A Proposed System for Push Messaging on Android

Total Page:16

File Type:pdf, Size:1020Kb

A Proposed System for Push Messaging on Android PAPER A PROPOSED SYSTEM FOR PUSH MESSAGING ON ANDROID A Proposed System for Push Messaging on Android http://dx.doi.org/10.3991/ijim.v10i3.5567 Rasha el Stohy1, Nashaat el Khamesy 2 and Haitham el Ghareeb1 1 El Mansoura University, El Mansoura, Egypt 2 Sadat Academy for Management Sciences, Cairo, Egypt Abstract—Rapid proliferation of mobile computing technol- Message Service [GSM-SMS], SIPMESSAGE ogy has massive potential for enhancing the interactions [RFC3428], or OMA Push [OMA-PUSH]), or via brows- between different partners in educational institutions, par- er-specific methods [4].A significant character of mobile ticularly in schools. However, how communicating with push services is the real-time notifications to subscribers parents via applications anytime anywhere is quite a chal- based on current contexts such as identity, location, status lenging demand. On the other hand, the addressed success as well as emotions. However, implementation of mobile of the supporting Android features provides a good candi- push notifications has proved challenging due to some date to aid applications with real time information. Moreo- reasons such as they require a third party service like ver the Android platforms supports efficiently customizable Apple or Google for their implementation[4]. notifications, which allow applications based on Google In this research, we focused on push notification service Cloud Messaging (GCM) to specify the pushed events. In on Android (PNS) because it is an important aspect for this paper, we look at different push messaging alternatives application developers, Unlike SMS and Bluetooth; PNS available for Android. Push messaging provides an im- are free and have no coverage problem. Push messaging in portant aspect of server to device communication, and we specifically focus on the integration of cloud computing with many situations is a vital aspect of the usability and func- mobile devices through the use of push-based technologies. tionality of an application. As stated by Gartner [5], the The paper presents a proposed notification system; ToPar- popularity of android Platform means that this area of ent, that actively provide alerts and messaging between research highlights challenges that affect a considerable parents and schools. Also, we investigate the performance of amount of software developers. In addition to the good the two relevant push technologies for the Android devices, support of GCM and third party application server which push notification service (PNS) and the short messaging ser- promise high reliability and excellent performance, an- vice(SMS) .The proposed system was implemented using droid is an open platform which provides a good candidate Eclipse. The system has been tested and validated. Evalua- to reuse its components and easier in programming [4]. tion have proven that the proposed ToParent enabled better Accordingly, in this paper, our contribution exposes on efficiency, which satisfy both parties; parents and school proposing a new type of a mobile application that utilizes administrations. (PNS) and (SMS) in Android. The proposed system has been designed and implemented using Eclipse integrated Index Terms—Mobile Computing, Android Systems, Push with third party services. Our proposed Toparent system is Notifications, Real-time Information. for informing parents of their school updating messages, real-time news, and emergency messages. I. INTRODUCTION This novel is good for parents, administration and ser- As the society increasingly becomes dependent on vice providers. Parents would subscribe to get the infor- technology, schools are investing more time and money in mation as soon as it is available with minimum power technological means of communication [1]. Although consumption, and service providers would like to enable mobile technologies are vital in facilitating parental in- push service with minimum network bandwidth consump- volvement in schools, the cost involved in the technolo- tion, that administration need minimum communication gies have led to a lack of cell phone used in school admin- cost. istration. Mobile push notifications are an important fea- A comparison between the two technologies-PNS and ture of mobile application and have been widely applied SMS- has been introduced at the end of this paper in re- due to the offered of mobile computing services [2]. The gards of efficiency and cost. most commonly used mobile applications such as Face- This paper organized as follows: the rest of this section book; hang out, a system like Tinder, instant messaging explores the related applications, Android push messaging systems including WeChat were all implemented using and related techniques, section 3 introduce the proposed mobile push notifications [3]. Other supporting services system architecture and functions section 4 clearly evalu- including weather, traffic and travel services were also set ate the proposed system experimentally and a comparison up using mobile push notifications to deliver real-time, between the used techniques is conducted. Lastly, section sensitive and personalized content to users. 