Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Kids' Tracker: An Android Application For Tracking Children

Download as pdf or txt
Download as pdf or txt
You are on page 1of 18

Journal of Software Engineering and Applications, 2017, 10, 907-924

http://www.scirp.org/journal/jsea
ISSN Online: 1945-3124
ISSN Print: 1945-3116

Kids’ Tracker: An Android Application for


Tracking Children

Saadeh Z. Sweidan, Ramzi Saifan, Khalid A. Darabkh, Shaima Abu-Kaff, Sima Al-Ali

Department of Computer Engineering, The University of Jordan, Amman, Jordan

How to cite this paper: Sweidan, S.Z., Abstract


Saifan, R., Darabkh, K.A., Abu-Kaff, S. and
Al-Ali, S. (2017) Kids’ Tracker: An Android Smart phones with unlimited applications are considered essential for modern
Application for Tracking Children. Journal day lifestyle, hence the number of cell phone users has sky rocketed in this
of Software Engineering and Applications,
decade. The high percentage of children and teenagers carrying cell phones
10, 907-924.
https://doi.org/10.4236/jsea.2017.1013052 has caused controversy on how justified having a minor carrying a communi-
cation device is. There is no doubt about the fact that parents have to be able
Received: November 18, 2017 to contact their children, however, a child with a phone and poor judgment
Accepted: December 25, 2017
Published: December 28, 2017
will most probably be vulnerable to the outer world with all its’ threats and
abuses. Furthermore, we have the serious health issues related to wireless de-
Copyright © 2017 by authors and vices effects on people, under those circumstances multiple solutions have
Scientific Research Publishing Inc.
been presented for a safe secure method for parents to track their children
This work is licensed under the Creative
Commons Attribution International without the need of cell phones. The proposed alternatives included phones
License (CC BY 4.0). with limited privileges for children; these phones are restricted to the ability of
http://creativecommons.org/licenses/by/4.0/ calling specific people only and have already installed applications for tracking
Open Access location. Our proposed system “kids’ tracker” includes a wearable device for
the child and an Android application on the parents’ smart phone. Kids’
tracker has shown a very decent performance with many unique features
compared to other existing solutions.

Keywords
Android Apps, GPS, Smart Phones, Raspberry Pi, GPGGA

1. Introduction
Mobile phones have changed our lives drastically, making individuals reachable
constantly and giving new types of correspondence like informing and video
calls [1]-[11]. It is very grand how these phones have changed in the previous
couple of years, beginning off from being a science fiction dream to turning into
a basic piece of present day way of life claimed by the greater part of people

DOI: 10.4236/jsea.2017.1013052 Dec. 28, 2017 907 Journal of Software Engineering and Applications
S. Z. Sweidan et al.

worldwide [12]-[21]. A smart phone is a mobile phone with more advanced


computing capabilities and connectivity features [22]-[32]. IBM presented The
first smart phone 1992 [33]. It had a plethora of features including a calendar,
address book, calculator, email service, and even a touch screen. Early smart
phones typically combined the characteristics of a mobile phone with those of
other popular consumer device, such as a media player, a digital camera, and/or
a Global Positioning System (GPS) navigation unit. Nowadays, smart phones
expanded to include all of those services in addition to a touch screen, web
browsing, Wi-Fi, 3rd-party applications, and many others [34].
As a result of all the features included in them, smart phones can act as porta-
ble computers with their operating systems and have the ability to run most
computer programs efficiently. Moreover, the application stores that are pro-
vided by different smart phones manufacturers can be used to install thousands
of different useful applications which cover a very wide range of uses including
weather forecasting, chatting, latest news, editing photographs, online shopping
and others [35]. Based on that, it is not a surprise that the number of smart
phone users surpassed desktop users in 2014 [36].
Smart phones have become an essential part of human life including children
and teenagers. However, allowing a child to carry a smart phone with internet
access has created a controversy about how convenient or necessary it is com-
pared to the risks [37]. On one hand, having mobile phones allows children to be
connected and reachable at all the times by their parents who find that very use-
ful and of course necessary [38]. However, most experts warn about the dark
side of children’s use of mobile phones which may negatively affect their morals
and social values. For instance, these devices open them to an unsupervised vir-
tual world with media materials that might be age inappropriate. Also, children
using social networks might be misused by child abusers and criminals who can
be a genuine risk for kids [39]. In addition to that, mobile phones are related to
many health problems both mentally and physically which are even more dan-
gerous for younger users according to multiple researches [40]. Studies recom-
mend that mobile phones should not be given to children below sixteen years
old because their brains are not able to resist the effects of mobile radiation since
the tissues in the brain and body are still developing. These radiations can cause
damage due to absorption of radiation as shown in Figure 1 [41].

