Collaborative Mobile Energy Awareness

Total Page:16

File Type:pdf, Size:1020Kb

Collaborative Mobile Energy Awareness Department of Computer Science Series of Publications A Report A-2014-5 Collaborative Mobile Energy Awareness Eemil Lagerspetz To be presented, with the permission of the Faculty of Science of the University of Helsinki, for public examination in Auditorium A129, Chemicum building, Kumpula, Helsinki on November 24th, 2014 at 12 o'clock noon. University of Helsinki Finland Supervisor Sasu Tarkoma, University of Helsinki, Finland Pre-examiners Jukka Riekki, University of Oulu, Finland Cecilia Mascolo, University of Cambridge, United Kingdom Opponent Sumi Helal, University of Florida, United States of America Custos Sasu Tarkoma, University of Helsinki, Finland Contact information Department of Computer Science P.O. Box 68 (Gustaf H¨allstr¨ominkatu 2b) FI-00014 University of Helsinki Finland Email address: [email protected].fi URL: http://www.cs.helsinki.fi/ Telephone: +358 9 1911, telefax: +358 9 191 51120 Copyright c 2014 Eemil Lagerspetz ISSN 1238-8645 ISBN 978-951-51-0460-1 (paperback) ISBN 978-951-51-0461-8 (PDF) Computing Reviews (1998) Classification: B.8, B.8.2, H.1.2 Helsinki 2014 Unigrafia Collaborative Mobile Energy Awareness Eemil Lagerspetz Department of Computer Science P.O. Box 68, FI-00014 University of Helsinki, Finland [email protected].fi http://www.cs.helsinki.fi/u/lagerspe PhD Thesis, Series of Publications A, Report A-2014-5 Helsinki, November 2014, 60+46 pages ISSN 1238-8645 ISBN 978-951-51-0460-1 (paperback) ISBN 978-951-51-0461-8 (PDF) Abstract We have created a mobile energy measurement application and gathered energy measurement data from over 725,000 devices, running over 300,000 applications, in heterogeneous environments, and constructed models of what is normal in each context for each application. We have used this data to find energy abnormalities in the wild, and provide users of our application advice on how to deal with them. These abnormalities cannot be discovered in laboratory conditions due to the rich interaction of the smartphone and its operating environment. Employing a collaborative mobile energy-awareness application with thousands of users allows us to gather a large amount of data in a short time. Such a large and diverse dataset has helped us answer many research questions. Our work is the first collaborative approach in the area of mobile energy debugging. Information received from each device running our application improves the advice given to other users running the same applications. The author has developed a context data gathering hub for smartphones, discovered the need for a common API that unifies network connectivity, energy awareness, and user experience, and investigated the impact of mobile collaborative energy awareness applications, to find previously unknown energy bugs on smartphones, and to improve users' knowledge of smartphone energy behavior. iii iv Computing Reviews (1998) Categories and Subject Descriptors: B.8 Performance and Reliability B.8.2 Performance Analysis and Design Aids H.1.2 User/Machine Systems, Human factors General Terms: Ph.D. thesis, mobile computing, energy awareness, battery, collaborative Additional Key Words and Phrases: context awareness, power saving, user behavior Acknowledgements I extend my appreciation and thanks to my supervisor, professor Sasu Tarkoma, and professor Ion Stoica, who has supported the work on Carat since the beginning. I would like to thank my co-authors, Adam J. Oliner for coming up with the idea of Carat in the first place, Matei Zaharia for building the Spark cluster computing system that I used for Carat data analysis, Petteri Nurmi for his help and expertise in machine learning algorithms since the beginning of my studies, Ella Peltonen for advertising the Carat project at every opportunity, and the University of California at Berkeley and the AMP Lab for hosting me during the development of Carat. I wish to thank the University of Helsinki, Department of Computer Science, where I did most of my work. I would like to thank the FuNeSoMo exchange program and ICSI for arranging my research visit to Berkeley, CA, USA. My work on Carat would not have been possible without the funding from the Helsinki Doctoral Programme in Computer Science (Hecse). This funding enabled work on the project without diversions. In Helsinki, November 17, 2014 Eemil Lagerspetz v Contents List of Reprinted Publications ix 1 Introduction1 1.1 Motivation ........................... 1 1.2 Problem Statement....................... 2 1.3 Methodology .......................... 5 1.4 Thesis Contributions...................... 6 1.5 Thesis Structure ........................ 9 2 Mobile Energy Efficiency: State of the Art 11 2.1 Middleware and Operating System Layer .......... 