2. 2
GHRCEM, DEPARTMENT OFComputerEngineering2018-19
The purpose of the Software Design Document is to provide a description
of the design of a system fully enough to allow for software development to
proceed with an understanding of what is to be built and how it is expected
to build. The Software Design Document provides information necessary to
provide description of the details for the software and system to be built.
The system for Bike Pooling/Sharing using Android Application. First
the user will register through an android device, enter his/her details to the
application, and enter the location where he/she wants to reach. Then
booking of bikes is done user accepts the request. After registration and
booking, current location of user and consumer will be displayed and also
the path for travelling showing shortest route will be displayed using GPS
navigation and integrated Google maps. The user will picked up from
current location and dropped to the desired destination safely with
minimum cost.
1.1 MOTIVATION
Many people refer cab for travelling around city. It was pretty much
beneficial to people. But sometimes in particular area cabs are not
available so that will prove beneficial to user, because system was time
consuming and so to overcome these issues we implement this system
which will beneficial ,less time consuming and useful for people for short
distance journey.
1.1.1 PROBLEM DEFINATION
To develop a system that user can easilysearch nearest locations of bike users
and book their bike which is going along the same route with minimum fare.
4. 4
GHRCEM, DEPARTMENT OFComputerEngineering2018-19
1)Nicolas Gast Inria,Guilaume Massonnet Inria,Daniel Reijsbergen LFC’S International
Journal of Innovative Science,Engineering Technology [IJISET 2015] which presented
an approach to make forecast of availability in bike Sharing system using probability
based approach.
2) Scott murphy, Aaron Buckley Amy Forsthoefel,Matt Lindsay,Grant neeley, Emily wilk,
Andy Williamson International Journal of Advanced Research in Computer Science
Technology [IJARCST 2013].Dayton bike share feasibility study which has strong
support for a bike share in the Miami valley.
3) Transnational Transdisciplinory Journal which is published by Elliton Fishman, Simon
Washington, Narelle Haworth [11 March 2013]. In which the potential for bike share to
act as a catalyst for private bike riding received little attention after existing of bicycle
sharing.
4) Smart Bike Sharing System to make the city even smarter which was published by
Monika Rani and O.P. Vyas department of Information Technology, Allahbad[2010].In
this paper implementation of plan and evaluation of smart bike sharing system along
with Sensor Networking Technology.
5) International Transport Forum the safety of bike share system is associated with
decreased risk of both fatal and non- fatal bicycle injuries when compared to genral bike
riding. Shaheen et al.’s[2013] North American, Multi-system study included questions to
bike share operators regarding safty data. Bike share schemas[flengenherirrer,2013]
North with standing the importance of creating cities that support safety riding[Jacobsen
and Rutter 2012].
6) Bicycle sharing has numerous perceived benefits, including improved health,
enhance economic development, better urban environment and an enhanced quality of
life (Shaheen, 2010). Despite these advantages, scholarly literature on why, when and
how cities integrate bikeshare programs (or as part of a comprehensive transport and
land use system) has remained scant (Ahillen et al., 2015; Faghih-Imani et al., 2014).
7) World Conference on Transport Research WCTR 2016 Shanghai.[10-15 july 2016].
Iderlina Mateo-babiano, Sameera Kumar and Alvin Mejia bike sharing in Asia: a stake
holder perception and possible future in this paper aims to advance understanding of
bike sharing schemes in Asia by examining motivators, constraints and opportunities,
and their contribution towards achieving sustainable urban mobility outcomes. Using a
survey-based research design approach, this study examines the perception of various
individuals on the perceived benefits, and identifies factors which have facilitated or
constrained the implementation of PBSP.
6. 6
GHRCEM, DEPARTMENT OFComputerEngineering2018-19
3.1 INTRODUCTION
With the increase of environmental concerns and the congestion of roads, bike
sharing has gained a lot of popularity when it comes to environment-friendly
and cheap ways of travelling. Bike sharing is when two persons share a ride
in one of their personal bike. Bike sharing reduces pollution since we have
less bikes on the road. It’s also economic since the travel expenses are shared
among the riders. Travelling alone may be stressful, so having other persons
with you on a trip reduces the stress and is also the occasion to socialize and
make the trip funnier.