Figure 1. Demonstration of mobile phone radiation impact on


the brain for different ages [41] [42].

DOI: 10.4236/jsea.2017.1013052 908 Journal of Software Engineering and Applications


S. Z. Sweidan et al.

Nowadays, most parents use mobile phones to track their children by giving
them mobile phones and keep contacting them through phone calls. However,
from the aforementioned reasons, this approach comes with multiple negative
effects. Consequently, there is a need for an alternative approach which must be
safe and trusted.
The points mentioned above inspired us to present kids’ tracker that provides
a safe and efficient solution for parents who want to keep track of their children
location without giving them mobile phones. The proposed approach provides
the child with a wearable device which sends continuous signals to the parent’s
phone. These signals can be converted to detailed meaningful information about
the child’s location and his/her movements through a simple yet efficient appli-
cation.
The rest of this paper is organized as follows. Section 2 describes the proposed
system and compares it to a number of similar systems. Section 3 introduces the
system’s design and interface besides describing main hardware components and
software tools. Sections 4 presents the implementation and testing process
through a number of output screen samples. Finally, Section 5 presents our con-
clusions.

2. Kid’s Tracker and Related Work


Our proposed work, kids’ tracker, presents a product that helps parents to keep
track of their children without the need to give them mobile phones. In this sce-
nario, the child wears a tracking device like a bracelet which is coupled with the
parents’ smart phone through an easy to use Android application. The parent
can sign in to his account which is given by the service provider to track his
children through different types of notifications. A periodic notification is sent
to the parent with the current location of the child. The parent can also access a
history record of the child’s movement that covers up to the last seven days.
The parent can create his/her own regions for locations where the child is ex-
pected to be in certain days and hours like home or school. If the child is in the
defined region at the expected day and time, the region name is colored in green
(green zone). However, if the child is in the defined region but out of the ex-
pected day and time, the region is colored in gray (gray zone). Finally, if the
child is in an undefined location, the red color is used for this location (red
zone). As soon as a child enters a red or a gray zone, an instant alert notification
is sent to the user so that a proper action is done. The GPS in the child’s weara-
ble device sends signals to a main server every 5 seconds, nonetheless periodic
notifications are sent every 60 minutes by default to the parent, who can change
the time between notifications as desired. Figure 2 shows the system response
for different cases to switch between zones and the corresponding notification to
each case.
A number of different existing solutions were presented to allow parents to
track their children. Life 360 Tracker [43] is a full software solution that makes it

DOI: 10.4236/jsea.2017.1013052 909 Journal of Software Engineering and Applications


S. Z. Sweidan et al.

Figure 2. Switching between the three types of zones and the actions related to these changes.

easy to keep track of the location of participating family members as shown in


Figure 3. A circle of friends or family members is established so they can keep
track of each other’s current or past locations through application messages. Un-
like kids’ tracker, this app is more dedicated for adult users than tracking child-
ren due to the following:
1) Life 360 requires all users to have smart phones which brings us back to the
problem of a child having a cell phone.
2) Life 360 tracking process requires approval from both sides which is not
suitable for a parent/child scenario.
Alert notifications are not available due to lacking the ability of creating zones
or flags on dangerous locations.
On the other hand, TRAX is considered to be a GPS tracker for children and
pets [45]. In TRAX, a smart device works in conjunction with an application on
the smart phone allowing the user to locate children or pets anytime [45]. Figure
4 shows an example of a tracking process done by TRAX which is an efficient
and popular product with noticeable features that can be compared to kids’
tracker as follows:
1) Both TRAX and Kids’ tracker have a hardware device for the child and a
smart phone application for the parent to locate the child who should not use a
phone.
2) Both systems only send alert notifications when the child leaves or enters a
defined zone. However kids’ tracker has a remarkable additional feature which is

DOI: 10.4236/jsea.2017.1013052 910 Journal of Software Engineering and Applications


S. Z. Sweidan et al.

Figure 3. Life 360 map [44].

sending periodic notifications in different rates based on the parent needs.


3) While TRAX uses the official names of addresses such as street name and
building number, kids’ tracker allows the parent to give them personal mea-
ningful names like grandfather house or school.
4) TRAX has 24 hour history view whereas kids’ tracker has seven days.
5) TRAX can create safe zones compared to the more detailed three types of
zones system in kids’ tracker.