5 concludes the study by offering some key points focused There are various technologies that can be used to de- on in other sections. velop a notification service, Push notifications may be delivered via various methods including standardized protocols (e.g. Server-Sent Events [SSE], the GSM Short iJIM ‒ Volume 10, Issue 3, 2016 29 PAPER A PROPOSED SYSTEM FOR PUSH MESSAGING ON ANDROID II. RELATED WORKS A. Push notification service(PNS) There is a diverse collection of work related to the in- Push service is a featured service that is gaining more vestigation of the influence of computing approaches in and more popularity. It allows third-party application push notifications. Applications can use notifications to servers to actively send data to their installed applications greatly improve user's experience. For instance, an email even if the installed application is currently not running. application might notify a user when new message arrive. To utilize the push service, the application vendor has to A news reader application might notify a user when there register at the service provider (e.g., Google and Apple). are new articles to read, a game might notify a user when However, the push service provider has no knowledge a friend has signed in or sent, an invitation to play or beat- about the contents of distributed message. Data distributed en a high score, and a weather application might notify a through the push service are messages that the vendor user of weather, Alerts. A stock market application might server wants to notify about. Depending on handling notify the user when certain stock price targets are met method defined in the installed application, the pushed [4]. data may or may not be displayed directly on the screen as The push messaging is researched across a wide variety notifications [14]. One popular push services provided of domains; Joseph paper [6] contributes in m-government include the Android Cloud to Device Messaging Frame- literature and provides insights on the user perceptions of work (C2DM) for Android, the Black-Berry Push Essen- m-government for emergency notifications. His study also tials and Push Plus for BlackBerry OS, the Apple Push has collaboration for all levels of government including Notification Service for iOS, and the Microsoft Push Noti- state, local, and federal. He concluded that mobile tech- fication Service for Windows Phone [15]. In the first two nology which has grown in the public domain advances services on Android and Blackberry, pushed data general- the goal of using information and communications tech- ly are used for data distribution. While, in the last two nologies (ICTs) to benefit human well-being. services on iOS and Windows Phone, pushed data are specifically for notification and can be displayed directly In Bhoi[7] android based child tracking system, he fo- via the local notification service. Despite the differences cused on tracking of child's movement to and from school. in design and implementation, notification services on A particular area was defined for each child separately, so existing smartphone platforms can be classified into three if child is moved outside of define area; an alert message types: will be given to parents. In addition if child is crying, an alert message will be sent to parents. The panic switch is 1. Pop-up Notification: notifies the user by popping up provided at child module which can be easily used by a notification dialog on screen, e.g., the toast Notifi- child to alert his parents. Because of these powerful op- cation on Android and Dialog Notification on tions, parents own tool to keep the observation on their BlackBerry OS. child even when they can't physically see them. 2. Status Bar Notification: adds a notification view as a In work more closed to ours using C2DM technology, status bar at the top of screen, e.g., message List on Minstrel [8] has been developed as push-based messaging BlackBerry OS 7, Status Bar Notification on An- system. droid, and the Notification Center on iOS. His system utilizes the standard push messaging library 3. Icon Notification: shows notification by making for Android, which is called Cloud to Device Messaging changes on the icon of a sender application in the (C2DM); subscribers must register at the content publisher main menu, e.g., the Badge notification on iOS and the Icon Update function on BlackBerry OS [14]. to receive the messages. In similar research, the Bakabs application has been We will focus on the push service on Android as an ex- created for Android and iOS, Paniagua et al. [9] used ample to demonstrate the application of push service using C2DM and the Apple Push Notification Service (APNS) local notification service and the latest service called to implement push messaging. His application targets to google cloud messaging (GCM) for a status bar and pop provide a management tool that allows retrieving infor- up notification. mation about the web application traffic and then launch B.