Bike sharing is an emerging urban transportation option. The bike
share concept began in Europe and is now being designed, applied, and/or
researched in many North American cities. A bike share transportation sys-
tem is same as OLA and UBER cab system and it is useful for those people
who doesn’t afford OLA and UBER
It includes strategically located nearer bikes to the customer with a
centralized payment and control. Custo mers who wants to use this
application they need smartphone because application is based on real
time and they required current location of customer. After completing
the ride the customer must imp ortant to share feedback because i t is very
important for the security purpose. Bike share pricing structures are
designed to encourage short trips. For example, most bike share programs
feature a thirty minute period within which there is no additional usage fee
to ride the bike.
Finding people to share a ride with is the challenge of Bike sharing as
it is difficult to find a person going to the same place as you at a given time.
Many websites and applications has been developed to help people meet to
share rides. Those applications enable users to create and share their trip and
find passengers. The downside of those applications is that they are usually
location limited: they are available on few languagesand for a limited number
of countries only. Also, most of them are not socially enabled: they do not let
users to share their trips on social media like Facebook. The purpose of this
project is to develop an application that tries to overcome the disadvantages
of the other available applications. The application is to be generic, which
means that it may work for any bike share in any country in the world. Also,
it is socially enabled by its integration to Facebook and possibly to other
social media. Our application which is the name chosen for this application,
7. 7
GHRCEM, DEPARTMENT OFComputerEngineering2018-19
Is also a real-time application: any person taking part of a trip can check-in
the meeting point to let the other persons now he/she has arrived to the
meeting point.
3.1.1 PROJECT SCOPE
As in today’s world there are some people who are comfortable to use cabs,
auto for travelling purpose. But due to unavailability of cabs/autos peoples
have to wait for long time. If sharing cabs are not available then i t will
becomes headache for peoples.
So to overcome these issue we going to implement system which will
allow user to book bike on sharing bases. So due to this system user time
and money will save.
3.1.2 USER CLASSES & CHAR ACTER ISTICS
User:
o Vehicle owner/User have to register to the system with all
his/her personal information (Owner name, email id, contact
nu mber, address etc.) and also information related to the
vehicle. (Vehicle number, vehicle type, vehicle model etc.)
3.1.3 ASSUMPTIONS & DEPENDENCIES
Bike sharing:
o The application has to ore a very quick response time as the
meeting between the driver and passengers is done through
notifications. In other words, the server should be able to
treat notifications and propagate them instantly.
o The application should handle 1000 users sending queries at the
same time.
8. 8
GHRCEM, DEPARTMENT OFComputerEngineering2018-19
System:
o The application should by extensible in order to support multiple
plat-forms including Windows Phone and Web.
o The application should ensure the privacy of the users
including the trips they take part in, their social media accounts
and their accounts.
3.1.4 PERFORMANCE REQUIREMENTS
o The performance of the functions and every module must be well.
o The overall performance of the software will enable the users to
work efficiently.
o Performance of encryption of data should be fast.
o Performance of the providing virtual environment should be fast.
3.1.5 SAFETY REQUIREM E NTS
o The application is designed in modules where errors can be
detected and solve easily. This makes it easier to install and
update new functionality if required.
3.1.6 SECUR ITY REQUIRE M ENT S
o All data will be encrypted using strong encryption algorithm and
according to location encryption is done.
3.1.7 SOFTWARE QUALITY ATTRIBUTES
Our software has many quality attribute that are given below:-
9. 9
GHRCEM, DEPARTMENT OFComputerEngineering2018-19
o Availability: This software is freely available to all users. The
avail-ability of the software is easy for everyone.
o Maintainability: After the deployment of the project if any error
occurs then it can be easily maintained by the software
developer.
o Reliability: The performance of the software is better which
will in-crease the reliability of the Software.
o User Friendliness: Since, the software is a GUI application; the
output generated is much user friendly in its behavior.
o Integrity: Integrity refers to the extent to which access to
software or data by unauthorized persons can be controlled.
o Security:
Users are authenticated using manysecurityphases so reliable
security is provided.
o Testability: The software will be tested considering all the aspects.
3.2 MINIMUM SOFTWARE REQUIREMENTS
3.2.1 SOFTWARE REQUIREMENTS
o Operating System : Windows 7 and above
o Toolkit : Android 2.3 and above
o IDE : Android studio
o Java Version : J2SDK1.8
3.2.2 HARDWARE REQUIREMENTS
o Hardware : Intel I3 Processor and above
10. 10
GHRCEM, DEPARTMENT OFComputerEngineering2018-19
o Speed : 2.80 GHz
o RAM : 4 GB
o Hard Disk : 40 GB
o Key Board : Standard Windows Keyboard
o Mobile : ANDROID
o Monitor : 15 VGA color
3.3 ANALYSIS MODEL: S D LC M odel to be applied
An effective System Development Life Cycle (SDLC) should result in a high
quality system that meets customer expectations, reaches completion within
time and cost evaluations, and works effectively and efficiently in the current
and planned Information Technology infrastructure.