DOI: 10.4236/jsea.2017.1013052 911 Journal of Software Engineering and Applications


S. Z. Sweidan et al.

Figure 4. TRAX map screen [46].

The Last few years have witnessed the appearance of multiple other applica-
tions and devices which can be used for tracking friends, pets, old people, and of
course children. Lassy project [47], for example, sends a picture of a lost child
along with a real time map which shows the coordinates of his/her last known
location. This allows every user of the application to look for him/her [48]. Al-
though it is free to download and has a noble aim, it can create a major threat by
allowing some people with sick interests to get information about lost children
which raises privacy and safety issues.
Another application is FBI Child ID [49] which was created by the Federal
Bureau of Investigation. This application lets parents store their children’s pho-
tos plus other identification (height, weight, hair and eye color, age) for quick
access if a child ever goes missing. The information is stored on the Phone only
until parents need to send it to authorities. Notable features include safety tips,
checklists for what to do if something happens to your child, and shortcuts to
dial 911 or the National Center for Missing and Exploited Children. Parents also
have the ability to email info immediately to law enforcement agencies if the

DOI: 10.4236/jsea.2017.1013052 912 Journal of Software Engineering and Applications


S. Z. Sweidan et al.

unthinkable occurs [50].

3. System Design and Interface


Figure 5 shows the proposed system design which consists of three parts: 1) a
server for the service provider where the database of users is stored, 2) a weara-
ble device for the child to be tracked, and 3) a smart phone on the parent side to
login to the application and track the child. The server interacts with the other
two parts as follows: it receives location information from the wearable device
and exchanges data from and to the parent’s smart phone as the figure shows.
The child’s device consists of a Raspberry Pi (RPI) with Global Positioning
System (GPS) unit and an antenna for sending continuous signals to the server.
The Raspberry Pi is a credit card sized single board PC as appears in Figure 6.
The GPS is a space-based satellite route navigation system that gives area and
time data in all climate conditions, anywhere on or close to the earth where there
is an unhampered line to at least four GPS satellites [51]. Furthermore, different
software instruments and programming languages are utilised as a part of our
work, for instance Raspbian which is a free operating system based on De-
bian/Linux that is optimised for the Raspberry Pi hardware [52]. We likewise
used Python programming language which is a broadly used general-purpose
high-level programming language.

Figure 5. Kids’ tracker system design.

Figure 6. Raspberry pi board [53].

DOI: 10.4236/jsea.2017.1013052 913 Journal of Software Engineering and Applications


S. Z. Sweidan et al.

On the other side, the main server holds a database with full detailed informa-
tion about parents and their children. The database is modified by periodic sig-
nals transmitted from the wearable devices to the server. Then accordingly, the
server sends different notifications to the smart phone on the parent side with
updated information about their children’s locations. Moreover, the parent can
update his/her settings and information in the database through the application
interfaces, and can check the history record for the child’s previous movements
and current location at any time without the need to wait for notifications.
The data that is read from GPS contains repeated readings which can be
represented in different formats. In this paper, only one format is used. In kids’
tracker, GPGGA is the format used by server to find locations then store them
into the database [54]. For illustration, the GPGGA reading given below in Fig-
ure 7 and the meanings of its elements is shown in Table 1.
The parent side is an Android based smart phone. The main hardware plat-
form for Android is the ARM architecture with x86 and MIPS architectures [55].
Since 2012, Android devices with Intel processors began to be commercially
produced in the form of smart phones and computer tablets [56]. Android is
considered an open-source operating system that is based on Linux and it is
created basically to be installed in mobile phones and tablets [57]. On the other
hand, Android applications are usually developed in Java programming lan-
guage using the Android Software Development Kit, but other development
tools are also available.
In the parent side Android application, a background service sends a periodic
“get region” request to the server every 5 seconds. The server replies to that re-
quest by posting the current region of the child after the server has done the re-
quired calculations to determine the type of this region and update the marker

Figure 7. GPGGA reading sample.

Table 1. Description of the data items in GPGGA format [50].

