My Project
My Project
My Project
1. INTRODUCTION
Find a Worker app is very helpful for people find suitable worker according to the
user’s needs. Users sometimes need the workers for different task. Some worker may even
possess more than one skill. When user may want more than task has to be done, finding
the worker that who having the skill to complete the task is very difficult and it may go out
of the budget of the user. In this application uses to find the suitable worker for the users
need.
The application finds the worker on the basis of the basis of the skills that user need
to accomplish the task and also perform the Multi-Skill Spatial Crowdsourcing (MS-SC)
to find the worker that who is geographically near to user. Each mobile device now a days
has GPS .So easy to know the location of the user as well as the worker.
Worker has to register first using the mobile application. Then he can add
his working location and skill that he had and also the service charge for each skill peer
day. When user needs a work to be done. Then he uses this application and select the skills
that he wants to accomplish the task, then select the location that he needs the works to be
complete. He can also quote his budget for the work and date that he require work to be
done.
Then the application process request from user and find the perfect worker for the
user. Then application list the workers that would suitable for the user. The user can select
the worker that he likes.
Maxlore specialists have a natural aptitude for technology, with over 15 years of
technology experience in the industry. With IT establishments in Kozhikode, Kochi, and
Dubai, Maxlore aims to hit the digital world market with high-quality products that provide
the best customer and user experience too. Maxlore has focused primarily on Web and
mobile technologies. Almost all our engineers are expert Laravel and Front end technology
programmers. We also have technical expertise in software deployment on cloud servers
such as Amazon, Heroku etc. We have a team of engineers who are well versed in mobile
apps development, testing and UI Design and Development.
Android is a Linux based operating system it is designed primarily for touch screen
mobile devices such as smart phones and tablet computers. The operating system have
developed a lot in last 15 years starting from black and white phones to recent smart phones
or mini computers. One of the most widely used mobile OS these days is android. The
android is software that was founded in Palo Alto of California in 2003.
The android is a powerful operating system and it supports large number of applications
in Smartphones. These applications are more comfortable and advanced for the users.
The hardware that supports android software is based on ARM architecture platform. The
android is an open source operating system means that it’s free and any one can use it.
The android has got millions of apps available that can help you managing your life one
or other way and it is available low cost in market at that reasons android is very popular.
2.3 PHP
PHP code may be embedded into HTML code, or it can be used in combination with
various web template systems, web content management systems, and web frameworks.
PHP code is usually processed by a PHP interpreter implemented as a module in the web
server or as a Common Gateway Interface (CGI) executable. The web server combines the
results of the interpreted and executed PHP code, which may be any type of data, including
images, with the generated web page. PHP code may also be executed with a command-
line interface (CLI) and can be used to implement standalone graphical applications.
The standard PHP interpreter, powered by the Zend Engine, is free software released under
the PHP License. PHP has been widely ported and can be deployed on most web servers
on almost every operating system and platform, free of charge.
It is most popular and frequently used world wide scripting language, the main
reason of popularity is; It is open source and very simple
1. Simple
It is very simple and easy to use, compare to other scripting language it is very
simple and easy, this is widely used all over the world.
2. Interpreted
It is an interpreted language, i.e. there is no need for compilation.
3. Faster
It is faster than other scripting language e.g. asp and jsp.
4. Open Source
Open source means you no need to pay for use php, you can free download and
use.
5. Platform Independent
PHP code will be run on every platform, Linux, Unix, Mac OS X, Windows.
6. Case Sensitive
PHP is case sensitive scripting language at time of variable declaration. In PHP,
all keywords (e.g. if, else, while, echo, etc.), classes, functions, and user-defined
functions are NOT case-sensitive.
7. Error Reporting
PHP have some predefined error reporting constants to generate a warning or
error notice.
8. Real-Time Access Monitoring
PHP provides access logging by creating the summary of recent accesses for the
user.
9. Loosely Typed Language
PHP supports variable usage without declaring its data type. It will be taken at the
time of the execution based on the type of data it has on its value.
2.5 HTML 5
HTML 5 (formerly spelled HTML5 is a markup language used for
structuring and presenting content on the World Wide Web. It is the fifth and current major
version of the HTML standard, and subsumes XHTML. It currently exists in two
standardized forms: HTML 5.2 Recommendation by the World Wide Web
Consortium (W3C, a broad coalition of organizations), intended primarily for Web content
developers; and HTML Living Standard by WHATWG (a small consortium of four
browser vendors), intended primarily for browser developers, though it also exists in an
abridged Web developer version. There are minor conflicts between the two groups'
specifications.
