Kids' Tracker: An Android Application For Tracking Children
Kids' Tracker: An Android Application For Tracking Children
Kids' Tracker: An Android Application For Tracking Children
http://www.scirp.org/journal/jsea
ISSN Online: 1945-3124
ISSN Print: 1945-3116
Saadeh Z. Sweidan, Ramzi Saifan, Khalid A. Darabkh, Shaima Abu-Kaff, Sima Al-Ali
Keywords
Android Apps, GPS, Smart Phones, Raspberry Pi, GPGGA
1. Introduction
Mobile phones have changed our lives drastically, making individuals reachable
constantly and giving new types of correspondence like informing and video
calls [1]-[11]. It is very grand how these phones have changed in the previous
couple of years, beginning off from being a science fiction dream to turning into
a basic piece of present day way of life claimed by the greater part of people
DOI: 10.4236/jsea.2017.1013052 Dec. 28, 2017 907 Journal of Software Engineering and Applications
S. Z. Sweidan et al.
Nowadays, most parents use mobile phones to track their children by giving
them mobile phones and keep contacting them through phone calls. However,
from the aforementioned reasons, this approach comes with multiple negative
effects. Consequently, there is a need for an alternative approach which must be
safe and trusted.
The points mentioned above inspired us to present kids’ tracker that provides
a safe and efficient solution for parents who want to keep track of their children
location without giving them mobile phones. The proposed approach provides
the child with a wearable device which sends continuous signals to the parent’s
phone. These signals can be converted to detailed meaningful information about
the child’s location and his/her movements through a simple yet efficient appli-
cation.
The rest of this paper is organized as follows. Section 2 describes the proposed
system and compares it to a number of similar systems. Section 3 introduces the
system’s design and interface besides describing main hardware components and
software tools. Sections 4 presents the implementation and testing process
through a number of output screen samples. Finally, Section 5 presents our con-
clusions.
Figure 2. Switching between the three types of zones and the actions related to these changes.
The Last few years have witnessed the appearance of multiple other applica-
tions and devices which can be used for tracking friends, pets, old people, and of
course children. Lassy project [47], for example, sends a picture of a lost child
along with a real time map which shows the coordinates of his/her last known
location. This allows every user of the application to look for him/her [48]. Al-
though it is free to download and has a noble aim, it can create a major threat by
allowing some people with sick interests to get information about lost children
which raises privacy and safety issues.
Another application is FBI Child ID [49] which was created by the Federal
Bureau of Investigation. This application lets parents store their children’s pho-
tos plus other identification (height, weight, hair and eye color, age) for quick
access if a child ever goes missing. The information is stored on the Phone only
until parents need to send it to authorities. Notable features include safety tips,
checklists for what to do if something happens to your child, and shortcuts to
dial 911 or the National Center for Missing and Exploited Children. Parents also
have the ability to email info immediately to law enforcement agencies if the
On the other side, the main server holds a database with full detailed informa-
tion about parents and their children. The database is modified by periodic sig-
nals transmitted from the wearable devices to the server. Then accordingly, the
server sends different notifications to the smart phone on the parent side with
updated information about their children’s locations. Moreover, the parent can
update his/her settings and information in the database through the application
interfaces, and can check the history record for the child’s previous movements
and current location at any time without the need to wait for notifications.
The data that is read from GPS contains repeated readings which can be
represented in different formats. In this paper, only one format is used. In kids’
tracker, GPGGA is the format used by server to find locations then store them
into the database [54]. For illustration, the GPGGA reading given below in Fig-
ure 7 and the meanings of its elements is shown in Table 1.
The parent side is an Android based smart phone. The main hardware plat-
form for Android is the ARM architecture with x86 and MIPS architectures [55].
Since 2012, Android devices with Intel processors began to be commercially
produced in the form of smart phones and computer tablets [56]. Android is
considered an open-source operating system that is based on Linux and it is
created basically to be installed in mobile phones and tablets [57]. On the other
hand, Android applications are usually developed in Java programming lan-
guage using the Android Software Development Kit, but other development
tools are also available.
In the parent side Android application, a background service sends a periodic
“get region” request to the server every 5 seconds. The server replies to that re-
quest by posting the current region of the child after the server has done the re-
quired calculations to determine the type of this region and update the marker
Value Meaning
170,834 17:08:34'UTC
4124.8963,'N 41d'24.8963'N or 24'54"N
08151.6838,W 81d'51.6838'W or 81d'51'41"W
1 Fix Quality: 0 = Invalid, 1 = GPS fix, 2 = DGPS fix
05 5 Satellites are in view
1.5 HDOP (Horizontal Dilution of Precision)
280.2,M 280.2 meters above MSL (mean sea level)
Y34.0,'M Y34.0 meters below the WGS84 ellipsoid
Blank No last update
Blank No station id
*75 Checksum to verify sentence
on the map and region fragment with a new position. Moreover, the status
fragment with the name of current region will be colored according to the zone,
and the last checked time will be also updated.