12 2.2 Single Device Systems..................... 13 2.3 Statistical Techniques ..................... 15 2.4 Collaborative Systems..................... 15 2.5 Large Datasets and Scalability ................ 16 2.5.1 Centralized Programming, Distributed Execution . 16 2.5.2 Clusters and Cloud Computing............ 17 2.5.3 The MapReduce Paradigm and Spark . 18 2.6 User Behavior.......................... 21 2.7 Context and Energy Awareness................ 21 3 Collaborative Mobile Energy Awareness 23 3.1 Data Gathering for Context Awareness............ 23 3.2 Mobile Operating System Energy APIs............ 25 3.3 Collaborative Mobile Energy Awareness........... 25 3.3.1 Carat Overview..................... 26 3.3.2 Large-Scale Data Analytics.............. 26 3.3.3 Data Collection..................... 27 3.3.4 Method......................... 28 3.3.5 Implementation..................... 31 vi Contents vii 3.3.6 Results ......................... 33 3.3.7 Validation........................ 36 3.4 User Experience ........................ 37 4 Discussion 41 4.1 Research Questions Revisited................. 41 4.2 Scientific Contribution..................... 42 4.3 Practical Impact and Limitations............... 43 4.4 Future Work .......................... 43 5 Conclusions 45 References 47 Research Theme A: Context-Awareness with Data Gathering 61 Research Paper I: BeTelGeuse: A Platform for Gathering and Processing Situational Data.................. 62 Research Theme B: Mobile Operating System Energy Effi- ciency APIs 71 Research Paper II: Arching over the Mobile Computing Chasm: Platforms and Runtimes.................... 71 Research Theme C: Collaborative Energy Awareness 79 Research Paper III: Carat: collaborative energy diagnosis for mobile devices ......................... 79 Research Paper IV: How Carat Affects User Behavior: Implications for Mobile Battery Awareness Applications ......... 96 viii Contents List of Reprinted Publications This thesis consists of an overview and four publications, referred to by PI-PIV. The authors have contributed to these publications as follows. Context-Awareness with Data Gathering Research Paper I: Joonas Kukkonen, Eemil Lagerspetz, Petteri Nurmi, and Mikael Andersson, \BeTelGeuse: A Platform for Gathering and Pro- cessing Situational Data," In IEEE Pervasive Computing, IEEE, 2009, vol. 8, no. 2, pp. 49-56 Contribution: The BeTelGeuse project was started by Petteri Nurmi. The author co-developed the system with J. Kukkonen. The author did roughly half of the design, implementation, testing, and analysis of the work. The author was the lead author of the publication with P. Nurmi and J. Kukkonen. Mobile Operating System Energy Efficiency APIs Research Paper II: Sasu Tarkoma and Eemil Lagerspetz, \Arching over the Mobile Computing Chasm: Platforms and Runtimes," In Computer, IEEE, 2011, vol.44, no.4, pp.22-28 Contribution: This publication is a survey of mobile platforms. The author was the lead author with S. Tarkoma. Particularly, the author gathered and wrote information on Java ME, Android, and Windows Phone 7, with special interest on network and energy monitoring. ix x List of Reprinted Publications Collaborative Energy Awareness Research Paper III: Adam J. Oliner, Anand P. Iyer, Ion Stoica, Eemil Lagerspetz, and Sasu Tarkoma, \Carat: collaborative energy diagnosis for mobile devices," In Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems (SenSys '13), ACM, 2013, Article 10, 14 pages Contribution: A. J. Oliner started the Carat project with the idea to collect battery information from iPhone devices. The author co-authored Carat with Oliner, and came up with the a priori slice weighting for inaccurate iOS battery measurements, as well as the current version of the Carat algorithm, Algorithm1. The author did roughly half of the design, implementation, testing, and analysis of the work. Research Paper IV: Kumaripaba Athukorala, Antti Jylh¨a,Eemil Lager- spetz, Maria von K¨ugelgen,Adam J. Oliner, Sasu Tarkoma, Giulio Jacucci, \How Carat Affects User Behavior: Implications for Mobile Battery Aware- ness Applications," In Proceedings of CHI Conference on Human Factors in Computing Systems (CHI'14), ACM, 2014, pp. 1029-1038 Contribution: This work was directed by K. Athukorala. This publication used data gathered by the Carat Android application, and questionnaire responses from its users. M. von K¨ugelgendesigned the questionnaire together with K. Athukorala. The author designed, implemented, and tested the questionnaire module for Carat that was used to gather ques- tionnaire results from Carat users. The author created the method to match Carat user data with questionnaire responses, and analyze how often users stopped using Hogs and Bugs. The questionnaire responses were analyzed by Athukorala and von K¨ugelgen. Chapter