Value Meaning
170,834 17:08:34'UTC
4124.8963,'N 41d'24.8963'N or 24'54"N
08151.6838,W 81d'51.6838'W or 81d'51'41"W
1 Fix Quality: 0 = Invalid, 1 = GPS fix, 2 = DGPS fix
05 5 Satellites are in view
1.5 HDOP (Horizontal Dilution of Precision)
280.2,M 280.2 meters above MSL (mean sea level)
Y34.0,'M Y34.0 meters below the WGS84 ellipsoid
Blank No last update
Blank No station id
*75 Checksum to verify sentence

DOI: 10.4236/jsea.2017.1013052 914 Journal of Software Engineering and Applications


S. Z. Sweidan et al.

on the map and region fragment with a new position. Moreover, the status
fragment with the name of current region will be colored according to the zone,
and the last checked time will be also updated.

4. Implementation and Testing


The application’s Android interface is simple to use and efficient. Kids trackers’
main screen contains a menu list in the shape of a slide menu that is shown in
Figure 8. It has 6 options for the main window including: status, map, regions,
history, settings and logout. Each option has a specific task as will be shown
soon. The user clicks the desired option to move to its’ related window. Using
kids’ tracker starts with a simple login process with a user name and password.
A successful login will lead to a status window by default. The window contains
the name of the current region for a child as it is named by the parent, and co-
lored by the type of zone. It also shows the time of last notification. In the first
login to an account, the status window will be empty until the user defines the
regions for the child. The information that is displayed in the status window is
updated every 5 seconds, and that is done by the background service which con-
tinuously sends a “get region” request to the server. Figure 9 shows a status
window with the current region of a child colored in gray which indicates that
this is not the expected region at this time of the day as defined by the parents
(gray zone).
The map window displays the current location of the child in a graphical form
on a Google map and a marker pin represents the location as shown in Figure
10. The map has specific details of the location including the street name in

Figure 8. Menu list window.

DOI: 10.4236/jsea.2017.1013052 915 Journal of Software Engineering and Applications


S. Z. Sweidan et al.

Figure 9. Current region of the child in status


window.

Figure 10. Current child location marked on map.

DOI: 10.4236/jsea.2017.1013052 916 Journal of Software Engineering and Applications


S. Z. Sweidan et al.

order to help parents in finding out where their child is.


Regions window enables the user to add, edit and delete regions. In addition
to that, it allows showing the child’s current region on map with a personalized
name defined by the parent such as school or grandparents’ house instead of the
general street name in maps. Figure 11 represents a sample of the regions win-
dow showing that the child is currently in the school region as defined by the
parent compared to Figure 10 which shows the same location as a Google map
name.
To add a new region the parent has to assign the required location on the map
window then double click Regions on the menu and a dialogue box will appear
as shown in Figure 12. The parent has to fill the name of the new region, and
then set the days and time slots in which it is fine for the child to exist in it as a
green zone. The radius of the new region has to be also set with a maximum
value of 500 meters. To edit or delete an existing region, the user can double
touch a defined region then select from the dialogue box options to either delete
the region with all its details or to edit and change its related information.
The History window provides a very useful feature for the parent to see the
child’s movements’ history record, labeled by the main events such as changing
regions of existence. The history record can be modified to cover a number of
days between one and seven with recommended period of seven days which is
the default.
Figure 13 shows a sample of a child’s movement’s record for one day along
with the visited regions. As we can observe, the child was at home at the begin-
ning of the day (00:00 military time) as expected by the parent. Consequently,

Figure 11. Current region of the child with


school region shown.

DOI: 10.4236/jsea.2017.1013052 917 Journal of Software Engineering and Applications


S. Z. Sweidan et al.

Figure 12. Add a new region box.

Figure 13. History record shows the regions that were visited
by the child in one day.

the zone name home appears in green (green zone). However, around 17:25 the
child left home and stayed less than an hour in a region that is undefined by the
parent, therefore, it appears in red (red zone). Finally, the child reached the
school which is a defined region; however, as the time of existence is out of the
expected hours for the child for this region, it appears in gray (gray zone).
The settings window enables the user to choose the type of notifications to re-
ceive; either periodic notifications or alert notifications or both. Moreover, a
deactivation option stops all notifications and updates which may be useful if the
user is with the child and there is no need to track the location. Finally, Kid
name allows giving a real name for the child instead of the default “kid” word
used in maps and notifications. Figure 14 shows the settings dialogue and its
provided features.

DOI: 10.4236/jsea.2017.1013052 918 Journal of Software Engineering and Applications


S. Z. Sweidan et al.

Figure 14. Settings dialogue box.