Recommended publications
  • Role of Librarian in Internet and World Wide Web Environment K
    Informing Science Information Sciences Volume 4 No 1, 2001 Role of Librarian in Internet and World Wide Web Environment K. Nageswara Rao and KH Babu Defence Research & Development Laboratory Kanchanbagh Post, India [email protected] and [email protected] Abstract The transition of traditional library collections to digital or virtual collections presented the librarian with new opportunities. The Internet, Web en- vironment and associated sophisticated tools have given the librarian a new dynamic role to play and serve the new information based society in bet- ter ways than hitherto. Because of the powerful features of Web i.e. distributed, heterogeneous, collaborative, multimedia, multi-protocol, hyperme- dia-oriented architecture, World Wide Web has revolutionized the way people access information, and has opened up new possibilities in areas such as digital libraries, virtual libraries, scientific information retrieval and dissemination. Not only the world is becoming interconnected, but also the use of Internet and Web has changed the fundamental roles, paradigms, and organizational culture of libraries and librarians as well. The article describes the limitless scope of Internet and Web, the existence of the librarian in the changing environment, parallelism between information sci- ence and information technology, librarians and intelligent agents, working of intelligent agents, strengths, weaknesses, threats and opportunities in- volved in the relationship between librarians and the Web. The role of librarian in Internet and Web environment especially as intermediary, facilita- tor, end-user trainer, Web site builder, researcher, interface designer, knowledge manager and sifter of information resources is also described. Keywords: Role of Librarian, Internet, World Wide Web, Data Mining, Meta Data, Latent Semantic Indexing, Intelligent Agents, Search Intermediary, Facilitator, End-User Trainer, Web Site Builder, Researcher, Interface Designer, Knowledge Man- ager, Sifter.
    [Show full text]
  • The History of Spam Timeline of Events and Notable Occurrences in the Advance of Spam
    The History of Spam Timeline of events and notable occurrences in the advance of spam July 2014 The History of Spam The growth of unsolicited e-mail imposes increasing costs on networks and causes considerable aggravation on the part of e-mail recipients. The history of spam is one that is closely tied to the history and evolution of the Internet itself. 1971 RFC 733: Mail Specifications 1978 First email spam was sent out to users of ARPANET – it was an ad for a presentation by Digital Equipment Corporation (DEC) 1984 Domain Name System (DNS) introduced 1986 Eric Thomas develops first commercial mailing list program called LISTSERV 1988 First know email Chain letter sent 1988 “Spamming” starts as prank by participants in multi-user dungeon games by MUDers (Multi User Dungeon) to fill rivals accounts with unwanted electronic junk mail. 1990 ARPANET terminates 1993 First use of the term spam was for a post from USENET by Richard Depew to news.admin.policy, which was the result of a bug in a software program that caused 200 messages to go out to the news group. The term “spam” itself was thought to have come from the spam skit by Monty Python's Flying Circus. In the sketch, a restaurant serves all its food with lots of spam, and the waitress repeats the word several times in describing how much spam is in the items. When she does this, a group of Vikings in the corner start a song: "Spam, spam, spam, spam, spam, spam, spam, spam, lovely spam! Wonderful spam!" Until told to shut up.