Figure 13. History record shows the regions that were visited
by the child in one day.
the zone name home appears in green (green zone). However, around 17:25 the
child left home and stayed less than an hour in a region that is undefined by the
parent, therefore, it appears in red (red zone). Finally, the child reached the
school which is a defined region; however, as the time of existence is out of the
expected hours for the child for this region, it appears in gray (gray zone).
The settings window enables the user to choose the type of notifications to re-
ceive; either periodic notifications or alert notifications or both. Moreover, a
deactivation option stops all notifications and updates which may be useful if the
user is with the child and there is no need to track the location. Finally, Kid
name allows giving a real name for the child instead of the default “kid” word
used in maps and notifications. Figure 14 shows the settings dialogue and its
provided features.
The last option on the menu is log out and it is used to exit the current ac-
count in case the user does not need to use the application. This means turning
off background service which is responsible for regularly seeking the current re-
gion. Therefore, no notification would be received. When logging in again, the
parent can get the history for the logging out period.
If alert notifications are enabled and the child is out of the defined region for
the current day and time, the parent will receive an urgent instant notification.
Furthermore, when the user opens the notification message, the current location
of the child is updated and shown. Alert notifications will keep reaching the
parent every 3 and 7 minutes for red and gray regions respectively. Figure 15
shows an alert notification for an undefined region which is considered a red
zone.
On the other hand, if the child is in his correct region and a periodic notifica-
tion option is enabled, the parent will receive a periodic notification every 60
minutes as long as the child remains in the green zone as shown in Figure 16.
5. Conclusion
We built a kids’ tracker system that allows the parents to track the location of
their children without the risks related to a child having a cell phone. The pro-
posed system includes a wearable small device for the child that contacts a main
system server which in turn is connected to the parent’s smart phone through a
simple yet flexible and efficient application. The application allows the user to
define the regions where the child is expected to be in different days and at spe-
cific hours. The system sends regular notifications to the user with the child’s
location, in addition to alert notifications when entering an unauthorized region.
Moreover, different week days have different region settings and the user can
track back the child’s movement’s history for several days. As a future work, we
plan to enhance both the battery life of the wearable device and to reduce its size
even more besides adding additional tracking options to make the system richer
and more useful.
References
[1] Al-Mistarihi, M.F., Mohaisen, R., Sharaqa, A., Shurman, M.M. and Darabkh, K.A.
(2015) Performance Evaluation of Multiuser Diversity in Multiuser Two-Hop Co-
operative Multi-Relay Wireless Networks using MRC over Rayleigh Fading Chan-
nels. International Journal of Communication Systems, 28, 71-90.
https://doi.org/10.1002/dac.2640
[2] Darabkh, K.A., Awad, A.M. and Khalifeh, A.F. (2015) New Video Discarding Poli-
cies for Improving UDP Performance over Wired/Wireless Networks. International
Journal of Network Management, 25, 181-202. https://doi.org/10.1002/nem.1888
[3] Khalifeh, A., Darabkh, K.A. and Kamel, A. (2012) Performance Evaluation of
Voice-Controlled Online Systems. Proceedings of IEEE/SSD’12 Multi-Conference
on Systems, Signals and Devices, Chemnitz, Germany, March 2012, 1-6.
https://doi.org/10.1109/SSD.2012.6198087
[4] Darabkh, K.A., Awad, A.M. and Khalifeh, A.F. (2014) Efficient PFD-Based Net-
working and Buffering Models for Improving Video Quality over Congested Links.
Wireless Personal Communications, 79, 293-320.
https://doi.org/10.1007/s11277-014-1857-1
[5] Al-Zubi, R., Hawa, M., Al-Sukkar, G. and Darabkh, K.A. (2014) Markov-Based Dis-
tributed Approach For Mitigating Self-Coexistence Problem in IEEE 802.22
WRANs. The Computer Journal, 57, 1765-1775.
https://doi.org/10.1093/comjnl/bxt092
[6] Darabkh, K.A., Al-Maaitah, N.J., Jafar, I.F. and Khalifeh, A.F. (2017) A Novel Ener-
gy-aware Clustering and Routing Protocol in Wireless Sensor Networks. Computers
and Electrical Engineering, in Press.
https://doi.org/10.1016/j.compeleceng.2017.11.017
[7] Darabkh, K.A. and Aygun, R.S. (2006) Quality of Service Evaluation of Error Con-
trol for TCP/IP-Based Systems in Packet Switching ATM Networks. Proceedings of
2006 International Conference on Internet Computing (ICOMP’06), Las Vegas,
Nevada, June 2006, 243-248.
