Share This Article:

Kids’ Tracker: An Android Application for Tracking Children

Abstract Full-Text HTML XML Download Download as PDF (Size:2931KB) PP. 907-924
DOI: 10.4236/jsea.2017.1013052    374 Downloads   1,009 Views   Citations

ABSTRACT

Smart phones with unlimited applications are considered essential for modern day lifestyle, hence the number of cell phone users has sky rocketed in this decade. The high percentage of children and teenagers carrying cell phones has caused controversy on how justified having a minor carrying a communication device is. There is no doubt about the fact that parents have to be able to contact their children, however, a child with a phone and poor judgment will most probably be vulnerable to the outer world with all its’ threats and abuses. Furthermore, we have the serious health issues related to wireless devices effects on people, under those circumstances multiple solutions have been presented for a safe secure method for parents to track their children without the need of cell phones. The proposed alternatives included phones with limited privileges for children; these phones are restricted to the ability of calling specific people only and have already installed applications for tracking location. Our proposed system “kids’ tracker” includes a wearable device for the child and an Android application on the parents’ smart phone. Kids’ tracker has shown a very decent performance with many unique features compared to other existing solutions.

1. Introduction

Mobile phones have changed our lives drastically, making individuals reachable constantly and giving new types of correspondence like informing and video calls [1] - [11] . It is very grand how these phones have changed in the previous couple of years, beginning off from being a science fiction dream to turning into a basic piece of present day way of life claimed by the greater part of people worldwide [12] - [21] . A smart phone is a mobile phone with more advanced computing capabilities and connectivity features [22] - [32] . IBM presented The first smart phone 1992 [33] . It had a plethora of features including a calendar, address book, calculator, email service, and even a touch screen. Early smart phones typically combined the characteristics of a mobile phone with those of other popular consumer device, such as a media player, a digital camera, and/or a Global Positioning System (GPS) navigation unit. Nowadays, smart phones expanded to include all of those services in addition to a touch screen, web browsing, Wi-Fi, 3rd-party applications, and many others [34] .

As a result of all the features included in them, smart phones can act as portable computers with their operating systems and have the ability to run most computer programs efficiently. Moreover, the application stores that are provided by different smart phones manufacturers can be used to install thousands of different useful applications which cover a very wide range of uses including weather forecasting, chatting, latest news, editing photographs, online shopping and others [35] . Based on that, it is not a surprise that the number of smart phone users surpassed desktop users in 2014 [36] .

Smart phones have become an essential part of human life including children and teenagers. However, allowing a child to carry a smart phone with internet access has created a controversy about how convenient or necessary it is compared to the risks [37] . On one hand, having mobile phones allows children to be connected and reachable at all the times by their parents who find that very useful and of course necessary [38] . However, most experts warn about the dark side of children’s use of mobile phones which may negatively affect their morals and social values. For instance, these devices open them to an unsupervised virtual world with media materials that might be age inappropriate. Also, children using social networks might be misused by child abusers and criminals who can be a genuine risk for kids [39] . In addition to that, mobile phones are related to many health problems both mentally and physically which are even more dangerous for younger users according to multiple researches [40] . Studies recommend that mobile phones should not be given to children below sixteen years old because their brains are not able to resist the effects of mobile radiation since the tissues in the brain and body are still developing. These radiations can cause damage due to absorption of radiation as shown in Figure 1 [41] .

Figure 1. Demonstration of mobile phone radiation impact on the brain for different ages [41] [42] .

Nowadays, most parents use mobile phones to track their children by giving them mobile phones and keep contacting them through phone calls. However, from the aforementioned reasons, this approach comes with multiple negative effects. Consequently, there is a need for an alternative approach which must be safe and trusted.

The points mentioned above inspired us to present kids’ tracker that provides a safe and efficient solution for parents who want to keep track of their children location without giving them mobile phones. The proposed approach provides the child with a wearable device which sends continuous signals to the parent’s phone. These signals can be converted to detailed meaningful information about the child’s location and his/her movements through a simple yet efficient application.

The rest of this paper is organized as follows. Section 2 describes the proposed system and compares it to a number of similar systems. Section 3 introduces the system’s design and interface besides describing main hardware components and software tools. Sections 4 presents the implementation and testing process through a number of output screen samples. Finally, Section 5 presents our conclusions.