System Development Life Cycle (SDLC) is a conceptual model which
includes policies and procedures for developing or altering systems through-
out their life cycles.
SDLC is used by analysts to develop an information system. SDLC
includes the following activities
o requirements
o design
o implementation
o testing
o deployment
o operations
o maintenance
11. 11
GHRCEM, DEPARTMENT OFComputerEngineering2018-19
3.3.1 PHASES OF SDLC
Systems Development Life Cycle is a systematic approach which explicitly
breaks down the work into phases that are required to implement either new
or modified Information System.
Figure 3.1: Phases of SDLC
12. 12
GHRCEM, DEPARTMENT OFComputerEngineering2018-19
3.4 SYSTEM IMPLEMENTATION PLAN
3.4.1 MODULES:
1. User:
Vehicle owner/User have to register to the system with
all his/her personal information (Owner name, email
id, contact number, address etc.) and also information
related to the vehicle.(vehicle number, vehicle type,
vehicle model etc.)
User renew his/her monthly pass.
2. Toll collector:
When User will go at toll booth area, then toll collector
scan the QR Code of that user.
System will collect toll after scanning QR-Code.
3. System:
After User successful registration system will create
separate QR Code for that user. That QR Code will
contain all the information related to the user and
his/her vehicle.
System verify vehicle is stolen or not. If vehicle found
as stolen vehicle then system will inform to police
station.
Toll amount is calculated after scanning QR-Code.
Toll amount deducted from user account.
System regenerate QR-Code after renewing monthly
pass.
23. 23
GHRCEM, DEPARTMENT OFComputerEngineering2018-19
5.1 ADVANTAGES
o Given the relatively short life of bike sharing programs in the
United States.
o A variety of efforts are underway in the Miami Valley to help
meet that demand so the Dayton region can position itself for
future economic prosperity.
o Data from other cities have shown that young people are
highly supportive of bike shares.
o Improving the convenience of the entire system.
5.2 LIM ITATION S
1. Time consuming process.
2. Transparency of system is less
24. 24
GHRCEM, DEPARTMENT OFComputerEngineering2018-19
5.3 APPLICATIONS
o The system shall be user friendly and consistent.
o The system shall provide attractive graphical interface for the user.
o The system shall allow developer access to install.
o Environment the system shall target customer base.
o This system will use to recommends bike available in nearest
area of user.
26. 26
GHRCEM, DEPARTMENT OFComputerEngineering2018-19
USER SIDE: The very first step of user side is
Registration/Login. After that login process we are directly enters into
the application and then we will search the ride. When user login
into application tha t whole information will be stored in database as
well as when user request to the driver i t will also stores.
Figure 6.1: user database
27. 27
GHRCEM, DEPARTMENT OFComputerEngineering2018-19
DRIVER SIDE: The same process will done when we login
as a driver. Both sides are same but when we schedule a ride then we
work as a driver and if we are search for ride then we will be a user.
When driver login i nto the application that whole information will
stored a t server side i.e. Database and the current location as well as
destination location all things will stored in database.
database.png
Figure 6.2: Request database diagram
38. 38
GHRCEM, DEPARTMENT OFComputerEngineering2018-19
This bike sharing application is an application that complies to the
enterprise class application principles. It is designed to be performing,
scalable, extensible, and highly available. It also ensures the privacy
of the user’s data and secures its access. Given that i t may be
improved in many ways, the application is also easily maintainable.
There is no any Bike sharing application presents in India all the
applications are available for renting purpose and the Cab sharing.
That’s why we working on sharing application like other cab sharing
applications.
The result achieved in this pro ject is a working Android
application and server that perform the requirements stated in this
document. It is still not ready to be deployed on the Play Store for the
public. The main reason is that the server should be deployed on
stronger hardware with a good Internet connection. The constraint tha t
should have been considered is that developing a server and an Android
application demand a lot of work. This should be considered in the
time allowed for each one of these activities. Due to this lack of time,
many things can be improved in the present application. This includes a
better user interface with more attracti ve styles. Also, adding more
support for authentication systems can be an improvement.
