Haversine Algorithm Design using the Google Maps API Method for Android-based Public Security Applications

International Journal of Computer Trends and Technology (IJCTT)          
© 2021 by IJCTT Journal
Volume-69 Issue-2
Year of Publication : 2021
Authors : Gerzha Hayat Prakarsha, Herlina Dessy Kristianty Lumbantobing, M. Rifqi Ramadhan, Ifan Prihandi

MLA Style: 
Gerzha Hayat Prakarsha, et al. "Haversine Algorithm Design using the Google Maps API Method for Android-based Public Security Applications." International Journal of Computer Trends and Technology, vol. 69, no. 2, February. 2021, pp.53-60. Crossref https://doi.org/ 10.14445/22312803/IJCTT-V69I2P108

APA Style:   
Gerzha Hayat Prakarsha, Herlina Dessy Kristianty Lumbantobing, M. Rifqi Ramadhan, & Ifan Prihandi 
(2021). Haversine Algorithm Design using the Google Maps API Method for Android-based Public Security Applications. International Journal of Computer Trends and Technology , 69(2), 53-60.  https://doi.org/ 10.14445/22312803/IJCTT-V69I2P108

The rapid development of technology must of course be balanced with all the needs of society. Not only physically, but also social needs which include a sense of security. A sense of security will be obtained when someone can avoid an emergency that can disrupt the life of someone from a group of people or society. By building an Android-based public security application using the Panic Button and the Haversine algorithm, the public can connect with security forces in certain locations and other related parties. The purpose of the Public Security application is to help people get help quickly, accurately, and safely. This application also displays the closest agencies in the DKI Jakarta area. Haversine is an equation in navigation by giving a large circular distance (radius) between two points on the surface of a sphere (earth) based on longitude and latitude. This Public Security application is integrated with the Google Maps API to find out the location of the user, as well as other related parties and Google Firebase as the manager of all data in the application.

Applications, Panic Button, Android, Haversine, Google Maps, Google Firebase

[1] A. Ratnasari and I. Ranggadara, COBIT 5 for Improving Production Performance using DSS Domain, Int. J. Innov. Technol. Explor. Eng., 9(4)(2020) 678–681 doi: 10.35940/ijitee.c8619.029420.
[2] A. A. B. Ruíz, “No 主観的健康感を中心とした在宅高齢者における 健康関連指標に関する共分散構造分析Title, 3(2)(2015) 54–67, [Online].Available: http://repositorio.unan.edu.ni/2986/1/5624.pdf.
[3] J. T. Santoso, M. C. Wibowo, B. Raharjo, and M. Mufadhol, Gammu and kalkun for information services and sales based on information technology, Int. J. Electr. Comput. Eng., 10(2)(2020) 2110–2116, doi: 10.11591/ijece.v10i2.pp2110-2116.
[4] BPS, Ht Tp S : // W W W . B . G, BPS, (Indonesian Stat., p. Jakarta: Badan Pusat Statistik, (2019).
[5] M. Prawira, H. T. Sukmana, V. Amrizal, and U. Rahardja, A Prototype of Android-Based Emergency Management Application, 2019 7th Int. Conf. Cyber IT Serv. Manag. CITSM (2019) doi: 10.1109/CITSM47753.2019.8965337.
[6] BPS, Statistik Kriminal 2019 Badan Pusat Statistik,1–218, (2019).
[7] E. Maria, E. Budiman, Haviluddin, and M. Taruk, Measure distance locating nearest public facilities using Haversine and Euclidean Methods, J. Phys. Conf. Ser., 1450(1)(2020) doi: 10.1088/1742-6596/1450/1/012080.
[8] N. C. Le, T. M. Nguyen, T. Truong, N. D. Nguyen, and T. Ngo, A Machine Learning Approach for Real-Time Android Malware Detection, Proc. - 2020 RIVF Int. Conf. Comput. Commun. Technol. RIVF 2020, doi: 10.1109/RIVF48685.2020.9140771. [9] M. R. Amin and M. Atiquzzaman, Behavioral Malware Detection Approaches for Android, (2016).
[10] O. Mlouki, F. Khomh, and G. Antoniol, On the Detection of Licenses Violations in the Android Ecosystem, 382–392, (2016) doi: 10.1109/saner.2016.73.
[11] P. Dauni, M. D. Firdaus, R. Asfariani, M. I. N., Saputra, A. A. Hidayat, and W. B. Zulfikar, Implementation of Haversine formula for school location tracking, J. Phys. Conf. Ser., 1402(7)(2019) doi: 10.1088/1742-6596/1402/7/077028.
[12] M. Basyir, M. Nasir, S. Suryati, and W. Mellyssa, “Determination of Nearest Emergency Service Office using Haversine Formula Based on Android Platform, Emit. Int. J. Eng. Technol., 5(2)(2018) 270–278, doi: 10.24003/emitter.v5i2.220.
[13] C. N. Alam, K. Manaf, A. R. Atmadja, and D. K. Aurum, Implementation of haversine formula for counting event visitor in the radius based on Android application, Proc. 2016 4th Int. Conf. Cyber IT Serv. Manag. CITSM (2016) 2–7,doi: 10.1109/CITSM.2016.7577575.
[14] S. D. Damayanti, M. Suryanegara, and A. P. Button, Designing A LoRa-Based Panic Button for Bali Smart Island Project, 2019 7th Int. Conf. Smart Comput. Commun., 1–5, (2019).
[15] N. G. Kalyanpad, C. K. Hanni, and K. V. K. Rao, “Mode Choice Analysis using Web-based Revealed Preference Questionnaire, Stated Preference Experiment and Google Maps API, Transp. Res. Procedia, 48(2019) 3390–3400, (2020) doi: 10.1016/j.trpro.2020.08.115.
[16] P. Adhish, K. Abhijith, and S. R. M, Adaptive Traffic Light Control using Google Maps API at Multiple Road Intersections, Int. J. Eng. Adv. Technol., 9(2)(2019) 1802–1806, doi: 10.35940/ijeat.b2356.129219.
[17] A. M. Luthfi, N. Karna, and R. Mayasari,Google maps API implementation on IOT platform for tracking an object using GPS, Proc. - 2019 IEEE Asia Pacific Conf. Wirel. Mobile, APWiMob 126–131, (2019) doi: 10.1109/APWiMob48441.2019.8964139.
[18] P. Tykal, D. Brnovik, and J. Landa, Creating a food menu application for mendel university in Brno, Acta Univ. Agric. Silvic. Mendelianae Brun., 68(1)(2020) 275–280, doi: 10.11118/actaun202068010275.
[19] A. Kumar Sharma and L. Mohan Saini, IoT based Diagnosing Myocardial Infarction through Firebase Web Application, Proc. 3rd Int. Conf. Electron. Commun. Aerosp. Technol. ICECA (2019) 190–195, doi: 10.1109/ICECA.2019.8822150.
[20] L. Goswami, Power Line Transmission through GOOGLE Firebase database, no. Icoei, 415–420, (2020).
[21] M.Nandha Kishore, A.Sridhar, S.Divakara, Advanced Security Strategy in Smart E- Voting System, SSRG International Journal of Computer Science and Engineering 2.6 (2015) 13-19.