The last option on the menu is log out and it is used to exit the current ac-
count in case the user does not need to use the application. This means turning
off background service which is responsible for regularly seeking the current re-
gion. Therefore, no notification would be received. When logging in again, the
parent can get the history for the logging out period.
If alert notifications are enabled and the child is out of the defined region for
the current day and time, the parent will receive an urgent instant notification.
Furthermore, when the user opens the notification message, the current location
of the child is updated and shown. Alert notifications will keep reaching the
parent every 3 and 7 minutes for red and gray regions respectively. Figure 15
shows an alert notification for an undefined region which is considered a red
zone.
On the other hand, if the child is in his correct region and a periodic notifica-
tion option is enabled, the parent will receive a periodic notification every 60
minutes as long as the child remains in the green zone as shown in Figure 16.

5. Conclusion
We built a kids’ tracker system that allows the parents to track the location of
their children without the risks related to a child having a cell phone. The pro-
posed system includes a wearable small device for the child that contacts a main
system server which in turn is connected to the parent’s smart phone through a

DOI: 10.4236/jsea.2017.1013052 919 Journal of Software Engineering and Applications


S. Z. Sweidan et al.

Figure 15. Alert notification for a red zone.

Figure 16. Periodic notification.

simple yet flexible and efficient application. The application allows the user to
define the regions where the child is expected to be in different days and at spe-
cific hours. The system sends regular notifications to the user with the child’s
location, in addition to alert notifications when entering an unauthorized region.
Moreover, different week days have different region settings and the user can
track back the child’s movement’s history for several days. As a future work, we
plan to enhance both the battery life of the wearable device and to reduce its size
even more besides adding additional tracking options to make the system richer
and more useful.

References
[1] Al-Mistarihi, M.F., Mohaisen, R., Sharaqa, A., Shurman, M.M. and Darabkh, K.A.
(2015) Performance Evaluation of Multiuser Diversity in Multiuser Two-Hop Co-
operative Multi-Relay Wireless Networks using MRC over Rayleigh Fading Chan-
nels. International Journal of Communication Systems, 28, 71-90.
https://doi.org/10.1002/dac.2640
[2] Darabkh, K.A., Awad, A.M. and Khalifeh, A.F. (2015) New Video Discarding Poli-
cies for Improving UDP Performance over Wired/Wireless Networks. International
Journal of Network Management, 25, 181-202. https://doi.org/10.1002/nem.1888
[3] Khalifeh, A., Darabkh, K.A. and Kamel, A. (2012) Performance Evaluation of
Voice-Controlled Online Systems. Proceedings of IEEE/SSD’12 Multi-Conference
on Systems, Signals and Devices, Chemnitz, Germany, March 2012, 1-6.
https://doi.org/10.1109/SSD.2012.6198087
[4] Darabkh, K.A., Awad, A.M. and Khalifeh, A.F. (2014) Efficient PFD-Based Net-
working and Buffering Models for Improving Video Quality over Congested Links.
Wireless Personal Communications, 79, 293-320.
https://doi.org/10.1007/s11277-014-1857-1
[5] Al-Zubi, R., Hawa, M., Al-Sukkar, G. and Darabkh, K.A. (2014) Markov-Based Dis-
tributed Approach For Mitigating Self-Coexistence Problem in IEEE 802.22
WRANs. The Computer Journal, 57, 1765-1775.
https://doi.org/10.1093/comjnl/bxt092

DOI: 10.4236/jsea.2017.1013052 920 Journal of Software Engineering and Applications