2. Kid’s Tracker and Related Work

Our proposed work, kids’ tracker, presents a product that helps parents to keep track of their children without the need to give them mobile phones. In this scenario, the child wears a tracking device like a bracelet which is coupled with the parents’ smart phone through an easy to use Android application. The parent can sign in to his account which is given by the service provider to track his children through different types of notifications. A periodic notification is sent to the parent with the current location of the child. The parent can also access a history record of the child’s movement that covers up to the last seven days.

The parent can create his/her own regions for locations where the child is expected to be in certain days and hours like home or school. If the child is in the defined region at the expected day and time, the region name is colored in green (green zone). However, if the child is in the defined region but out of the expected day and time, the region is colored in gray (gray zone). Finally, if the child is in an undefined location, the red color is used for this location (red zone). As soon as a child enters a red or a gray zone, an instant alert notification is sent to the user so that a proper action is done. The GPS in the child’s wearable device sends signals to a main server every 5 seconds, nonetheless periodic notifications are sent every 60 minutes by default to the parent, who can change the time between notifications as desired. Figure 2 shows the system response for different cases to switch between zones and the corresponding notification to each case.

A number of different existing solutions were presented to allow parents to track their children. Life 360 Tracker [43] is a full software solution that makes it

Figure 2. Switching between the three types of zones and the actions related to these changes.

easy to keep track of the location of participating family members as shown in Figure 3. A circle of friends or family members is established so they can keep track of each other’s current or past locations through application messages. Unlike kids’ tracker, this app is more dedicated for adult users than tracking children due to the following:

1) Life 360 requires all users to have smart phones which brings us back to the problem of a child having a cell phone.

2) Life 360 tracking process requires approval from both sides which is not suitable for a parent/child scenario.

Alert notifications are not available due to lacking the ability of creating zones or flags on dangerous locations.

On the other hand, TRAX is considered to be a GPS tracker for children and pets [45] . In TRAX, a smart device works in conjunction with an application on the smart phone allowing the user to locate children or pets anytime [45] . Figure 4 shows an example of a tracking process done by TRAX which is an efficient and popular product with noticeable features that can be compared to kids’ tracker as follows:

1) Both TRAX and Kids’ tracker have a hardware device for the child and a smart phone application for the parent to locate the child who should not use a phone.

2) Both systems only send alert notifications when the child leaves or enters a defined zone. However kids’ tracker has a remarkable additional feature which is

Figure 3. Life 360 map [44] .

sending periodic notifications in different rates based on the parent needs.

3) While TRAX uses the official names of addresses such as street name and building number, kids’ tracker allows the parent to give them personal meaningful names like grandfather house or school.

4) TRAX has 24 hour history view whereas kids’ tracker has seven days.

5) TRAX can create safe zones compared to the more detailed three types of zones system in kids’ tracker.

Figure 4. TRAX map screen [46] .

The Last few years have witnessed the appearance of multiple other applications and devices which can be used for tracking friends, pets, old people, and of course children. Lassy project [47] , for example, sends a picture of a lost child along with a real time map which shows the coordinates of his/her last known location. This allows every user of the application to look for him/her [48] . Although it is free to download and has a noble aim, it can create a major threat by allowing some people with sick interests to get information about lost children which raises privacy and safety issues.

Another application is FBI Child ID [49] which was created by the Federal Bureau of Investigation. This application lets parents store their children’s photos plus other identification (height, weight, hair and eye color, age) for quick access if a child ever goes missing. The information is stored on the Phone only until parents need to send it to authorities. Notable features include safety tips, checklists for what to do if something happens to your child, and shortcuts to dial 911 or the National Center for Missing and Exploited Children. Parents also have the ability to email info immediately to law enforcement agencies if the unthinkable occurs [50] .

3. System Design and Interface

Figure 5 shows the proposed system design which consists of three parts: 1) a server for the service provider where the database of users is stored, 2) a wearable device for the child to be tracked, and 3) a smart phone on the parent side to login to the application and track the child. The server interacts with the other two parts as follows: it receives location information from the wearable device and exchanges data from and to the parent’s smart phone as the figure shows.

The child’s device consists of a Raspberry Pi (RPI) with Global Positioning System (GPS) unit and an antenna for sending continuous signals to the server. The Raspberry Pi is a credit card sized single board PC as appears in Figure 6. The GPS is a space-based satellite route navigation system that gives area and time data in all climate conditions, anywhere on or close to the earth where there is an unhampered line to at least four GPS satellites [51] . Furthermore, different software instruments and programming languages are utilised as a part of our work, for instance Raspbian which is a free operating system based on Debian/Linux that is optimised for the Raspberry Pi hardware [52] . We likewise used Python programming language which is a broadly used general-purpose high-level programming language.