    [Show full text]
  • Boot’ for Computer Best of Outstanding Technology
    Session 2013-2014 ‘Boot’ For Computer Best of Outstanding Technology Department of Computer Science & Engineering Institute of Engineering and Science IPS Academy, Indore 2013-2014 CONTENTS Part A S. List of Titles Page No. No. Programme Education Objectives (PEO)/ Programme 1. I Outcomes (PO) 2. Departmental Information III 3. Vision & Mission of the Department IV 4. Department Faculty Details V 5. Department Event VIII Membership of Professional Societies/ Sports News/ 6. IX Placements 7. Faculty Members Achievements X 8. Students Achievements XII Part B S. No. Topic Page No. 1. Gesture Recognition, Voice Command& Holography 1 Technology 2. First Step To Android Application Development 3 3. Nanotechnology 5 4. Coronal mass ejection 8 5. Big Data Analytics & SAS: An Overview 11 6. Era of Smartphone’s 14 7. Edward Snowden: how the spy story of the age leaked out 18 8. Free Amazon Web Services -and How to Make the Most of 22 them 9. Hacking the Internet - bringing down infrastructure 26 10. Holographic screen 30 11. Review of Energy Awareness in TORA Protocol 32 12. Affective computing and its applications in the apparel retail 33 industry 13. OLED Display Technology 34 14. Continuous Speech Recognition System in Hindi 36 15. OpenStack : Open Source Cloud 37 16. Viruses are Good Thing 40 17. Google Cloud Messaging 42 18. Network Simulater-2 43 19. Intelligent vehicular ad hoc networks (InVANETs) 45 20. Software as a Service (SaaS) 47 21. Infrastructure as a Service (IaaS) 48 22. Advanced Data Recovery 49 Principal Message Technical Education is the most potential instrument for socio-economic change.
    [Show full text]
  • Google Cloud Messaging (GCM) I
    International Journal of Innovative and Emerging Research in Engineering Volume 3, Issue 2, 2016 Available online at www.ijiere.com International Journal of Innovative and Emerging Research in Engineering e-ISSN: 2394 – 3343 p-ISSN: 2394 – 5494 Google Cloud Messaging (GCM) I. Miss. Sana Ismail Khan, II.Prof. Y. S. Patil I. Third Year of Engineering, Student, II. Asstt. Professor. I, II Department of Computer Science & Engineering, Hindi Seva Mandal’s, Shri Sant Gadge Baba College of Engineering & Technology, Bhusawal - 425203, Dist. – Jalgaon, Maharashtra, India ABSTRACT: Today Android is widely used operating system for smart phones; it is used as personal computer also. It contains a touch screen user interface, camera and network monitoring. The entire feature provides ability to cell phone to become a Smartphone. Basically, most of chat application allow user to send instant messages and provide a way to sharing image files also. The main purpose of this paper is to proposed a methodology to provide instant messaging over Google Cloud Messaging (GCM) and also we presents a survey on timing performance of GCM, our findings that the message delivery is uncertain , it does not guarantee to timely message arrival. Therefore is not applicable for time sensitive, but it may be good for application scenarios where random multicasting is sufficient. Keywords: Instant messaging, GCM, Timing performance of GCM I. INTRODUCTION A. Instant messaging: The instant messaging application allows users to register to the system in order to use the application. After users has log in into the system, then the user can add another registered users to be their friends.
    [Show full text]
  • How Secure Is Textsecure?
    How Secure is TextSecure? Tilman Frosch∗y, Christian Mainkay, Christoph Badery, Florian Bergsmay,Jorg¨ Schwenky, Thorsten Holzy ∗G DATA Advanced Analytics GmbH firstname.lastname @gdata.de f g yHorst Gortz¨ Institute for IT-Security Ruhr University Bochum firstname.lastname @rub.de f g Abstract—Instant Messaging has gained popularity by users without providing any kind of authentication. Today, many for both private and business communication as low-cost clients implement only client-to-server encryption via TLS, short message replacement on mobile devices. However, until although security mechanisms like Off the Record (OTR) recently, most mobile messaging apps did not protect confi- communication [3] or SCIMP [4] providing end-to-end con- dentiality or integrity of the messages. fidentiality and integrity are available. Press releases about mass surveillance performed by intelli- With the advent of smartphones, low-cost short-message gence services such as NSA and GCHQ motivated many people alternatives that use the data channel to communicate, to use alternative messaging solutions to preserve the security gained popularity. However, in the context of mobile ap- and privacy of their communication on the Internet. Initially plications, the assumption of classical instant messaging, fueled by Facebook’s acquisition of the hugely popular mobile for instance, that both parties are online at the time the messaging app WHATSAPP, alternatives claiming to provide conversation takes place, is no longer necessarily valid. secure communication experienced a significant increase of new Instead, the mobile context requires solutions that allow for users. asynchronous communication, where a party may be offline A messaging app that claims to provide secure instant for a prolonged time.