[8] Darabkh, K.A., Al-Rawashdeh, W.S., Al-Zubi, R.T. and Alnabelsi, S.H. (2017)
C-DTB-CHR: Centralized Density- and Threshold-based Cluster Head Replace-
ment Protocols for Wireless Sensor Networks. Journal of Supercomputing, 73,
5332-5353. https://doi.org/10.1007/s11227-017-2089-4
[9] Ismail, S.S., Al, Khader, A.I. and Darabkh, K.A. (2015) Static Clustering for Target
Tracking in Wireless Sensor Networks. Global Journal on Technology (Selected Pa-
per of COMENG-2014), 8, 167-173.
[10] Darabkh, K.A., Abu-Jaradeh, B. and Jafar, I. (2011) Incorporating Automatic Repeat
Request and Thresholds with Variable Complexity Decoding Algorithms over
Wireless Networks: Queuing Analysis. IET Communications, 5, 1377-1393.
https://doi.org/10.1049/iet-com.2010.0698
[11] Darabkh, K.A. (2011) Evaluation of Channel Adaptive Access Point System with
Fano Decoding. International Journal of Computer Mathematics, 88, 916-937.
https://doi.org/10.1080/00207160.2010.485249
[12] Shurman, M., Awad, N., Al-Mistarihi, M.F. and Darabkh, K.A. (2014) LEACH En-
hancements for Wireless Sensor Networks Based on Energy Model. Proceedings of
the 2014 IEEE International Multi-Conference on Systems, Signals & Devices, Con-
ference on Communication & Signal Processing, Castelldefels-Barcelona, Spain,
February 2014, 1-4. https://doi.org/10.1109/SSD.2014.6808823
[13] Darabkh, K.A. (2010) Queuing Analysis and Simulation of Wireless Access and End
Point Systems Using Fano Decoding. Journal of Communications, 5, 551-561.
https://doi.org/10.4304/jcm.5.7.551-561
[14] Hawa, M., Darabkh, K.A., Al-Zubi, R. and Al-Sukkar, G. (2016) A Self-Learning
MAC Protocol for Energy Harvesting and Spectrum Access in Cognitive Radio
Sensor Networks. Journal of Sensors, 2016, Article ID: 9604526, 1-18.
[15] Darabkh, K.A., Albtoush, W.Y. and Jafar, I.F. (2017) Improved Clustering Algo-
rithms for Target Tracking in Wireless Sensor Networks. Journal of Supercomput-
ing, 73, 1952-1977. https://doi.org/10.1007/s11227-016-1898-1
[16] Darabkh, K.A. and Aygun, R. (2011) Improving UDP Performance Using Interme-
diate QoD-aware Hop System for Wired/Wireless Multimedia Communication
Systems. International Journal of Network Management, 21, 432-454.
[17] Al-Zubi, R., Krunz, M., Al-Sukkar, G., Hawa, M. and Darabkh, K.A. (2014) Packet
Recycling and Delayed ACK for Improving the Performance of TCP over MANETs.
Wireless Personal Communications, 75, 943-963.
https://doi.org/10.1007/s11277-013-1401-8
[18] Darabkh, K.A. and Aygun, R.S. (2006) Performance Evaluation of Sequential De-
coding System for UDP-Based Systems for Wireless Multimedia Networks. Pro-
ceedings of 2006 International Conference on Wireless Networks (ICWN'06), Las
Vegas, Nevada, June 2006, 365-371.
[19] Darabkh, K.A. and Aygun, R.S. (2006) Quality of Service and Performance Evalua-
tion of Congestion Control for Multimedia Networking. Proceedings of 2006 Inter-
[33] Siewiorek, D.P., Smailagic, A., Furukawa, J., Krause, A., Moraveji, N., Reiger, K.,
Shaffer, J. and Wong, F.L. (2003) SenSay: A Context-Aware Mobile Phone. Pro-
ceedings of 7th IEEE International Symposium on Wearable Computers, White
Plains, 21-23 October 2003, 248-249. https://doi.org/10.1109/ISWC.2003.1241422
[34] Bandara, U. and Bandara, P. (2008) Tagciti: A Practical Approach for Loca-
tion-Aware and Socially-Relevant Information Creation and Discovery for Mobile
Users. Proceedings of 2008 IEEE International Symposium on Wireless Communi-
cation Systems, Reykjavik, Iceland, 21-24 October 2008, 118-122.