Recommended publications
  • Microsoft Security Intelligence Report
    Microsoft Security Intelligence Report Volume 20 | July through December, 2015 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. This document is provided “as-is.” Information and views expressed in this document, including URL and other Internet website references, may change without notice. You bear the risk of using it. Copyright © 2016 Microsoft Corporation. All rights reserved. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. Authors Charlie Anthe Dana Kaufman Anthony Penta Cloud and Enterprise Security Azure Active Directory Team Safety Platform Nir Ben Zvi Nasos Kladakis Ina Ragragio Enterprise and Cloud Group Azure Active Directory Team Windows and Devices Group Patti Chrzan Daniel Kondratyuk Tim Rains Microsoft Digital Crimes Unit Azure Active Directory Team Commercial Communications Bulent Egilmez Andrea Lelli Paul Rebriy Office 365 - Information Windows Defender Labs Bing Protection Geoff McDonald Stefan Sellmer Elia Florio Windows Defender Labs Windows Defender Labs Windows Defender Labs Michael McLaughlin Mark Simos Chad Foster Identity Services Enterprise Cybersecurity Bing Group Nam Ng Roger Grimes Enterprise Cybersecurity Vikram Thakur Microsoft IT Group Windows Defender Labs Paul Henry Niall O'Sullivan Alex Weinert Wadeware LLC Microsoft Digital Crimes Unit Azure Active Directory Team Beth Jester Daryl Pecelj Terry Zink Windows Defender Microsoft IT Information
    [Show full text]
  • Message Text
    Keynotes Mixed Signals: Audio and wearable data for health diagnostics Cecilia Mascolo Professor of Mobile System at University of Cambridge Co-director for the Centre for Mobile, Wearable Systems and Augmented Intelligence Considerable research has been conducted into mobile and wearable systems for human health monitoring. This research concentrates on either devising sensing and systems techniques to effectively and efficiently collect data about users, and patients or in studying mechanisms to analyse the data coming from these systems accurately. In both cases, these efforts raise important technical as well as ethical issues. In this talk, I plan to reflect on the challenges and opportunities that mobile and wearable health systems are introducing for community, the developers as well as the users. I will use examples from my group's ongoing research on exploring machine learning and data analysis for health application in collaboration with epidemiologists and clinicians. In particular I will discuss our project on using audio signals for disease diagnostics and our recent work in the context of COVID-19. Biography Cecilia Mascolo is the mother of a teenage daughter but also a Full Professor of Mobile Systems in the Department of Computer Science and Technology, University of Cambridge, UK. She is co-director of the Centre for Mobile, Wearable System and Augmented Intelligence and Deputy Head of Department for Research. She is also a Fellow of Jesus College Cambridge and the recipient of an ERC Advanced Research Grant. Prior joining Cambridge in 2008, she was a faculty member in the Department of Computer Science at University College London.
    [Show full text]
  • Secure Software Distribution System
    SECURE SOFTWARE DISTRIBUTION SYSTEM Tony Bartoletti ([email protected]), Lauri A. Dobbs ([email protected]), Marcey Kelley ([email protected]) Computer Security Technology Center Lawrence Livermore National Laboratory PO Box 808 L-303 Livermore, CA 94551 June 18, 1997 Abstract Authenticating and upgrading system software plays a critical role in information security, yet practical tools for assessing and installing software are lacking in today’s marketplace. The Secure Software Distribution System (SSDS) will provide automated analysis, notification, distribution, and installation of security patches and related software to network-based computer systems in a vendor-independent fashion. SSDS will assist with the authentication of software by comparing the system’s objects with the patch’s objects. SSDS will monitor vendors’ patch sites to determine when new patches are released and will upgrade system software on target systems automatically. This paper describes the design of SSDS. Motivations behind the project, the advantages of SSDS over existing tools as well as the current status of the project are also discussed. Keywords: security, distributed, software management DISCLAIMER This document was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor the University of California nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial products, process or service by trade name, trademark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation, or favoring by the United States Government or the University of California.