HTML 5 includes detailed processing models to encourage more
interoperable implementations; it extends, improves and rationalizes the markup available
for documents, and introduces markup and application programming interfaces (APIs) for
complex web applications. For the same reasons, HTML 5 is also a candidate for cross-
platform mobile applications, because it includes features designed with low-powered
devices in mind.
2.6 MySQL
Windows 8.1 received mixed reception, although more positive than Windows
8, with critics praising the expanded functionality available to apps in comparison to 8,
its OneDrive integration, along with its user interface tweaks and the addition of
expanded tutorials for operating the Windows 8 interface. Despite these improvements,
Windows 8.1 was still criticized for not addressing all digressions of Windows 8 (such
as a poor level of integration between Metro-style apps and the desktop interface), and
the potential privacy implications of the expanded use of online services. As of June
2017, the market share of Windows 8.1 is 6.40%.
3.SYSTEM ANALYSIS
3.1. Introduction
System analysis is an activity that encompasses most of the tasks that are called
Computer System Engineering. Analysis is a detailed study of various co-operations
performed by a system and their relationships within and outside of the system. Once
analysis is completed, the analyst has firm understanding of what is to be done. In other
words, it is a reduction of an entire by studying the various operations performed and
their relationships within the system; an examination of business activity, with a view
to identity problem areas and recommending alternative solutions. The objectives of the
system analysis are:
Identifying the need.
Analyzing the existing and proposed system.
Evaluating the feasibility study.
Perform economical and technical analysis.
Identifying the hardware and software requirements.
Allocating functions to the hardware and software.
Create a system definition.
Economic Feasibility
Technical Feasibility
Worker has to register using the android app and add their skill with service charge.
User can easily find out suitable worker without any effort. ―FIND A WORKER can
work smoothly on any android device and majority of the people are already having
their android phone. No additional hardware is needed. Therefore hardware and
facility cost can be reduced. Therefore, the system is technically feasible.
Operational Feasibility
Find A Worker has a user-friendly interface. There is no need for the user to
give a thorough training o use the application.Th app only need internet support to
search for the worker.So it is operationally feasible.
In our proposed system worker can easily register through the app and add
their skills along with their service charge. Then the user can use app and search for
the worker by entering the skills that they required and location that they wanted the
worker. The can also quote the budget of the worker and date that he needs the job
to be done.
The app will process the details and find out the suitable worker
in the criteria that the user needed.
The advantages of the proposed system are: User can easily find out the worker
that who available in nearer location .The worker will also meet his all
conditions and his service charge will also be less than the budget of the user. It
will lot of man power and lot of time for searching the worker. The app is very
simple use and user friendly
4. SYSTEM SPECIFICATION
The selection of the hardware is very important in the existence and proper functioning
of any software, when selecting hardware, the size and capacity requirements are also
important.
5. SYSTEM DESIGN
5.1 Introduction
Design is the phase that indicates the final system. It is the solution, the
translation of requirements into ways of meeting them. In this phase the following
elements were designed namely, dataflow, data stores, processes, procedures. Firstly
the logical design was done where the output, inputs and databases and procedures
was formulated in a manner that meets the project requirements. After logical design
physical construction of the system is done.
After analysing the various functions involved in the system the database and
tables are designed. Care is taken for the field name to be in self-explanatory form.
Unnecessary fields are avoided so as not to affect the storage of the system. Care must
be taken to design the input screen in the most user friendly way so as to help even
the novice users make entries approximately in the right place.
All input screens in the system are user friendly. The sizes of all the screens
are standardized. The importance of the software design can be stated with a single
word quality. Design is a place where quality is fostered in software development.
Design is the only way where requirements are actually translated into a finished
software product or system. In this project tables are create in MySQL.
The first step in the design phase is to design the database and then input and
output within predefined guidelines. Simple designs are easily understood, easily
built, and easily tested. Simplicity is the most important criteria of a design. Other
design criteria include the following.
Documentation: A good design always comes with a set of well written documents.
Testability: In a good design every requirement is testable. A design that cannot be
easily tested against its requirements is not acceptable design.
Structure: A good design presents hierarchical structure that makes logical use of
control policies among components.
Modularity: A good design is modular and exhibits the properties of high
cohesiveness and low coupling.