S. Z. Sweidan et al.

[6] Darabkh, K.A., Al-Maaitah, N.J., Jafar, I.F. and Khalifeh, A.F. (2017) A Novel Ener-
gy-aware Clustering and Routing Protocol in Wireless Sensor Networks. Computers
and Electrical Engineering, in Press.
https://doi.org/10.1016/j.compeleceng.2017.11.017
[7] Darabkh, K.A. and Aygun, R.S. (2006) Quality of Service Evaluation of Error Con-
trol for TCP/IP-Based Systems in Packet Switching ATM Networks. Proceedings of
2006 International Conference on Internet Computing (ICOMP’06), Las Vegas,
Nevada, June 2006, 243-248.
[8] Darabkh, K.A., Al-Rawashdeh, W.S., Al-Zubi, R.T. and Alnabelsi, S.H. (2017)
C-DTB-CHR: Centralized Density- and Threshold-based Cluster Head Replace-
ment Protocols for Wireless Sensor Networks. Journal of Supercomputing, 73,
5332-5353. https://doi.org/10.1007/s11227-017-2089-4
[9] Ismail, S.S., Al, Khader, A.I. and Darabkh, K.A. (2015) Static Clustering for Target
Tracking in Wireless Sensor Networks. Global Journal on Technology (Selected Pa-
per of COMENG-2014), 8, 167-173.
[10] Darabkh, K.A., Abu-Jaradeh, B. and Jafar, I. (2011) Incorporating Automatic Repeat
Request and Thresholds with Variable Complexity Decoding Algorithms over
Wireless Networks: Queuing Analysis. IET Communications, 5, 1377-1393.
https://doi.org/10.1049/iet-com.2010.0698
[11] Darabkh, K.A. (2011) Evaluation of Channel Adaptive Access Point System with
Fano Decoding. International Journal of Computer Mathematics, 88, 916-937.
https://doi.org/10.1080/00207160.2010.485249
[12] Shurman, M., Awad, N., Al-Mistarihi, M.F. and Darabkh, K.A. (2014) LEACH En-
hancements for Wireless Sensor Networks Based on Energy Model. Proceedings of
the 2014 IEEE International Multi-Conference on Systems, Signals & Devices, Con-
ference on Communication & Signal Processing, Castelldefels-Barcelona, Spain,
February 2014, 1-4. https://doi.org/10.1109/SSD.2014.6808823
[13] Darabkh, K.A. (2010) Queuing Analysis and Simulation of Wireless Access and End
Point Systems Using Fano Decoding. Journal of Communications, 5, 551-561.
https://doi.org/10.4304/jcm.5.7.551-561
[14] Hawa, M., Darabkh, K.A., Al-Zubi, R. and Al-Sukkar, G. (2016) A Self-Learning
MAC Protocol for Energy Harvesting and Spectrum Access in Cognitive Radio
Sensor Networks. Journal of Sensors, 2016, Article ID: 9604526, 1-18.
[15] Darabkh, K.A., Albtoush, W.Y. and Jafar, I.F. (2017) Improved Clustering Algo-
rithms for Target Tracking in Wireless Sensor Networks. Journal of Supercomput-
ing, 73, 1952-1977. https://doi.org/10.1007/s11227-016-1898-1
[16] Darabkh, K.A. and Aygun, R. (2011) Improving UDP Performance Using Interme-
diate QoD-aware Hop System for Wired/Wireless Multimedia Communication
Systems. International Journal of Network Management, 21, 432-454.
[17] Al-Zubi, R., Krunz, M., Al-Sukkar, G., Hawa, M. and Darabkh, K.A. (2014) Packet
Recycling and Delayed ACK for Improving the Performance of TCP over MANETs.
Wireless Personal Communications, 75, 943-963.
https://doi.org/10.1007/s11277-013-1401-8
[18] Darabkh, K.A. and Aygun, R.S. (2006) Performance Evaluation of Sequential De-
coding System for UDP-Based Systems for Wireless Multimedia Networks. Pro-
ceedings of 2006 International Conference on Wireless Networks (ICWN'06), Las
Vegas, Nevada, June 2006, 365-371.
[19] Darabkh, K.A. and Aygun, R.S. (2006) Quality of Service and Performance Evalua-
tion of Congestion Control for Multimedia Networking. Proceedings of 2006 Inter-

DOI: 10.4236/jsea.2017.1013052 921 Journal of Software Engineering and Applications