Figure 5. Kids’ tracker system design.

Figure 6. Raspberry pi board [53] .

On the other side, the main server holds a database with full detailed information about parents and their children. The database is modified by periodic signals transmitted from the wearable devices to the server. Then accordingly, the server sends different notifications to the smart phone on the parent side with updated information about their children’s locations. Moreover, the parent can update his/her settings and information in the database through the application interfaces, and can check the history record for the child’s previous movements and current location at any time without the need to wait for notifications.

The data that is read from GPS contains repeated readings which can be represented in different formats. In this paper, only one format is used. In kids’ tracker, GPGGA is the format used by server to find locations then store them into the database [54] . For illustration, the GPGGA reading given below in Figure 7 and the meanings of its elements is shown in Table 1.

The parent side is an Android based smart phone. The main hardware platform for Android is the ARM architecture with x86 and MIPS architectures [55] . Since 2012, Android devices with Intel processors began to be commercially produced in the form of smart phones and computer tablets [56] . Android is considered an open-source operating system that is based on Linux and it is created basically to be installed in mobile phones and tablets [57] . On the other hand, Android applications are usually developed in Java programming language using the Android Software Development Kit, but other development tools are also available.

In the parent side Android application, a background service sends a periodic “get region” request to the server every 5 seconds. The server replies to that request by posting the current region of the child after the server has done the required calculations to determine the type of this region and update the marker

Figure 7. GPGGA reading sample.

Table 1. Description of the data items in GPGGA format [50] .

on the map and region fragment with a new position. Moreover, the status fragment with the name of current region will be colored according to the zone, and the last checked time will be also updated.

4. Implementation and Testing

The application’s Android interface is simple to use and efficient. Kids trackers’ main screen contains a menu list in the shape of a slide menu that is shown in Figure 8. It has 6 options for the main window including: status, map, regions, history, settings and logout. Each option has a specific task as will be shown soon. The user clicks the desired option to move to its’ related window. Using kids’ tracker starts with a simple login process with a user name and password.

A successful login will lead to a status window by default. The window contains the name of the current region for a child as it is named by the parent, and colored by the type of zone. It also shows the time of last notification. In the first login to an account, the status window will be empty until the user defines the regions for the child. The information that is displayed in the status window is updated every 5 seconds, and that is done by the background service which continuously sends a “get region” request to the server. Figure 9 shows a status window with the current region of a child colored in gray which indicates that this is not the expected region at this time of the day as defined by the parents (gray zone).

The map window displays the current location of the child in a graphical form on a Google map and a marker pin represents the location as shown in Figure 10. The map has specific details of the location including the street name in

Figure 8. Menu list window.

Figure 9. Current region of the child in status window.

Figure 10. Current child location marked on map.

order to help parents in finding out where their child is.

Regions window enables the user to add, edit and delete regions. In addition to that, it allows showing the child’s current region on map with a personalized name defined by the parent such as school or grandparents’ house instead of the general street name in maps. Figure 11 represents a sample of the regions window showing that the child is currently in the school region as defined by the parent compared to Figure 10 which shows the same location as a Google map name.

To add a new region the parent has to assign the required location on the map window then double click Regions on the menu and a dialogue box will appear as shown in Figure 12. The parent has to fill the name of the new region, and then set the days and time slots in which it is fine for the child to exist in it as a green zone. The radius of the new region has to be also set with a maximum value of 500 meters. To edit or delete an existing region, the user can double touch a defined region then select from the dialogue box options to either delete the region with all its details or to edit and change its related information.

The History window provides a very useful feature for the parent to see the child’s movements’ history record, labeled by the main events such as changing regions of existence. The history record can be modified to cover a number of days between one and seven with recommended period of seven days which is the default.

Figure 13 shows a sample of a child’s movement’s record for one day along with the visited regions. As we can observe, the child was at home at the beginning of the day (00:00 military time) as expected by the parent. Consequently,

Figure 11. Current region of the child with school region shown.

Figure 12. Add a new region box.

Figure 13. History record shows the regions that were visited by the child in one day.

the zone name home appears in green (green zone). However, around 17:25 the child left home and stayed less than an hour in a region that is undefined by the parent, therefore, it appears in red (red zone). Finally, the child reached the school which is a defined region; however, as the time of existence is out of the expected hours for the child for this region, it appears in gray (gray zone).