    [Show full text]
  • The Internet and the Web T6 a Technical View of System Analysis and Design
    Technology Guides T1 Hardware T2 Software T3 Data and Databases T4 Telecommunications ᮣ T5 The Internet and the Web T6 A Technical View of System Analysis and Design Technology Guide The Internet 5 and the Web T5.1 What Is the Internet? T5.2 Basic Characteristics and Capabilities of the Internet T5.3 Browsing and the World Wide Web T5.4 Communication Tools for the Internet T5.5 Other Internet Tools T5.1 T5.2 Technology Guide The Internet and the Web T5.1 What Is the Internet?1 The Internet (“the Net”) is a network that connects hundreds of thousands of inter- nal organizational computer networks worldwide. Examples of internal organiza- tional computer networks are a university computer system, the computer system of a corporation such as IBM or McDonald’s, a hospital computer system, or a system used by a small business across the street from you. Participating computer systems, called nodes, include PCs, local area networks, database(s), and mainframes.A node may include several networks of an organization, possibly connected by a wide area network. The Internet connects to hundreds of thousands of computer networks in more than 200 countries so that people can access data in other organizations, and can communicate and collaborate around the globe, quickly and inexpensively. Thus, the Internet has become a necessity in the conduct of modern business. The Internet grew out of an experimental project of the Advanced Research Proj- BRIEF HISTORY ect Agency (ARPA) of the U.S. Department of Defense.The project was initiated in 1969 as ARPAnet to test the feasibility of a wide area computer network over which researchers, educators, military personnel, and government agencies could share data, exchange messages, and transfer files.
    [Show full text]
  • Com Google Android Gcm Server Message Example
    Com Google Android Gcm Server Message Example Bistred Rajeev kindled his preference spirit stepwise. If starrier or azoic Seamus usually bad his feds gleek nowhence or exsiccating broadcast and also, how ungroomed is Hilbert? Hari breakwaters fatidically? Channel mobile app is four collapse keys at this is a notification using verse for receiving this is only be useful service will remind us. App needs to the next layout is received information on your experience: the messages you plan to your data to. Solution for gcm servers and obtain the. Next step is not reference the message trough the prevention of incoming as well as well as a million devices get receipt. What happens to be generated backend on mobile no longer needs to be logged in the api key to. Administrators can download this example, wenn sie den unten stehenden link above. Domino server that our newsletter and annoy people. Thanks for future delivery, it is offline mode, or pc using their device language, both payloads will connect to gcm? You create a client app server? Here i used in your app from the push device token multiple parties internally implement code examples of this key. Run the android application servers to set, this demo project number is using the file according to the same thing you now that. You help would like to your settings of third party service across quantum engagement server; back a network verbatim to send this event fires when a centralized mobile. The messages using google servers and handling incoming push messaging solution to the malware on gcm for a dummy echo server will be good thanks.