    [Show full text]
  • Kace Asset Management Guide
    Kace Asset Management Guide Metaphorical Lucio always evangelising his synarchy if Moishe is capitular or writhe sufferably. Hymenopterous Sibyl always politicks his decimators if Aub is alabastrine or site photogenically. Which Rodolph breezed so fined that Swen inculcated her speculator? With kace customers run quest kace systems management, united states merchant marine academy. Maintenance costs have been annualized over several period on three years to extract their harvest over time. Comparing suites from sap helps clients bring their asset management solutions provider hardinge inc, kace asset management are stored in lifecycle management feature relies on active assets. Learn how asset management leaders are ensuring a reliable and sustainable supply chain, Microsoft and Symantec all require the installation of an agent to perform OS and application discovery tasks, and Symantec problems. You need to unselect a conflict with. Using Custom fields Within software Asset where in Dell KACE, etc. Are you sure you as to delete your attachment? All four evaluated solutions include: antioch university as well as it opens a solution helps track down systems management? An integrated mechanism to report problems and service requests enables prompt response to end users and reduces administrative roadblocks. Product was easy to use. To analyze the opportunities in the market for stakeholders by identifying the high growth segments. Best Practices in Lifecycle Management: Comparing Suites from Dell, and complete security. Although Microsoft does not natively include vulnerability scans, this in proper way detracts from our investment in supporting operating systems regardless of equipment brand. Past performance is just poor indicator of future performance.
    [Show full text]
  • Intel Capital Success Stories
    Intel Capital Success Stories NEXT << Investing in Global Innovation: Stories of Intel Capital’s Impact on Portfolio Companies For questions or to submit a story, contact [email protected] (U.S.) This book is a resource to help you to convey the impact Intel Capital [email protected] (Asia) can have on a start-up. Inside is a series of stories on how individual [email protected] (EMEA) portfolio companies have benefitted from an Intel Capital investment. For each story there is a PowerPoint slide for download, background information, supporting facts, and summaries. All assets on each page are approved for external use. Use these resources in speaking engagements, pipeline meetings, presentations, and other channels. 2 << PREVIOUS NEXT << Table of Contents COMPANY INVESTOR CONSISTENT MARKET EMERGING NETWORK GLOBAL IPO ITD SUCCESS M&A EXPERTISE TECHNOLOGY ADD VALUE REGION Anobit ● ● ● ● Israel Aternity ● ● ● U.S.A./Israel Borqs ● ● ● ● ● China Crisp Media ● ● U.S.A. Fulcrum Microsystems ● ● U.S.A. Gudeng ● ● ● ● Taiwan Happiest Minds ● ● ● India IPTEGO ● ● ● Germany Mall.CZ ● ● ● ● ● Czech Republic Miartech ● ● ● ● China NetPosa ● ● ● China Solera ● ● ● ● ● U.S.A. SweetLabs ● ● ● ● U.S.A. V-Cube ● ● ● Japan Virtustream ● ● ● U.S.A. WS02 ● ● ● ● Sri Lanka 3 << << TABLE OF CONTENTS PREVIOUS NEXT << Anobit SUMMARY: POWERPOINT/TALKING POINTS: Recognizing the huge potential of Anobit’s flash memory technology, Intel Capital invested significantly in the company in 2010 and helped pave the way for the company’s acquisition by Apple in 2012. FULL STORY/BACKGROUND: In recent years, a number of high-tech companies have moved away from hard drives in favor of solid state storage, using flash memory chips to make truly mobile computing devices that are small, compact, and energy efficient.
    [Show full text]
  • Installing and Removing Software
    CHAPTER 28 Installing and Removing Software One of the fun things about running any operating system is the ability to expand it—to add in new software over time to improve your workflow or just enhance entertainment value. Linux is blessed in this regard, because tens of thousands of software titles are avail- able to meet almost every need. However, even if you’ve tracked down the ideal software title, there’s just one barrier to overcome: installing it on your system. Installing software under Ubuntu isn’t the same as with Windows, and indeed you can’t simply install any application you come across on the Internet, because these are most likely to be Windows versions. See Chapter 11 for more information on Linux ver- sions of common Windows applications. Users are afforded a lot more power over what happens to their systems, but this comes at the expense of needing to take a little time to understand the terminology and techniques. That is what you’ll learn in this chapter. Software Installation Basics Installing programs on Windows is relatively easy. If you wish to use the WinZip archive tool, for example, you can browse to the web site, download the installer *ata file, and install the software. Although you might not realize it, a lot of work goes into making this apparently simple task possible. After the original software has been created by the pro- grammers, it must be made into a form that you, the end user, can deal with. The first thing to happen is that the software is compiled.