40. 40
GHRCEM, DEPARTMENT OFComputerEngineering2018-19
8.1 PROBLEM STATEMENT:
The most common approach for collecting tolls was to have the driver
stop and pay a toll collector sitting in a tollbooth. A manual lane
can process approximately 100 vehicles per hour. So there are multiple
lane on toll booth. These increase the labor cost, fuel consumption,
required time, f i nancial loss. To find the stolen vehicle police need to
search separately.
8.2 Np-hard Np-Complete:
8.2.1 What is P?
o P is set of all decision problems which can be solved in
polynomial time by a deterministic.
o Since i t can be solved in polynomial time, i t can be verified in
polynomial time.
o Therefore P is a subset of NP.
P: Whenever accident being met, the nearby people call the
ambulance. The problem associated with this is that the victims depend
on the mercy of nearby people. There is a chance that there are no
people nearby the accident spot or people who are around neglects the
accident. This is the f l aw in the manual system.
8.2.2 What is NP?
"NP" means "we can solve i t in polynomial time if we can break the
normal rules of step-by-step computing".
41. 41
GHRCEM, DEPARTMENT OFComputerEngineering2018-19
Figure 9.1: What is P?
8.2.3 What is N P Hard?
A problem is NP-hard if an algorithm for solving i t can be
translated into one for solving any NP-problem (nondeterministic
polynomial time) problem. NP-hard therefore means "at least as hard
as any NP-problem," although i t might, in fact, be harder.
NP-Hard: In propose system user will provide details to admin.
Also user will provide the Aadhar number to admin. Admin will add
details and fi nger print to system. System will generate QR-Code and
send to user email id. Only admin can add the information and photo of
candidate into candidate list. User will login into system if user is already
register with Aadhar then user will scan QR-Code send by system on
email. Then user will scan fi nger print. If QR-Code and fi nger print
match i nto system then user can vote candidate. After voting admin
can view vote and automatically identify winner candidate and result.
So here in this case the ‘P’ problem is NP hard. i.e.
P=NP-Hard
Figure 9.2: What is NP hard?
42. 42
GHRCEM, DEPARTMENT OFComputerEngineering2018-19
8.2.4 WHAT IS N P-COM PLETE?
o Since this amazing "N" computer can also do anything a
normal computer can, we know tha t "P" problems are also in
"NP".
o So, the easy problems are in "P" (and "NP"), but the really
hard ones are *only* in "NP", and they are called "NP-
complete".
o It is like saying there are things that People can do ("P"),
there are things that Super People can do ("SP"), and there are
things *only* Super People can do ("SP-complete").
Figure 9.3: What is NP complete?
NP-Complete: We have use Bloom filtering for detection of packet drop
attack whether i t is drop by itself or by hacker.
Hence the ‘P’ is NP-Complete in this case.
43. 43
GHRCEM, DEPARTMENT OFComputerEngineering2018-19
8.3 MATHEMATICAL MODEL:
Set theory Analysis:
Consider set S of solution perspective for Bike Pooling Application.
S=s,e,i,o,DD,NDD,f,success,failure s=initial state
e=end state i=i nput o=o utput DD=deterministic data NDD=non
deterministic data f=function()
S=bike()
Set of all variables is initialized to default value Input I
I=name,DOB,address,gender,bike no,email id,mobile no,Aadhar card
no,source, destination
O=u info, u source, u dest, bike available Function=get value(),
display(), apply for bike()
Get value()=value accepted in this function for all data member and assign
to i t
Display()=display information , source and destination of user
Apply for bike()=after login, user has to apply for the bike by
providing necessary detail to get the bike
success=bike is successfully
failure=bike is not available
44. 44
GHRCEM, DEPARTMENT OFComputerEngineering2018-19
8.4 REFENENCES
[1] . Alta Bike Share. (2011). Melbourne bike share survey. Melbourne: Author.
[2] Basford, L., Reid, S., Lester, T., Thomson, J., & Tolmie, A. (2002). Drivers’
perceptions of cyclists. TRL
[3] Limited for the UK Department for Transport. Retrieved from
http://www.southamptontriclub.
[4] co.uk/storage/TRL549.pdf
[5] Bauman, A.E., Rissel, C., Garrard, J., Ker, I., Speidel, R., & Fishman, E. (2008).
Cycling: Getting Australia
[6] moving: Barriers, facilitators and interventions to get more Australians physically
active through cycling.
[7] Melbourne: Cycling Promotion Fund.