    [Show full text]
  • Android: Cómo Salirse De Las Garras De Google Y Porqué
    Android: Cómo salirse de las garras de Google y porqué Liber Da Silva 31 años; Desarrollador de software Independiente -pero de Racing-; Asesor en privacidad y contraespionaje; Escepticista crónico; Ignóstico; Zurdo no ortodoxo; Vegetariano no practicante. Mail: [email protected] Web: https://ldasilva.net Google “Don’t be evil” Android Android ● Inicialmente fue desarrollado por Android Inc., adquirida en 2005 por Google. ● Presentado en 2007. ● Sistema operativo móvil más utilizado del mundo, con una cuota de mercado superior al 80 % al año 2017. ● Software Libre: Android Open Source Project (AOSP). ¿Libre? Google Apps (gapps) ● Android Auto ● Google Maps ● Google Translate ● Android System WebView ● Google Messages ● Google VR Services ● Cloud Print ● Google News ● Google Wallpapers ● Device Health Services ● Google Pixel Launcher ● Pixel Icons ● Gmail ● Google Package Installer ● YouTube ● Google Accessibility Suite (TalkBack) ● Google Pay ● Google App (Search) ● Google Phone ● Google Calculator ● Google Photos ● Google Calendar ● Google Play Books ● Google Play Store ● Google Camera ● Google Play Games ● Google Play Services: Google ● Google Chrome ● Google Play Movies & TV Maps Android API - Network ● Google Clock ● Google Play Music Location Provider - Google ● Google Contacts ● Google Play Services Cloud Messaging ● Google Drive ● Google Print Service ● Google Duo ● Google Storage Manager ● Google Keep Notes ● Google Tags (NFC) ● Google Keyboard ● Google Text-to-Speech ● “Es gratis” ○ El producto sos vos ● “El servicio es bueno” ○ Nadie lo duda ● “Yo no tengo nada que ocultar” ○ Manipulación ○ Espionaje ¿Como salir? microG MicroG es un sustituto libre para las gapps teniendo en cuenta la dependencia que tiene Android de Google. Proporciona un mayor control sobre tu privacidad y sin ser tan agresivo con la batería / RAM de tu teléfono.
    [Show full text]
  • Comparative Analysis of Several Real-Time Systems for Tracking People And/Or Moving Objects Using GPS
    ICT Innovations 2015 Web Proceedings ISSN 1857-7288 Comparative Analysis of Several Real-Time Systems for Tracking People and/or Moving Objects using GPS Gligorcho Radinski and Aleksandra Mileva University “Goce Delčev”, Faculty of Computer Science “Krste Misirkov” bb, Štip, Republic of Macedonia {gligorco.21044,aleksandra.mileva}@ugd.edu.mk Abstract. When we talk about real-time systems for tracking people and/or mov- ing objects using a Global Positioning System (GPS), there are several categories of such systems and the ways in which they work. Some uses additional hardware to extend the functionality of the offered opportunities, some are free, some are too complex and cost too much money. This paper aims to provide a clearer pic- ture of several such systems and to show results from a comparative analysis of some popular systems for tracking people and moving objects that use the GPS, like Navixy, Frotcom GPS Vehicle Tracking & Fleet Management System, Fol- lowMee GPS Tracker, Open GPS Tracking System and our system RadinTech- nology GPS Tracking System. Keywords: Navixy, Frotcom, FollowMee GPS Tracker, Open GPS Tracking System, Radian Technology 1 Introduction Recent years, we are witnesses of popularization and versatile applications of GPS tech- nologies. Applications range from military, national security and justice system till per- sonal safety and comfort. For example, the criminal justice system in many countries uses GPS based mobile tracking devices in the form of an ankle bracelet, that specific types of offenders are sometimes required to wear [1]; many fleet operators can monitor the driving behavior of employees, parents can monitor their teen drivers [2, 3, 4, 5];there are special systems for tracking people and their body parts [7], for tracking moving objects in surveillance system [8], even stalking [6], etc.