Discreteness: A good design separates data procedures and timing consideration to
the extent possible.
Methods for performing input validation and steps to follow when errors
occur.
Input design is a part of overall system design which requires very careful attention.
Often the collection of input data is the most expensive part of the system, in terms of
the equipment used; it is the point of most contact for the users with the computer
system; and it is prone to error. If data going into the system is incorrect, then the
processing and output will magnify these errors. Thus the designer has a number of
clear objectives in input design.
5.3 Output Design
Outputs from computer systems are required primarily to communicate the result of
processing to users or sometimes to other systems, including machine – based
systems. They are also used to provide a permanent copy of these results for later
consultation. These are various types of output required by most systems, the main
ones are:
External Outputs:
Whose destination is outside the organization and which require special attention
because they project the image of the organization.
Internal Outputs: Whose destination is within the organization and which
require careful design because they are the users’ among interface with the
computer.
Operational Outputs: Whose use is purely within the computer department,
e.g. program listings, usage statistics etc
Interactive Outputs: This involves the user in communicating directly with
the computer.
Output Definition: The outputs should be defined in terms – type of output,
content, format, location, sequence.
Normalization
Conceptual Level
This level represents the major data objects and relationship between them.
Conceptual level describes the essential feature of the system data.
Normalization
After the conceptual level, the next level of process of database design to
organize the data structure into a good shape is called Normalization. The
normalization simplifies the entries, removing the redundancies from the system data
and finally builds a data structure, which is both flexible and adaptable to the system.
There are six rules associated with normalization and are the key factors for a good
database design. The six rules are:
1NF (First Normal Form) – Each row and column must have a single value
with no repeating values.
2NF (Second Normal Form) – Each non-key column must depend on the
primary key column.
3NF (Third Normal Form) – No non-key column can depend on another non-
key column.
5NF (Fifth Normal Form) - Break all tables into the smallest possible pieces
to eliminate all redundancy within a table.
USER REGISTRATION
In order to use the app user have to register first. Then here after user only have to login
and search for the workers.
WORKER REGISTRATION
Worker has to register by specifying their location details and their skill sets
TASK ASSIGNMENT
After performing the searching user can select the worker from the filtered
worker list and assign the task to the worker
PAYMENT
After assigning the task the app will also show the amount that is has to be paid.
And also be able make the payment
FEEDBACK
User can give feedback about the app.This will helpful for the apps further
devlopment
COMPLAINT
User can give complaints about the worker to the admin. The admin can also
take the action is necessary.
5.8.1.3.Sequence Diagram
Class Diagram:
Activity Diagram
Sequence Diagram
2: FEEDBACK
Column Name Data type Constraints Description
feedback_id int(100) Primary Key Feedback Id
user_id varchar(1000) Foreign Key User id
Message varchar(9999) Not Null Message
Status of the
Status varchar(9999) Not Null
feedback
3: LOGIN
4 : PAYMENT
Column Name Data type Constraints Description
Id int(11) Primary Key Payment id
Payment
paid_date timestamp Not Null
date
work_id int(11) Foreign Key Worker id
Amount varchar(50) Not Null Amount
Payment
payment_status varchar(50) Not Null
status
5: REQUIREMENT_MASTER
6: REQUIREMENT_REG
7: SKILL_MASTER
Column Name Data Type Constraints Description
skill_id int(100) Primary Key Skill id
skill_name varchar(9999) Not Null Skill name
8 : USER
Column Name Data Type Constraints Description
user_id int(100) Primary Key User id
first_name varchar(250) Not Null First name
last_name varchar(250) Not Null Last name
Gender varchar(10) Not Null Gender
Email varchar(250) Not Null Email
phone_no varchar(15) Not Null Phone number
house_name varchar(250) Not Null House name
Latitude varchar(9999) Not Null Latitude
Longitude varchar(250) Not Null Longitude
Password Varchar(250) Not Null Password
9: WORKER_REG
Column Name Data Type Constraint Description
worker_id int(100) Primary Key Worker id
first_name varchar(250) Not Null First name
last_name varchar(250) Not Null Last name
Gender varchar(250) Not Null Gender
Email varchar(250) Not Null Email
phone_no varchar(250) Not Null Phone number
house_name varchar(250) Not Null House name
Latitude varchar(9999) Not Null Latitude
longitude varchar(9999) Not Null Longitude
Password varchar(9999) Not Null Password
6. SYSTEM TESTING
6.1. Introduction
Testing is the process of executing a program with the intent of finding any
errors. Testing is vital to the success of the system. Without proper testing, hide errors
will surface after sometime of use and perhaps irreversible damage has been done to
valuable data. A series of tests like responsiveness, its value, stress and security are
performed before the system is ready for user acceptance testing. System testing follows
the logical conclusion that is all the part of the system are tested and found to be
working properly under all kinds of situations, and then the system is achieving its goal
of processing the data perfectly according to user rules and requirements. System
testing is aimed at ensuring the system works accurately before live operation
commences. Testing is vital to the system. System testing makes a logical assumption
that if all parts of the system are correct, the goal will be successfully achieved. The
candidate system is subjected to a verity of tests: Online Response, Volume, Stress
Recovery & Security and usable tests. A series of testing are performed for the proposed
system before the system is ready for user acceptance testing. Nothing is complete
without testing, as it is vital success of the system.