https://doi.org/10.1109/ISWCS.2008.4726030
[35] Etter, R., Costa, P.D. and Broens, T. (2006) A Rule-Based Approach towards Con-
text-Aware User Notification Services. Proceedings of 2006 ACS/IEEE International
Conference on Pervasive Services, Lyon, France, 26-29 June 2006, 281-284.
https://doi.org/10.1109/PERSER.2006.1652242
[36] Al-Suwaidi, G.B. and Zemerly, M.J. (2009) Locating Friends and Family Using Mo-
bile Phones with Global Positioning System (GPS). Proceedings of 2009 IEEE/ACS
International Conference on Computer Systems and Applications, Rabat, Morocco,
10-13 May 2009, 555-558. https://doi.org/10.1109/AICCSA.2009.5069380
[37] Enck, W., Ongtang, M. and McDaniel, P. (2009) On Lightweight Mobile Phone Ap-
plication Certification. Proceedings of the 2009 ACM Conference on Computer and
Communications Security (CCS’2009), Chicago, IL, 9-13 November 2009, 235-245.
https://doi.org/10.1145/1653662.1653691
[38] Enck, W., Ongtang, M. and McDaniel, P. (2009) Understanding Android Security.
IEEE Security & Privacy, 7, 50-57. https://doi.org/10.1109/MSP.2009.26
[39] Enck, W., Octeau, D., McDaniel, P. and Chaudhuri, S. (2011) A Study of Android
Application Security. Proceedings of 20th USENIX Security Symposium, San Fran-
cisco, CA, 10-12 August 2011.
[40] Hassan, Z.S. (2008) Ubiquitous Computing and Android. Proceedings of 2008 3rd
International Conference on Digital Information Management, London, 13-16 No-
vember 2008, 166-171. https://doi.org/10.1109/ICDIM.2008.4746751
[41] Jiang, F. and Ku, S. (2010) How to Display the Data from Database by ListView on
Android. Proceedings of 2010 2nd International Workshop on Intelligent Systems
and Applications, Wuhan, 22-23 May 2010, 1-4.
[42] How Smart Phones Destroy Children’s Brain.
http://www.fhfn.org/how-smart-phones-destroy-childrens-brain/
[43] Welcome to Your New Family Circle. https://www.life360.com/
[44] Life 360 App for Boaters.
http://www.johnsphones.com/applications/android-apps/free-android-gps-trackers
http://sailing.about.com/od/SailingApps/fl/Review-of-GPS-Tracking-Pro-Life-360-
App-for-Android-and-iOS-Smartphones.htm
[45] Trax GPS Tracker Locates Kids and Kitties.
http://www.slashgear.com/trax-gps-tracker-locates-kids-and-kitties-23302741/
[46] Trax | A Really Small and Light GPS Tracker for Kids and Pets.
https://traxfamily.com/
[47] The Lassy Project—Preventing Child Abductions.
https://www.indiegogo.com/projects/the-lassy-project-preventing-child-abductions
#/
[48] Lassy Project, Lassyproject. https://lassyproject.wordpress.com/
[49] Amar Toor. FBI’s Child ID APP Helps iPhone Users Find Their Missing Children.
https://www.engadget.com/2011/08/08/fbis-child-id-app-helps-iphone-users-find-t
heir-missing-childre/
[50] The FBI Child ID App: A Free Tool to Help Keep Kids Safe.
https://www.justice.gov/opa/blog/fbi-child-id-app-free-tool-help-keep-kids-safe
[51] Marsit, N., Hameurlain, A., Mammeri, Z. and Morvan, F. (2005) Query Processing
in Mobile Environments: A Survey and Open Problems. Proceedings of 1st Interna-
tional Conference on Distributed Frameworks for Multimedia Applications, Be-
sancon, 6-9 February 2005, 150-157. https://doi.org/10.1109/DFMA.2005.44
[52] Membrey, P., Hows, D. and Watkiss, S. (2013) Learn Raspberry Pi with Linux,
Apress Publisher, New York.
[53] Monk, S. (2016) Raspberry Pi Cookbook: Software and Hardware Problems and
Solutions. O’Reilly Media, Inc., Sebastopol, CA.
[54] Ariffin, A.B., Aziz, N.H.A. and Othman, K.A. (2011) Implementation of GPS for
Location Tracking. Proceedings of 2011 IEEE Control and System Graduate Re-
search Colloquium, Shah Alam, 27-28 June 2011, 77-81.
[55] Burns, J. (2008) Developing Secure Mobile Applications for Android. ISEC Part-
ners, October 2008.
[56] Kralevich, N. (2010) Best Practices for Handling Android User Data. Developers
Blog, August 2010.
[57] Johns, T. (2010) Securing Android LVL Applications. Developers Blog, September
2010.