[8] Brons, M., Givoni, M., & Rietveld, P. (2009). Access to railway stations and its
potential in increasing rail
[9] use. Transportation Research Part A, 43(2), 136–149. doi: 10.1016/j.tra.2008.08.002
[10]Buck, D., & Buehler, R. (2011). Bike lanes and other determinants of capital
bikeshare trips. Paper presented at
[11]the Transportation Research Board Annual Meeting 2012, Washington, DC.
Conference paper.
[12]Retrieved from http://ralphbu.files.wordpress.com/2012/02/buck-buehler-poster-cabi-
trb-2012.pdf
[13]Buttner, J., Mlasowsky, H., Birkholz, T., Groper, D., Fernandez, A.C., Emberger, G.,
& Banfi, M. (2011).
[14]Optimising bike sharing in European cities: A handbook. Intelligent Energy Europe
program (IEE).
[15]Retrieved from http://www.obisproject.com/palio/html.run?_Instance=obis
[16]Capital Bike Share. (2011). Capital Bikeshare E-Newsletter (June). Retrieved from
http://
[17]capitalbikeshare.com/news/?p=881
[18]Capital Bike Share. (2012). Fleet performance and safety. Retrieved August 7, 2012
from http://
[19]cabidashboard.ddot.dc.gov/CaBiDashboard/#FleetAndSafety/StartDate=1/30/12EndD
ate=6/30/
[20]12PubDate=6/30/12
[21]China News. (2011). Wuhan free rental bikes up to 70,000 intelligent rent but also the
system starts.
[22]Retrieved August 9, 2012 from http://www.chinanews.com/df/2011/12-
31/3575510.shtml
[23]Erlanger, S. (2008). A new fashion catches on in Paris: Cheap bicycle rentals. New
York Times. Retrieved
[24]from
http://www.nytimes.com/2008/07/13/world/europe/13paris.html?pagewanted=all&_r
=0
[25]Fischer, C.M., Sanchez, C.E., Pittman, M., Milzman, D., Volz, K.A., Huang, H., &
Sanchez, L.D. (2012).
[26]Prevalence of bicycle helmet use by users of public bikeshare programs. Annals of
Emergency Medicine,
[27]60(2), 228–231.
45. 45
GHRCEM, DEPARTMENT OFComputerEngineering2018-19
[28]Fishman, E. (2011). The impacts of public bicycle share schemes on transport choice.
Paper presented at the
[29]Asia-Pacific Cycle Congress, Brisbane Convention and Exhibition Centre.
[30]Fishman, E. (2014). Fixing Australian bike share goes beyond helmet laws. Retrieved
November 26, 2014,
[31]from https://theconversation.edu.au/fixing-australian-bike-share-goes-beyond-helmet-
laws-10229
[32]Fishman, E., Ker, I., Garrard, J., & Litman, T. (2011). Cost and health benefit of
active transport in Queensland
[33]produced for Queensland Government. Brisbane: Institute for Sensible Transport.
[34]Fishman, E., Washington, S., & Haworth, N. (2012a). Barriers and facilitators to
public bicycle scheme
[35]use: A qualitative approach. Transportation Research Part F-Traffic Psychology and
Behaviour, 15(6),
[36]686–698.
[37]Fishman, E., Washington, S., & Haworth, N. (2012b). Understanding the fear of
bicycle riding in
[38]Australia. Journal of the Australasian College of Road Safety, 23(3), 19–27.
[39]Fuller, D., Gauvin, L., Kestens, Y., Daniel, M., Fournier, M., Morency, P., & Drouin,
L. (2011a). Use of a
[40]new public bicycle share program in Montreal, Canada. American Journal of
Preventive Medicine, 41(1),
[41]80–83. doi: 10.1016/j.amepre.2011.03.002
[42]Fuller, D., Sahlqvist, S., Cummins, S., & Ogilvie, D. (2011b). The impact of public
transportation strikes
[43]on use of a bicycle share program in London: Interrupted time series design.
Preventive Medicine,
[44]54(1), 74–76. doi: 10.1016/j.ypmed.2011.09.021
[45]Garrard, J. (2009). Active transport: Adults: An overview of recent evidence.
Melbourne: VicHealth.
[46] Suraj Sawant, Mamta Dhone, Prajakta Swami, Sumant Singote, Nivedita Rawte
(May-2019) .International Journal of Advanced Engineering and Reasearch
development (Vlume 5, Issue12),Pune.BIKE POOLING ANDROID APPLICATION
.
[47]Suraj Sawant , prajakta swami , nivedita rawte, mamta dhone, sumant singote,
(2019) International Journal for Scientific & Development(Vol.7 Issue 02,2019)
Pune Bike sharing android application.