Types of Testing
The testing process contains.
Unit Testing
Black Box Testing
White Box testing
Integration Testing
Validation Testing
Alpha Testing
Beta Testing
6.2. Unit Testing
Unit testing focuses verification effort on the smallest unit of software designs
the module.To check whether each module in the software works properly so that it
gives desired outputs to the given inputs. All validations and conditions are tested in
the module level in the unit test.Control paths are tested to ensure the information
properly flows into, and out of the program unit and out of the program unit under
test. Boundary condition is tested to ensure that the modules operate at boundaries.
All independent paths through the control structure ensure that all statements in a
module have been executed at least once.
In our project each modules are separated tested. That is the user correctly enters
his personal details. The code is exercised with a nominal input values for which the
expected results are shown, as well as boundary values (minimum values, maximum
values) and values on and just outside the functional boundaries and special values such
as logically related inputs.
6.2.1. Black Box Testing
This testing method focuses on the functional requirements of the software. It
attempts to find out the error of the following categories such as incorrect and missing
functions, interface error, error in data structure, performance error and initialization
and termination errors.
Black Box testing of this software it is seen that all the Java Script functions are
working properly.
6.2.2. White Box Testing
This testing method is also called path testing. It is a test case design method
that uses the control structure of the procedural design to drive test cases. In this
system, Unit testing has been successfully handled. The test data was given to each
and every module in all respects and got the desired output. Each module has been
tested found working properly.
Test Case: Invalid Username or User Id both are entered as the login.
Result: Displays Invalid Username, Please try again in the same page.
6.3. Integration Testing
Integration testing is a systematic technique for constructing the program
structure while at the same time conducting test to uncover errors associated with
interfacing. That is, integration testing is the complete testing of the set of modules,
which makes up the products. The objectives are to take untested modules and build a
program structure that has been dictated by design as integration testing is conducted,
the tester should identify the critical modules.
One approach is to wait all the units have passed the testing, and then combine
them and then tested. Another strategy is to construct the product is increments of tested
units. A small set of modules are integrated together and tested, to which another
module is added and tested in combination and so on. The advantage of this approach
is that, interface dispenses can be easily found and corrected. Testing is completed when
the last module is integrated and testing. Two types of integration testing.
Top-down Integration: This method is an incremental approach to the
construction of program structure. Modules are integrated by moving downward
through the control hierarchy, beginning with the main program module. The
modules subordinates to the main program module are incorporated into the
structure in either a depth first or breadth first manner.
Test Case: To perform the Login operation checks the Username and Password.
Results: if the user given a valid username and password, system will be show user’s
home page.
Bottom-up Integration: This method begins the construction and testing with
the modules at the lowest level in the program structure. Since the modules are
integrated from the bottom-up, processing required for modules subordinates to
a given level is always available and the need for the stubs is eliminated.
6.4. Validation Testing
At the culmination of integration testing, software is completely assembled as a
package, interfacing errors have been uncovered and corrected, and validation testing
may begin. Validation succeeds when the software function in a, manner that can be
reasonably expected by customer.
Software validation is achieved through a series of black box tests that
demonstratesconformity with requirements. A test plan outlines the classes of tests to
be conducted and a test procedure defines specifies test cases that will be used to
demonstrate conformity with requirements. Both the plan and procedure designed to
ensure that all functional requirements are achieved, documentation is correct and
human-engineered, and other requirements are met.