S. Z. Sweidan et al.

national Conference on Internet Computing (ICOMP'06), Las Vegas, Nevada, June


2006, 217-223.
[20] Darabkh, K.A., Ibeid, H., Jafar, I.F. and Al-Zubi, R.T. (2016) A Generic Buffer Oc-
cupancy Expression for Stop-and-Wait Hybrid Automatic Repeat Request Protocol
over Unstable Channels. Telecommunication Systems, 63, 205-221.
https://doi.org/10.1007/s11235-015-0115-5
[21] Shurman, M., Al-Mistarihi, M. and Darabkh, K. (2013) Merging Dynamic Address
Autoconfiguration and Security Key Protocols in Mobile Ad Hoc Networks. Pro-
ceedings of 36th IEEE International Convention on Information and Communica-
tion Technology, Electronics and Microelectronics (MIPRO 2013), Opatija, Croatia,
May 2013, 441-445.
[22] Darabkh, K.A. (2017) Fast and Upper Bounded Fano Decoding Algorithm: Queuing
Analysis. Transactions on Emerging Telecommunications Technologies, 28, 1-12.
https://doi.org/10.1002/ett.2929
[23] Darabkh, K.A. and Alsukour, O. (2015) Novel Protocols for Improving the Perfor-
mance of ODMRP and EODMRP over Mobile Ad hoc Networks. International
Journal of Distributed Sensor Networks, 2015, Article ID: 348967, 1-18.
[24] Al-Dhamari, A.K. and Darabkh, K.A. (2017) Block-Based Steganographic Algo-
rithm Using Modulus Function and Pixel-Value Differencing. Journal of Software
Engineering and Applications, 10, 56-77. https://doi.org/10.4236/jsea.2017.101004
[25] Darabkh, K.A., Khalifeh, A., Naser, M. and Al-Qaralleh, E. (2012) New Arriving
Process for Convolutional Codes with Adaptive Behavior. Proceedings of
IEEE/SSD’12 Multi-Conference on Systems, Signals, and Devices, Chemnitz, Ger-
many, 20-23 March 2012, 1-6. https://doi.org/10.1109/SSD.2012.6198002
[26] Darabkh, K.A. and Abu-Jaradeh, B. (2010) Bounded Fano Decoders over Interme-
diate Hops Excluding Packet Retransmission. Proceedings of IEEE 24th Interna-
tional Conference on Advanced Information Networking and Applications (AINA
2010), Perth, Australia, 20-23 April 2010, 299-303.
https://doi.org/10.1109/AINA.2010.141
[27] Shurman, M.M., Al-Mistarihi, M.F. and Darabkh, K.A. Dynamic Distribution of
Security Keys and IP Addresses Coalition Protocol for Mobile Ad Hoc Networks.
Automatika - Journal for Control, Measurement, Electronics, Computing and
Communications, in press.
[28] Darabkh, K.A. and Abu-Jaradeh, B. (2016) Buffering Study over Intermediate Hops
including Packet Retransmission. Proceedings of IEEE International Conference on
Multimedia Computing and Information Technology (MCIT-2010), Sharjah, 2-4
March 2010, 45-48.
[29] Darabkh, K.A. and Pan, W.D. (2006) Queueing Simulation for Fano Decoders with
Finite Buffer Capacity. Proceedings of the 9th Communications and Networking
Simulation Symposium Conference (CNSS’06), Huntsville, Alabama, April 2006.
[30] Darabkh, K.A., Jafar, I.F., Al-Zubi, R.T. and Hawa, M. (2015) A New Image Stega-
nographic Approach for Secure Communication Based on LSB Replacement Me-
thod. Information Technology and Control, 44, 315-328.
[31] Darabkh, K.A., Al-Dhamari, A.K. and Jafar, I.F. (2017) A New Steganographic Al-
gorithm Based on Multi Directional PVD and Modified LSB. Information Technol-
ogy and Control, 46, 16-36. https://doi.org/10.5755/j01.itc.46.1.15253
[32] Darabkh, K.A. (2014) Imperceptible and Robust DWT-SVD-Based Digital Audio
Watermarking Algorithm. Journal of Software Engineering and Applications, 7,
859-871. https://doi.org/10.4236/jsea.2014.710077

DOI: 10.4236/jsea.2017.1013052 922 Journal of Software Engineering and Applications