    [Show full text]
  • Imessage Privacy HITB, Kuala Lumpur, Oct
    Quarkslab on iMessage Privacy HITB, Kuala Lumpur, oct. 2013 @pod2g ([email protected]) gg ([email protected]) Presentations • Quarkslab is a research company specialized in cutting edge solutions to complex security problems. We provide innovative, efficient and practical solutions based on profound knowledge and years of experience in the field. • gg: security researcher, cryptography R.E. specialist. Joined Quarkslab in 2012 • @pod2g: security researcher, long background in Apple product security. Joined Quarkslab in 2013 Plan I. The current political and media context II. The iMessage protocol III. MITM attacks IV. Countermeasures V. Final thoughts I. THE CONTEXT NSA, PRISM, Apple NSA’s PRISM (US-984XN) • American supervision program • Mass surveillance data mining • Based on alliances with american firms • Can collect texts, emails, photos, etc. • Foreigners are also potential targets • Program was leaked by Edward Snowden Is Apple included? • Washington Post have leaked PRISM presentation slides that are said to be coming from the NSA • Looking at them, Apple joined in oct 2012 • Slides talk of « data collection », which sounds like a transparent process Apple publicly says: « Two weeks ago, when technology companies were accused of indiscriminately sharing customer data with government agencies, Apple issued a clear response: We first heard of the government’s “Prism” program when news organizations asked us about it on June 6. We do not provide any government agency with direct access to our servers, and any government agency requesting customer content must get a court order. » Source: https://www.apple.com/apples-commitment-to-customer-privacy/ What about iMessages? « Apple has always placed a priority on protecting our customers’ personal data, and we don’t collect or maintain a mountain of personal details about our customers in the first place.
    [Show full text]
  • ABF Podcast Series and Communication and Media
    Document 1 ABF Podcast Series A monthly podcast series featuring different elements of Australian Border Force will be developed. The series will invite engagement with ABF by the Australian public and related government agencies, promote ABF’s border security arrangements and position ABF as a policy champion. The podcast series will be developed in-house and distributed via a number of suitable podcast directories and the Border.gov.au website. The series could be promoted through LinkedIn, Twitter and Facebook engagement, Border Bulletin, and the revised DIBP intranet. Five reasons to podcast #1: Professional Development From Walkmans to iPods to smartphones, portable music has revolutionised the world, but in today’s society people are looking to take more than music with them–they’re looking for ways to learn more. Podcasts provide opportunities to learn without taking extra time in their day. #2: Trust Websites and blogs are a great way to give valuable information to your audience, but by delivering the same content through a podcast, you’re able to use your voice to bring your content to life. You have the ability to connect with your audience on a more personal level. #3: Mobility According to Eddison Research, nearly two-thirds of podcast consumers do most of their podcast listening on mobile devices. With a website or blog, you are asking an audience to sit down and give you 10 – 15 minutes of their time to read your posts. By turning that same material into a podcast, you’ve opened up your audience from people sitting down at their desk to people in the car, jogging, and working.
    [Show full text]
  • International Research Location Tracking Using Google C
    International Journal of Trend in Scientific Research and Development (IJTSRD) International Open Access Journal ISSN No: 2456 - 6470 | www.ijtsrd.com | Volume - 2 | Issue – 3 Location tracking using Google Cloud Messaging on Android G. Sunderesh Kumar, M. Gokulnath, S. Priya Department of Information Technology, G.K.M. College of Engineering and Technology, Chennai, Tamil Nadu, India ABSTRACT Everyone in this world needed to know where is the especially designs for parents to monitor their family member and the most common way is ―Make children’s on the move. Consider a situation where a A Call To Each One ―Is this a feasible way of doing child lost a way to home or he or she meet with an ? What if someone is busy, or driving a vehicle, or accident in that case child use their tracker app to send he/she not able to take that call right now, so in that alert notification to parents and the web application case what will you do drop a message (WhatsAPP) is display it. The web application is design to handle this what you thinking about then again think about it. various types of alert that broadcast from android app. You call a person he/she not taking your call then you We investigate the following fundamental question - drop a message to theme again ―NO REPLY ―but how fast can we track a family member? And the you desperately want to know his/her current location answer that we got is by calling him but this is not a and you again and again call him or message but feasible or reliable solution.
    [Show full text]