Validation testing was done by inputting dummy data to ensure that software
developed is satisfied all the requirements of the user. A test case is a set of data that
the system will process as normal input. However, the data are created with the intent
of determining whether the system will process them correctly.
In our project we check the valid are entered or not. If any invalid data are
entered then print an error message to re-enter.
TEST CASES
Project Title : Find A Worker
Software Tool :Manual
7. SYSTEM IMPLEMENTATION
7.1. Introduction
System implementation is the final phase i.e., putting the utility into action.
Implementation is the state in the project where theoretical design turned into working
system. The most crucial stage is achieving a new successful system and giving
confidence in new system that it will work efficiently and effectively. The system is
implemented only after through checking is done. It involves careful planning,
investigation of the current system and constraints on implementation, design of
methods to achieve. Implementation is the stage of the project where the theoretical
design is turn into a working system. The implementation stage is a system project in
its own right. It involves careful planning, investigation of the current system and
constraints on implementation, design of methods to achieve the change over and the
evolution method. Once the planning has been completed the major effort is to ensure
that the programs in the system are working properly. At the same time concentrate on
training user staff.
Implementation phase is an important one in which the source code put into the
operation.Before implementing the software careful documentation is necessary.
Implementation should provide with well-defined software requirements, design
specifications. The major milestone for project implementation is successful integration
of software components in the functioning system. During the implementation the
configuration management and quality assurance of requirements design specification
and source code are performed.
7.2. Training
The purpose of the training is to ensure that all the personnel who are to be
associated with the computer based business system possesses the necessary knowledge
skills.
Training is done in two ways, user training and system operator training.
User training:
In properly management system give training for entering their details. That is
user and property details and provides training for giving options.
Corrective Maintenance
Adaptive Maintenance
Prefecture Maintenance
Reverse Maintenance
Re engineering
The staff in the concern are placed each and every level of the project. So they
don’t need any training of the software. During the development process they sit and
entered each and every entry to test the project. They themselves used this is an
opportunity to take training in the software so extra training is not needed for the user.
8. SYSTEM EVALUATION
The options or facilities that have been included in the system are user friendly
and up to the mark. The burden of the user’s in search of a worker have been reduced
to a great extends. The main advantage of the software being that it can be reconstructed
as of desired format for the requirement rises from time to time. This makes it
beneficiary not to think about a second one at a later stage. As a whole can be concluded
that the system has met the developing needs of the user to a great extent. Various
approaches of system evaluation that have been carried out to maintain the system
performance are as follows.
Quality assurance review.
Compliance audits
Budget performance review.
User attitude survey.
Cost benefits analysis.
9. CONCLUSION
The software which developed was implemented and tested with real data and
were found to be error free. Also, it is found that the system will work successfully. I
tried to make the system maximum user friendly. Security is the main consideration in
this project. The system is protected from any unauthorized access by giving username
and password during login process. All the necessary validations are carry out in the
project, so that any kind of users can make use of this software and necessary messages
makes them conscious of the error that have made.
The software is developed with scalability in mind. Additional modules can be
easily added if necessary. The software is developed with modular approach. All
modules in the system have been tested with valid data and everything worked
successfully. Thus the system has fulfilled all the objectives identified and is able to
replace the existing system.