    [Show full text]
  • This Thesis Has Been Submitted in Fulfilment of the Requirements for a Postgraduate Degree (E.G
    This thesis has been submitted in fulfilment of the requirements for a postgraduate degree (e.g. PhD, MPhil, DClinPsychol) at the University of Edinburgh. Please note the following terms and conditions of use: This work is protected by copyright and other intellectual property rights, which are retained by the thesis author, unless otherwise stated. A copy can be downloaded for personal non-commercial research or study, without prior permission or charge. This thesis cannot be reproduced or quoted extensively from without first obtaining permission in writing from the author. The content must not be changed in any way or sold commercially in any format or medium without the formal permission of the author. When referring to this work, full bibliographic details including the author, title, awarding institution and date of the thesis must be given. Multimodal Sensing for Robust and Energy-Efficient Context Detection with Smart Mobile Devices Valentin Radu Doctor of Philosophy Institute of Computing Systems Architecture School of Informatics University of Edinburgh 2017 Abstract Adoption of smart mobile devices (smartphones, wearables, etc.) is rapidly grow- ing. There are already over 2 billion smartphone users worldwide [1] and the per- centage of smartphone users is expected to be over 50% in the next five years [2]. These devices feature rich sensing capabilities which allow inferences about mobile device user’s surroundings and behavior. Multiple and diverse sensors common on such mobile devices facilitate observing the environment from different perspectives, which helps to increase robustness of inferences and enables more complex context detection tasks. Though a larger number of sensing modalities can be beneficial for more accurate and wider mobile context detection, integrating these sensor streams is non-trivial.
    [Show full text]
  • Deploying Ipad to Patients Setup Guide
    Deploying iPad to Patients Setup Guide Contents Overview Overview Healthcare institutions are increasingly focused on engaging patients and delivering Getting Prepared a great experience throughout their stay in the hospital. Deploying iPad with Evaluate your infrastructure patient-centered apps enables hospitals to enhance each step of the patient journey, Create a configuration from check-in through discharge. With third-party iOS apps, hospitals can empower Automate device setup patients to access their daily schedule, connect with their care team, track their progress, Distribute apps get educated on their treatment plan, and personalize their entertainment—putting In-Room Storage patients in the center of care. Initial setup Reset your device This Setup Guide offers guidance to the hospital IT staff who are configuring and Centralized Storage deploying iPad for patients to use. iPad can be preconfigured with minimal setup so Set up Apple Configurator patients have access to iOS apps, and IT can use mobile device management (MDM) Automate device refresh to protect patient data while also preserving a great user experience. Once a patient Install Apple Remote Desktop has been discharged, the iPad can be securely wiped so all patient-generated data is Summary removed, and reset to factory settings so it’s ready for the next patient to use. A key decision when deploying iPad to patients is to choose between in-room versus centralized storage of the device (described in the In-Room Storage and Centralized Storage sections). Regardless of which deployment scenario you choose, the preparation steps described in this paper are important for any successful deployment.
    [Show full text]
  • Bigfix Lifecycle SWD User Guide
    BigFix Software Distribution User's Guide Special notice Before using this information and the product it supports, read the information in Notices (on page 144). Edition notice This edition applies to version 9.5 of BigFix and to all subsequent releases and modifications until otherwise indicated in new editions. Contents Chapter 1. Overview.......................................................................................................... 1 What's new in Software Distribution....................................................................................2 System requirements.......................................................................................................... 10 Supported package types...................................................................................................11 Chapter 2. Best practices................................................................................................13 Policy-based distributions...................................................................................................13 Authorization........................................................................................................................13 Prerequisites........................................................................................................................ 13 Site organization..................................................................................................................14 Chapter 3. Dashboards overview....................................................................................
    [Show full text]
  • Deploying Ipad to Patients Setup Guide
    Deploying iPad to Patients Setup Guide Contents Overview Overview Healthcare institutions are increasingly focused on engaging patients to Getting Prepared become actively engaged in their health and delivering a great experience Evaluate your infrastructure throughout their stay in the hospital. Deploying iPad with patient-centered apps Create a configuration enables hospitals to enhance each step of the patient journey, from check-in Automate device setup through discharge. With third-party iPadOS apps, hospitals can empower In-Room Storage patients to access their daily schedule, connect with their care team, track Perform initial setup their progress, get educated on their treatment plan, and personalize their Reset your device entertainment—putting patients in the center of care. Centralized Storage This Setup Guide offers guidance to the hospital IT staff who are configuring Set up Apple Configurator and deploying iPad for patients to use. iPad can be preconfigured with minimal Automate device refresh setup so patients have access to iPadOS apps, and IT can use mobile device Install Apple Remote Desktop management (MDM) to protect patient data while also preserving a great user experience. Once a patient has been discharged, the iPad can be securely Summary wiped so all patient-generated data is removed, and reset to factory settings so it’s ready for the next patient to use. A key decision when deploying iPad to patients is to choose between in-room versus centralized storage of the device (described in the In-Room Storage and Centralized Storage sections). In-room storage is enabled by over-the-air (OTA) wiping and resetting of iPad, which allows devices to stay in the patient room at all times.