S. Z. Sweidan et al.

[33] Siewiorek, D.P., Smailagic, A., Furukawa, J., Krause, A., Moraveji, N., Reiger, K.,
Shaffer, J. and Wong, F.L. (2003) SenSay: A Context-Aware Mobile Phone. Pro-
ceedings of 7th IEEE International Symposium on Wearable Computers, White
Plains, 21-23 October 2003, 248-249. https://doi.org/10.1109/ISWC.2003.1241422
[34] Bandara, U. and Bandara, P. (2008) Tagciti: A Practical Approach for Loca-
tion-Aware and Socially-Relevant Information Creation and Discovery for Mobile
Users. Proceedings of 2008 IEEE International Symposium on Wireless Communi-
cation Systems, Reykjavik, Iceland, 21-24 October 2008, 118-122.
https://doi.org/10.1109/ISWCS.2008.4726030
[35] Etter, R., Costa, P.D. and Broens, T. (2006) A Rule-Based Approach towards Con-
text-Aware User Notification Services. Proceedings of 2006 ACS/IEEE International
Conference on Pervasive Services, Lyon, France, 26-29 June 2006, 281-284.
https://doi.org/10.1109/PERSER.2006.1652242
[36] Al-Suwaidi, G.B. and Zemerly, M.J. (2009) Locating Friends and Family Using Mo-
bile Phones with Global Positioning System (GPS). Proceedings of 2009 IEEE/ACS
International Conference on Computer Systems and Applications, Rabat, Morocco,
10-13 May 2009, 555-558. https://doi.org/10.1109/AICCSA.2009.5069380
[37] Enck, W., Ongtang, M. and McDaniel, P. (2009) On Lightweight Mobile Phone Ap-
plication Certification. Proceedings of the 2009 ACM Conference on Computer and
Communications Security (CCS’2009), Chicago, IL, 9-13 November 2009, 235-245.
https://doi.org/10.1145/1653662.1653691
[38] Enck, W., Ongtang, M. and McDaniel, P. (2009) Understanding Android Security.
IEEE Security & Privacy, 7, 50-57. https://doi.org/10.1109/MSP.2009.26
[39] Enck, W., Octeau, D., McDaniel, P. and Chaudhuri, S. (2011) A Study of Android
Application Security. Proceedings of 20th USENIX Security Symposium, San Fran-
cisco, CA, 10-12 August 2011.
[40] Hassan, Z.S. (2008) Ubiquitous Computing and Android. Proceedings of 2008 3rd
International Conference on Digital Information Management, London, 13-16 No-
vember 2008, 166-171. https://doi.org/10.1109/ICDIM.2008.4746751
[41] Jiang, F. and Ku, S. (2010) How to Display the Data from Database by ListView on
Android. Proceedings of 2010 2nd International Workshop on Intelligent Systems
and Applications, Wuhan, 22-23 May 2010, 1-4.
[42] How Smart Phones Destroy Children’s Brain.
http://www.fhfn.org/how-smart-phones-destroy-childrens-brain/
[43] Welcome to Your New Family Circle. https://www.life360.com/
[44] Life 360 App for Boaters.
http://www.johnsphones.com/applications/android-apps/free-android-gps-trackers
http://sailing.about.com/od/SailingApps/fl/Review-of-GPS-Tracking-Pro-Life-360-
App-for-Android-and-iOS-Smartphones.htm
[45] Trax GPS Tracker Locates Kids and Kitties.
http://www.slashgear.com/trax-gps-tracker-locates-kids-and-kitties-23302741/
[46] Trax | A Really Small and Light GPS Tracker for Kids and Pets.
https://traxfamily.com/
[47] The Lassy Project—Preventing Child Abductions.
https://www.indiegogo.com/projects/the-lassy-project-preventing-child-abductions
#/
[48] Lassy Project, Lassyproject. https://lassyproject.wordpress.com/
[49] Amar Toor. FBI’s Child ID APP Helps iPhone Users Find Their Missing Children.

DOI: 10.4236/jsea.2017.1013052 923 Journal of Software Engineering and Applications


S. Z. Sweidan et al.

https://www.engadget.com/2011/08/08/fbis-child-id-app-helps-iphone-users-find-t
heir-missing-childre/
[50] The FBI Child ID App: A Free Tool to Help Keep Kids Safe.
https://www.justice.gov/opa/blog/fbi-child-id-app-free-tool-help-keep-kids-safe
[51] Marsit, N., Hameurlain, A., Mammeri, Z. and Morvan, F. (2005) Query Processing
in Mobile Environments: A Survey and Open Problems. Proceedings of 1st Interna-
tional Conference on Distributed Frameworks for Multimedia Applications, Be-
sancon, 6-9 February 2005, 150-157. https://doi.org/10.1109/DFMA.2005.44
[52] Membrey, P., Hows, D. and Watkiss, S. (2013) Learn Raspberry Pi with Linux,
Apress Publisher, New York.
[53] Monk, S. (2016) Raspberry Pi Cookbook: Software and Hardware Problems and
Solutions. O’Reilly Media, Inc., Sebastopol, CA.
[54] Ariffin, A.B., Aziz, N.H.A. and Othman, K.A. (2011) Implementation of GPS for
Location Tracking. Proceedings of 2011 IEEE Control and System Graduate Re-
search Colloquium, Shah Alam, 27-28 June 2011, 77-81.
[55] Burns, J. (2008) Developing Secure Mobile Applications for Android. ISEC Part-
ners, October 2008.
[56] Kralevich, N. (2010) Best Practices for Handling Android User Data. Developers
Blog, August 2010.
[57] Johns, T. (2010) Securing Android LVL Applications. Developers Blog, September
2010.

DOI: 10.4236/jsea.2017.1013052 924 Journal of Software Engineering and Applications

You might also like