The settings window enables the user to choose the type of notifications to receive; either periodic notifications or alert notifications or both. Moreover, a deactivation option stops all notifications and updates which may be useful if the user is with the child and there is no need to track the location. Finally, Kid name allows giving a real name for the child instead of the default “kid” word used in maps and notifications. Figure 14 shows the settings dialogue and its provided features.

Figure 14. Settings dialogue box.

The last option on the menu is log out and it is used to exit the current account in case the user does not need to use the application. This means turning off background service which is responsible for regularly seeking the current region. Therefore, no notification would be received. When logging in again, the parent can get the history for the logging out period.

If alert notifications are enabled and the child is out of the defined region for the current day and time, the parent will receive an urgent instant notification. Furthermore, when the user opens the notification message, the current location of the child is updated and shown. Alert notifications will keep reaching the parent every 3 and 7 minutes for red and gray regions respectively. Figure 15 shows an alert notification for an undefined region which is considered a red zone.

On the other hand, if the child is in his correct region and a periodic notification option is enabled, the parent will receive a periodic notification every 60 minutes as long as the child remains in the green zone as shown in Figure 16.

5. Conclusion

We built a kids’ tracker system that allows the parents to track the location of their children without the risks related to a child having a cell phone. The proposed system includes a wearable small device for the child that contacts a main system server which in turn is connected to the parent’s smart phone through a

Figure 15. Alert notification for a red zone.

Figure 16. Periodic notification.

simple yet flexible and efficient application. The application allows the user to define the regions where the child is expected to be in different days and at specific hours. The system sends regular notifications to the user with the child’s location, in addition to alert notifications when entering an unauthorized region. Moreover, different week days have different region settings and the user can track back the child’s movement’s history for several days. As a future work, we plan to enhance both the battery life of the wearable device and to reduce its size even more besides adding additional tracking options to make the system richer and more useful.

Conflicts of Interest

The authors declare no conflicts of interest.

Cite this paper

Sweidan, S. , Saifan, R. , Darabkh, K. , Abu-Kaff, S. and Al-Ali, S. (2017) Kids’ Tracker: An Android Application for Tracking Children. Journal of Software Engineering and Applications, 10, 907-924. doi: 10.4236/jsea.2017.1013052.

