, because the programme is decentralized, it is much more difficult for someone to get into the system and track users' locations without their consent. Second, because the programme is decentralized, it does not rely on a single server, reducing the likelihood of downtime. There arenumerouscentralized families locating apps accessible, but a new generation of apps is starting to emerge that use decentralized technologies. This means that the app stores and manages data across a network of dispersed servers rather than a single server. This provides a number of benefits, including improved security and privacy as well as increased resilience in the case of server outage.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 08 | Aug 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1004 Advantages: • We implement the Block chain concept in the Android application for the decentralized social network to protect user privacy. • Decentralized app is more scalable and resilient. 4. System Design System design is the process of creating a system, typicallya computer system, in compliance with a set of requirements. The system design process moves on to the requirements specification step once the feasibility research is finished. The requirements for the systemarepreciselyestablished in this phase. The aim of the design method is to provide a model or image of a system that might be used to construct that system later. The title of this version is "gadget layout." It is a plan for fixing the system's issues. The device layout is the most creative and challenging phase in the gadget development life cycle. 4.1 Context Diagram An overview of a system called a context diagram displays the boundaries of the system aswell asinteractionsbetween the system and its surroundings. Context diagrams are helpful for comprehending a system's large picture as well as for recognizing the key components and connections between them. As may be seen below, the Context Diagram suggests delivering a stage 1 DFD by treating the entire machine as a single system. Fig 4.1 context diagram 4.2 Architectural Design The design and construction of buildings is the practice of architecture. It is a procedure that entails the preparation of a blueprint or plan that will later be utilized to direct the building's construction. The architect is in charge of the building's general style, as well as its use and intent. A decentralized family location app can easily be created since each user might be portrayed as an actor. The initial step of the process is for the user to sign up and create an account within the programme. The server will produce a special code after you enter so you can join the circle. The user can join the circle after confirming, however to use the software, they must have their location turned on. Fig 4.2 Architectural Design 5. Detailed Design It is often a human or a computer, and as such, it requires an entity that is pertinent to the features of the device with which it is interacting. Actors and use cases are both identified after which the relationship between them is established. It records each time an actor engages with the system. 5.1 Use Case Diagram In the Unified Modeling Language (UML),a usecasediagram is a form of behavior diagram that illustrates how users (or actors) interact with the system (or use cases). Its goal is to illustrate graphically the interactions between actors, goals (represented as use instances), and any dependenciesthose use instances may have. The use case graphic's main goal is to demonstrate. The system's rules'actorswill beportrayed. Actor interaction is not shown in the use case graphic. The boundaries of the gadget or use case may need to be reevaluated if this interaction is necessary for a comprehensive explanation of the needed behavior.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 08 | Aug 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1005 Fig 5.1: Use Case Diagram 5.2 Activity Diagram A process or workflow is graphically represented in an activity diagram. It is frequently used to simulate the movement of events inside a system or organization. Both straightforward and complex processes can be modelled using activity diagrams. For modelling and describing processes, activity diagrams are an invaluabletool.Theycan be used to locate possible stumbling blocks and inefficiencies as well as to enhance process comprehension. It may also be used to show how a collection of use cases works together to depict corporate workflows. An event is typically carried out by several operations, especially when the operation is intended to accomplish some of the many tasks that require coordination. instances where sports are involved, for instance. Fig 5.2 Activity Diagram 6. System Testing System testing is the process of confirming a complete, integrated system's functionality to make sure it complies with predetermined requirements. Frequently, system testing is carried out as a "black-box test," which means that test cases are created based on external specifications without knowledge of the underlying workings of the system. Additionally, testing is the act of executing a programme with the explicit intention of locating and fixing mistakes as well as verifying the operation of the programme. 6.1 Unit Testing The best approach to make sure your code is functioning as expected is to run it through unit tests. Individual bits of code can be tested to ensure they function as intended by writing unit tests. When you are working with previously written code or when you are making modifications to existing code, unit tests are extremely crucial. 6.2 Integration Testing The functionality of an application when it isintegratedwith other apps is tested through the use of a sort of testingcalled integration testing. The entire system is tested using a type of black-box testing. Commonly, system testing comes first, followed by integration testing. 6.3 System Testing There are many ways to characterize system testing, but the simplest definition is that validation is successful when the system operates as the user could reasonably expect it to. The system's practical, behavioral, and overall performance criteria are all verified through validation testing. 6.4 Black Box Testing A method of testing software known as "black box" does not involve any knowledge of how the software being tested operates internally. Any sort of software, including apps, websites, and computer systems, can be tested using black box testing. 6.5 White Box Testing White box testing is a sort of testing where the testcreatoris fully aware of the internal workings of the software being tested. This enables them to develop tests that are explicitly targeted at exercising the code rather than just checking the operation of the product from a distance. By using the machine's internal perspective, white container testing creates test cases that are based on the internal organization of the machine.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 08 | Aug 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1006 CONCLUSION An excellent approach to keep track of family members, especially if they are dispersed across many regions, would be through a decentralized family locator app. Without relying on a centralized server, this kind of tool would let users know where other family members are in real-time. As a result, it would be more challenging to follow a family's movements and households would have more privacy control. These websites allow a sizable number of internet users to keep in touch, exchange messages, and also share their actual location. In an emergency, this softwarewill also assist parents in securing the safety of their kids. Users can take back control of their ownership and privacy with the help of decentralized applications. REFERENCES Books: 1. Programming Flutter: Native, Cross-Platform Apps the Easy Way, by Carmine Zac Cagnino 2. Kotlin for Android Developers: Learn Kotlin the Easy Way, by Antonio Leiva. 3. Dart: Learn Dart Well to Build Native IOS and Android Mobile, by Sanjib Sinha. Website: www.pub.dev/flutter www.dart.dev www.javatpiont.com Table 6 :Test Cases