    [Show full text]
  • David Kotz Vita
    David Kotz Department of Computer Science www.cs.dartmouth.edu/∼kotz Dartmouth College kotz at dartmouth.edu 6211 Sudikoff Laboratory +1 603–646-1439 (direct) Hanover, NH 03755-3510 +1 603–646-2206 (main) LinkedIn September 19, 2021 Education Ph.D Computer Science Duke University 1991 B.A. Computer Science and Physics Dartmouth College 1986 Positions Dartmouth College, Administration 2021– Interim Provost 2017–2018 Interim Provost (11 months) 2009–2015 Associate Dean of the Faculty for the Sciences (six years) Dartmouth College, Research leadership 2016– Core Director (Emerging Technologies and Data Analytics), Center for Technology and Behavioral Health 2004–2007 Executive Director, Institute for Security Technology Studies 2003–2004 Director of Research and Development, Institute for Security Technology Studies Dartmouth College, Faculty: Department of Computer Science 2020– Pat and John Rosenwald Professor (endowed chair) 2019–2020 International Paper Professor (endowed chair) 2010–2019 Champion International Professor (endowed chair) 2003– Professor 1997–2003 Associate Professor 1991–1997 Assistant Professor Visiting positions 2019–2020 Visiting Professor in the Center for Digital Health Interventions at ETH Zurich,¨ Switzerland 2008–2009 Fulbright Research Scholar at the Indian Institute of Science (IISc), Bangalore, India Executive summary David Kotz is the Interim Provost, the Pat and John Rosenwald Professor in the Department of Computer Science, and the Director of Emerging Technologies and Data Analytics in the Center for Technology and Behavioral Health, all at Dartmouth College. He previously served as Associate Dean of the Faculty for the Sciences and as the Executive Director of the Institute for Security Technology Studies. His research interests include security and privacy in smart homes, pervasive computing for healthcare, and wireless networks.
    [Show full text]
  • NEURAL COMPUTING 17 Sailee Chitre – T.Y.B.Sc
    Our Vision is to establish a leading centre of imparting Quality Education in the field of Science, Commerce and Management with emphasis on: ensuring that students learn the fundamental concepts in various disciplines. motivating students to apply the Scientific & Technological knowledge to develop problem solving capabilities. making students aware of the societal and environmental needs with specific appreciation of the emerging global context. Our mission is to provide : an educational environment where students can reach their full potential in their chosen discipline and become responsible citizens without compromising in ethics a scholarly environment where the talents of both, the faculty members and students are nurtured and used to create knowledge and technology for the benefit of the society. 1 INDEX Sr. No. Topic Page No. 1. 3D PASSWORD FOR MORE SECURE AUTHENTICATION 3 Manisha Patel – T.Y.B.Sc IT 2. ARTIFICIAL INTELLIGENCE IN PROGRAMMING 5 Jay Bhosale – T.Y.B.Sc. IT 3. COMPUTER THAT YOU CAN WEAR 9 Shailendra Mane – T.Y.B.Sc. IT 4. ETHICAL HACKING 12 Manali Darandale – T.Y.B.Sc. IT 5. FOOT PRINTING 14 Bhavesh Naik – S.Y.B.Sc IT 6. NEURAL COMPUTING 17 Sailee Chitre – T.Y.B.Sc. IT 7. ORGANIC LIGHT EMITTING DIODE DISPLAY 20 Angad Anand – T.Y.B.Sc. IT 8. VERIZON 4G LTE NETWORK 23 Dhaval Jain – T.Y.B.Sc. IT 9. MEEGO 25 Nivedita Tikadar – T.Y.B.Sc IT 10. A CHANGE FROM IPv4 TO IPv6 33 Vivek Kapadia – S.Y.B.Sc.I.T 11. BLACKBERRY MESSENGER 36 Rahul Nayak – S.Y.B.Sc.I.T 12.
    [Show full text]