References

[1] Al-Mistarihi, M.F., Mohaisen, R., Sharaqa, A., Shurman, M.M. and Darabkh, K.A. (2015) Performance Evaluation of Multiuser Diversity in Multiuser Two-Hop Cooperative Multi-Relay Wireless Networks using MRC over Rayleigh Fading Channels. International Journal of Communication Systems, 28, 71-90.
https://doi.org/10.1002/dac.2640
[2] Darabkh, K.A., Awad, A.M. and Khalifeh, A.F. (2015) New Video Discarding Policies for Improving UDP Performance over Wired/Wireless Networks. International Journal of Network Management, 25, 181-202.
https://doi.org/10.1002/nem.1888
[3] Khalifeh, A., Darabkh, K.A. and Kamel, A. (2012) Performance Evaluation of Voice-Controlled Online Systems. Proceedings of IEEE/SSD’12 Multi-Conference on Systems, Signals and Devices, Chemnitz, Germany, March 2012, 1-6.
https://doi.org/10.1109/SSD.2012.6198087
[4] Darabkh, K.A., Awad, A.M. and Khalifeh, A.F. (2014) Efficient PFD-Based Networking and Buffering Models for Improving Video Quality over Congested Links. Wireless Personal Communications, 79, 293-320.
https://doi.org/10.1007/s11277-014-1857-1
[5] Al-Zubi, R., Hawa, M., Al-Sukkar, G. and Darabkh, K.A. (2014) Markov-Based Distributed Approach For Mitigating Self-Coexistence Problem in IEEE 802.22 WRANs. The Computer Journal, 57, 1765-1775.
https://doi.org/10.1093/comjnl/bxt092
[6] Darabkh, K.A., Al-Maaitah, N.J., Jafar, I.F. and Khalifeh, A.F. (2017) A Novel Energy-aware Clustering and Routing Protocol in Wireless Sensor Networks. Computers and Electrical Engineering, in Press.
https://doi.org/10.1016/j.compeleceng.2017.11.017
[7] Darabkh, K.A. and Aygun, R.S. (2006) Quality of Service Evaluation of Error Control for TCP/IP-Based Systems in Packet Switching ATM Networks. Proceedings of 2006 International Conference on Internet Computing (ICOMP’06), Las Vegas, Nevada, June 2006, 243-248.
[8] Darabkh, K.A., Al-Rawashdeh, W.S., Al-Zubi, R.T. and Alnabelsi, S.H. (2017) C-DTB-CHR: Centralized Density- and Threshold-based Cluster Head Replacement Protocols for Wireless Sensor Networks. Journal of Supercomputing, 73, 5332-5353.
https://doi.org/10.1007/s11227-017-2089-4
[9] Ismail, S.S., Al, Khader, A.I. and Darabkh, K.A. (2015) Static Clustering for Target Tracking in Wireless Sensor Networks. Global Journal on Technology (Selected Paper of COMENG-2014), 8, 167-173.
[10] Darabkh, K.A., Abu-Jaradeh, B. and Jafar, I. (2011) Incorporating Automatic Repeat Request and Thresholds with Variable Complexity Decoding Algorithms over Wireless Networks: Queuing Analysis. IET Communications, 5, 1377-1393.
https://doi.org/10.1049/iet-com.2010.0698
[11] Darabkh, K.A. (2011) Evaluation of Channel Adaptive Access Point System with Fano Decoding. International Journal of Computer Mathematics, 88, 916-937.
https://doi.org/10.1080/00207160.2010.485249
[12] Shurman, M., Awad, N., Al-Mistarihi, M.F. and Darabkh, K.A. (2014) LEACH Enhancements for Wireless Sensor Networks Based on Energy Model. Proceedings of the 2014 IEEE International Multi-Conference on Systems, Signals & Devices, Conference on Communication & Signal Processing, Castelldefels-Barcelona, Spain, February 2014, 1-4.
https://doi.org/10.1109/SSD.2014.6808823
[13] Darabkh, K.A. (2010) Queuing Analysis and Simulation of Wireless Access and End Point Systems Using Fano Decoding. Journal of Communications, 5, 551-561.
https://doi.org/10.4304/jcm.5.7.551-561
[14] Hawa, M., Darabkh, K.A., Al-Zubi, R. and Al-Sukkar, G. (2016) A Self-Learning MAC Protocol for Energy Harvesting and Spectrum Access in Cognitive Radio Sensor Networks. Journal of Sensors, 2016, Article ID: 9604526, 1-18.
[15] Darabkh, K.A., Albtoush, W.Y. and Jafar, I.F. (2017) Improved Clustering Algorithms for Target Tracking in Wireless Sensor Networks. Journal of Supercomputing, 73, 1952-1977.
https://doi.org/10.1007/s11227-016-1898-1
[16] Darabkh, K.A. and Aygun, R. (2011) Improving UDP Performance Using Intermediate QoD-aware Hop System for Wired/Wireless Multimedia Communication Systems. International Journal of Network Management, 21, 432-454.
[17] Al-Zubi, R., Krunz, M., Al-Sukkar, G., Hawa, M. and Darabkh, K.A. (2014) Packet Recycling and Delayed ACK for Improving the Performance of TCP over MANETs. Wireless Personal Communications, 75, 943-963.