10. APPENDIX
10.1. Appendix A
10.1.1. Sample Source Code / Pseudo Code
10.1.1.1 Searching
function filter_worker($skills,$lat,$lng,$date,$budget){
sort($skills);
if(sizeof($skills) > 0){
$r_skills = implode(",",$skills);
$append = array();
foreach ($skills as $key => $skill) {
array_push($append,"find_in_set('{$skill}',skill_ids) > 0");
}
$qry = implode(" and ", $append);
$q = "SELECT *
FROM (SELECT * FROM (SELECT * , ( 3959 * ACOS( COS( RADIANS( $_SESSION[‘lat’]
) ) * COS( RADIANS(latitude ) )*
COS( RADIANS( longitude ) - RADIANS($_SESSION[‘lng’] ) ) + SIN(
RADIANS($_SESSION[‘lat’] ) ) * SIN( RADIANS( latitude)
) ) ) AS distanceFROM (SELECT * , GROUP_CONCAT( DISTINCT skill_idORDER BY
skill_id ASC ) AS skill_ids, SUM
( service_charge ) AS totalFROM (SELECT * FROM worker_reg INNER JOIN worker_skill
USING ( worker_id ) WHERE
skill_id IN ( $r_skills ) )temp1GROUP BY worker_id)temp2 WHERE $qry)temp3 WHERE
worker_id NOT IN
(SELECT worker_id FROM work_assign WHERE (DATE = '$date'))ORDER BY distance ASC
, total ASC)temp4
WHERE distance <20 AND total <=$budget";
$workers = select($q);
}else{
$workers = array();
}
return $workers;}
if(isset($_GET['action'])){
extract($_GET);
$worker = array();
if($action == 'add_filter_skill'){
if(!isset($_SESSION['filter_skills'])){
$_SESSION['filter_skills'] = array();
$_SESSION['date'] = '';
$_SESSION['budget'] = '';
$_SESSION['lat'] = '';
$_SESSION['lng'] = ''; }
$_SESSION['filter_skills']=explode(",", $skill_id);
if(!(in_array($skill_id, $_SESSION['filter_skills']))){
array_push($_SESSION['filter_skills'],$skill_id);}
$_SESSION['date'] = $date;
$_SESSION['budget'] = $budget;
$_SESSION['lat'] = $lan;
$_SESSION['lng'] = $lon;
}
$response=array();
$data["val"]=array();
foreach ($workers as $key => $row) {
}
echo json_encode($data);
if (arr.length() > 0) {
Log.v("++++++++", arr.length()+" : Len");
for (int i = 0; i < arr.length(); i++) {
Log.v("++++++++", arr.getJSONObject(i).getString("workerid") +
arr.getJSONObject(i).getString("name"));
String temp=arr.getJSONObject(i).getString("name");
String temp1=arr.getJSONObject(i).getString("total");
amount.add(temp1);
worker.add(temp);
}
}
} catch (JSONException e) {
e.printStackTrace();
}
return null;
}
protected void onPostExecute(String s) {
super.onPostExecute(s);
li.setAdapter(new ArrayAdapter<String>(getContext(),
android.R.layout.simple_list_item_1, worker));
pDialog.dismiss();
}
}
10.1.1.3 Registration
<?php
include '../db_conn.php';
$response = array();
if (isset($_POST['type'])) {
$fname=$_POST['fname'];
$lname=$_POST['lname'];
$type=$_POST['type'];
$email=$_POST['email'];
$phone=$_POST['phone'];
$home=$_POST['house'];
$dist=$_POST['dist'];
$longi=$_POST['longitude'];
$lati=$_POST['latitude'];
$password=$_POST['pass'];
$gen=$_POST['gend'];
if($type=="WORKER"){
else{
$result = mysqli_query($con,"INSERT INTO
user(first_name,last_name,gender,email,phone_no,house_name,district,latitude,longitude,pass
word) VALUES('$fname',
'$lname','$gen','$email','$phone','$home','$dist','$lati','$longi','$password')");
// check if row inserted or not
if ($result) {
// successfully inserted into database
$response["success"] = 1;
$response["message"] = "Product successfully created.";
echo json_encode($response);
}
}
// echoing JSON response
echo json_encode($response);
}
?>
@Override
protected void onPreExecute() {
super.onPreExecute();
pDialog = new ProgressDialog(Register.this);
pDialog.setMessage("Registering..");
pDialog.setIndeterminate(false);
pDialog.setCancelable(true);
pDialog.show();
}
runOnUiThread(new Runnable() {
@Override
public void run() {
Toast.makeText(getApplicationContext(),"Success",Toast.LENGTH_SHORT).show();
}
});
Intent i = new Intent(getApplicationContext(), Login.class);
startActivity(i);
finish();
} else {
}
} catch (JSONException e) {
e.printStackTrace();
}
return null;
}
10.1.1.5 Location
10.2. Appendix B
10.3. Appendix C
10.3.1. ACRONYMS
PHP : Hypertext Preprocessor
HTML : Hypertext Markup Language
GUI : Graphical User Interface
CSS : Cascade Style Sheet
SQL : Structured Query Language
MS-SC :MultiSkill Spatial Crowdsourcing
CLI : command-line interface
10.3.2. BIBLIOGRAPHY
[3]. https://www.androidhive.info/2012/05/how-to-connect-android-with-php-mysql/
[4]. https://www.androidtutorialpoint.com/material-design/
[5]. https://developers.google.com/android/
[6]. http://www.php.net/
[7]. http://php.net/manual/en/intro-whatis.php
[8]. https://www.tutorialspoint.com/sql/
[9]. https://startbootstrap.com/template-categories/all/