https://doi.org/10.1007/s11277-013-1401-8
[18] Darabkh, K.A. and Aygun, R.S. (2006) Performance Evaluation of Sequential Decoding System for UDP-Based Systems for Wireless Multimedia Networks. Proceedings of 2006 International Conference on Wireless Networks (ICWN'06), Las Vegas, Nevada, June 2006, 365-371.
[19] Darabkh, K.A. and Aygun, R.S. (2006) Quality of Service and Performance Evaluation of Congestion Control for Multimedia Networking. Proceedings of 2006 International Conference on Internet Computing (ICOMP'06), Las Vegas, Nevada, June 2006, 217-223.
[20] Darabkh, K.A., Ibeid, H., Jafar, I.F. and Al-Zubi, R.T. (2016) A Generic Buffer Occupancy Expression for Stop-and-Wait Hybrid Automatic Repeat Request Protocol over Unstable Channels. Telecommunication Systems, 63, 205-221.
https://doi.org/10.1007/s11235-015-0115-5
[21] Shurman, M., Al-Mistarihi, M. and Darabkh, K. (2013) Merging Dynamic Address Autoconfiguration and Security Key Protocols in Mobile Ad Hoc Networks. Proceedings of 36th IEEE International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO 2013), Opatija, Croatia, May 2013, 441-445.
[22] Darabkh, K.A. (2017) Fast and Upper Bounded Fano Decoding Algorithm: Queuing Analysis. Transactions on Emerging Telecommunications Technologies, 28, 1-12.
https://doi.org/10.1002/ett.2929
[23] Darabkh, K.A. and Alsukour, O. (2015) Novel Protocols for Improving the Performance of ODMRP and EODMRP over Mobile Ad hoc Networks. International Journal of Distributed Sensor Networks, 2015, Article ID: 348967, 1-18.
[24] Al-Dhamari, A.K. and Darabkh, K.A. (2017) Block-Based Steganographic Algorithm Using Modulus Function and Pixel-Value Differencing. Journal of Software Engineering and Applications, 10, 56-77.
https://doi.org/10.4236/jsea.2017.101004
[25] Darabkh, K.A., Khalifeh, A., Naser, M. and Al-Qaralleh, E. (2012) New Arriving Process for Convolutional Codes with Adaptive Behavior. Proceedings of IEEE/SSD’12 Multi-Conference on Systems, Signals, and Devices, Chemnitz, Germany, 20-23 March 2012, 1-6.
https://doi.org/10.1109/SSD.2012.6198002
[26] Darabkh, K.A. and Abu-Jaradeh, B. (2010) Bounded Fano Decoders over Intermediate Hops Excluding Packet Retransmission. Proceedings of IEEE 24th International Conference on Advanced Information Networking and Applications (AINA 2010), Perth, Australia, 20-23 April 2010, 299-303.
https://doi.org/10.1109/AINA.2010.141
[27] Shurman, M.M., Al-Mistarihi, M.F. and Darabkh, K.A. Dynamic Distribution of Security Keys and IP Addresses Coalition Protocol for Mobile Ad Hoc Networks. Automatika - Journal for Control, Measurement, Electronics, Computing and Communications, in press.
[28] Darabkh, K.A. and Abu-Jaradeh, B. (2016) Buffering Study over Intermediate Hops including Packet Retransmission. Proceedings of IEEE International Conference on Multimedia Computing and Information Technology (MCIT-2010), Sharjah, 2-4 March 2010, 45-48.
[29] Darabkh, K.A. and Pan, W.D. (2006) Queueing Simulation for Fano Decoders with Finite Buffer Capacity. Proceedings of the 9th Communications and Networking Simulation Symposium Conference (CNSS’06), Huntsville, Alabama, April 2006.
[30] Darabkh, K.A., Jafar, I.F., Al-Zubi, R.T. and Hawa, M. (2015) A New Image Steganographic Approach for Secure Communication Based on LSB Replacement Method. Information Technology and Control, 44, 315-328.
[31] Darabkh, K.A., Al-Dhamari, A.K. and Jafar, I.F. (2017) A New Steganographic Algorithm Based on Multi Directional PVD and Modified LSB. Information Technology and Control, 46, 16-36.
https://doi.org/10.5755/j01.itc.46.1.15253
[32] Darabkh, K.A. (2014) Imperceptible and Robust DWT-SVD-Based Digital Audio Watermarking Algorithm. Journal of Software Engineering and Applications, 7, 859-871.
https://doi.org/10.4236/jsea.2014.710077
[33] Siewiorek, D.P., Smailagic, A., Furukawa, J., Krause, A., Moraveji, N., Reiger, K., Shaffer, J. and Wong, F.L. (2003) SenSay: A Context-Aware Mobile Phone. Proceedings of 7th IEEE International Symposium on Wearable Computers, White Plains, 21-23 October 2003, 248-249.
https://doi.org/10.1109/ISWC.2003.1241422
[34] Bandara, U. and Bandara, P. (2008) Tagciti: A Practical Approach for Location-Aware and Socially-Relevant Information Creation and Discovery for Mobile Users. Proceedings of 2008 IEEE International Symposium on Wireless Communication Systems, Reykjavik, Iceland, 21-24 October 2008, 118-122.
https://doi.org/10.1109/ISWCS.2008.4726030
[35] Etter, R., Costa, P.D. and Broens, T. (2006) A Rule-Based Approach towards Context-Aware User Notification Services. Proceedings of 2006 ACS/IEEE International Conference on Pervasive Services, Lyon, France, 26-29 June 2006, 281-284.
https://doi.org/10.1109/PERSER.2006.1652242
[36] Al-Suwaidi, G.B. and Zemerly, M.J. (2009) Locating Friends and Family Using Mobile Phones with Global Positioning System (GPS). Proceedings of 2009 IEEE/ACS International Conference on Computer Systems and Applications, Rabat, Morocco, 10-13 May 2009, 555-558.
https://doi.org/10.1109/AICCSA.2009.5069380
[37] Enck, W., Ongtang, M. and McDaniel, P. (2009) On Lightweight Mobile Phone Application Certification. Proceedings of the 2009 ACM Conference on Computer and Communications Security (CCS’2009), Chicago, IL, 9-13 November 2009, 235-245.
https://doi.org/10.1145/1653662.1653691
[38] Enck, W., Ongtang, M. and McDaniel, P. (2009) Understanding Android Security. IEEE Security & Privacy, 7, 50-57.
https://doi.org/10.1109/MSP.2009.26
[39] Enck, W., Octeau, D., McDaniel, P. and Chaudhuri, S. (2011) A Study of Android Application Security. Proceedings of 20th USENIX Security Symposium, San Francisco, CA, 10-12 August 2011.
[40] Hassan, Z.S. (2008) Ubiquitous Computing and Android. Proceedings of 2008 3rd International Conference on Digital Information Management, London, 13-16 November 2008, 166-171.
https://doi.org/10.1109/ICDIM.2008.4746751
[41] Jiang, F. and Ku, S. (2010) How to Display the Data from Database by ListView on Android. Proceedings of 2010 2nd International Workshop on Intelligent Systems and Applications, Wuhan, 22-23 May 2010, 1-4.
[42] How Smart Phones Destroy Children’s Brain.
http://www.fhfn.org/how-smart-phones-destroy-childrens-brain/
[43] Welcome to Your New Family Circle.
https://www.life360.com/
[44] Life 360 App for Boaters.
http://www.johnsphones.com/applications/android-apps/free-android-gps-trackers
http://sailing.about.com/od/SailingApps/fl/Review-of-GPS-Tracking-Pro-Life-360-App-for-Android-and-iOS-Smartphones.htm
[45] Trax GPS Tracker Locates Kids and Kitties.
http://www.slashgear.com/trax-gps-tracker-locates-kids-and-kitties-23302741/
[46] Trax | A Really Small and Light GPS Tracker for Kids and Pets.
https://traxfamily.com/
[47] The Lassy Project—Preventing Child Abductions.
https://www.indiegogo.com/projects/the-lassy-project-preventing-child-abductions#/
[48] Lassy Project, Lassyproject.
https://lassyproject.wordpress.com/
[49] Amar Toor. FBI’s Child ID APP Helps iPhone Users Find Their Missing Children.
https://www.engadget.com/2011/08/08/fbis-child-id-app-helps-iphone-users-find-their-missing-childre/
[50] The FBI Child ID App: A Free Tool to Help Keep Kids Safe.
https://www.justice.gov/opa/blog/fbi-child-id-app-free-tool-help-keep-kids-safe
[51] Marsit, N., Hameurlain, A., Mammeri, Z. and Morvan, F. (2005) Query Processing in Mobile Environments: A Survey and Open Problems. Proceedings of 1st International Conference on Distributed Frameworks for Multimedia Applications, Besancon, 6-9 February 2005, 150-157.
https://doi.org/10.1109/DFMA.2005.44
[52] Membrey, P., Hows, D. and Watkiss, S. (2013) Learn Raspberry Pi with Linux, Apress Publisher, New York.
[53] Monk, S. (2016) Raspberry Pi Cookbook: Software and Hardware Problems and Solutions. O’Reilly Media, Inc., Sebastopol, CA.
[54] Ariffin, A.B., Aziz, N.H.A. and Othman, K.A. (2011) Implementation of GPS for Location Tracking. Proceedings of 2011 IEEE Control and System Graduate Research Colloquium, Shah Alam, 27-28 June 2011, 77-81.
[55] Burns, J. (2008) Developing Secure Mobile Applications for Android. ISEC Partners, October 2008.
[56] Kralevich, N. (2010) Best Practices for Handling Android User Data. Developers Blog, August 2010.
[57] Johns, T. (2010) Securing Android LVL Applications. Developers Blog, September 2010.

  
comments powered by Disqus

Copyright © 2018 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.