Open Thesis.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

Open Thesis.Pdf The Pennsylvania State University The Graduate School ENERGY OPTIMIZATION FOR WIRELESS COMMUNICATIONS ON MOBILE DEVICES A Dissertation in Computer Science and Engineering by Yi Yang c 2018 Yi Yang Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy May 2018 The dissertation of Yi Yang was reviewed and approved∗ by the following: Guohong Cao Professor of Computer Science and Engineering Dissertation Advisor, Chair of Committee George Kesidis Professor of Computer Science and Engineering Professor of Electrical Engineering Sencun Zhu Associate Professor of Computer Science and Engineering Dinghao Wu Associate Professor of Information Sciences and Technology Mahmut Taylan Kandemir Professor of Computer Science and Engineering Graduate Program Chair of Computer Science and Engineering ∗Signatures are on file in the Graduate School. Abstract Mobile devices such as smartphones and smartwatches are becoming increasingly popular accompanied with a wide range of apps. Those apps usually require data communications through wireless interfaces, which will drain the battery quickly. Thus, it is of great value to characterize the energy consumption of wireless com- munications and propose energy saving solutions. The specific goal of this dissertation is to optimize the energy consumption of wireless communications on mobile devices. Specifically, this dissertation has four foci. First, we propose network quality aware prefetching algorithms to save energy for in-app advertising. The cellular interface on smartphones continues to consume a large amount of energy after a data transmission (referred to as the long tail problem). Then periodically fetching ads through the cellular network may lead to significant battery drain on smartphones. To reduce the tail energy, we can predict the number of ads needed in the future and then prefetch those ads together. However, prefetching unnecessary ads may waste both energy and cellu- lar bandwidth, and this problem becomes worse when the network quality is poor. To solve this problem, we propose network quality aware prefetching algorithms. We first design a prediction algorithm which generates a set of prefetching options with various probabilities, and then we propose two prefetching algorithms to select the best prefetching option by considering the effect of network quality. Second, we generalize the prefetching problem, where the goal is to find a prefetching schedule that minimizes the energy consumption of the data transmissions under the current network condition. To solve the formulated nonlinear optimization problem, we first propose a greedy algorithm, and then propose a discrete algorithm with better performance. Third, we consider the context information when offloading tasks for wearable devices. Considering the low energy consumption of the Bluetooth data transmissions, wearable devices usually offload computationally intensive tasks to the connected smartphone via Bluetooth. However, existing smartphones cannot iii properly allocate CPU resources to these offloaded tasks due to lack of context information, resulting in either energy waste on smartphones or high interaction latency on wearable devices. To address this issue, we propose a context-aware task offloading framework, in which offloaded tasks can be properly executed on the smartphone or further offloaded to the cloud based on their context, aiming to achieve a balance between good user experience on wearable devices and en- ergy saving on the smartphone. Finally, we characterize and optimize Bluetooth energy consumption on smartwatches. Bluetooth is used for data communications between smartwatches and smartphones, but its energy consumption has been rarely studied. To solve the problem, we first establish the Bluetooth power model and then we perform an in-depth investigation of the background data transfers on smartwatches. We found that those data transfers consume a large amount of energy due to the energy inefficiency attributed to the adverse interaction be- tween the data transfer pattern (i.e., frequently transferring small data) and the Bluetooth energy characteristics (i.e., the tail effect). Based on these findings, we propose four techniques to save Bluetooth energy for smartwatches. iv Table of Contents List of Figures x List of Tables xiv Acknowledgments xv Chapter 1 Introduction 1 1.1 Motivation . 2 1.2 Challenges . 3 1.3 Focus of This Dissertation . 5 1.3.1 Energy-Aware Advertising through Quality-Aware Prefetch- ing on Smartphones . 5 1.3.2 Prefetch-Based Energy Optimization on Smartphones . 6 1.3.3 Context-Aware Task Offloading for Wearable Devices . 6 1.3.4 Characterizing and Optimizing Background Data Transfers on Smartwatches . 7 1.4 Organization . 8 Chapter 2 Energy-Aware Advertising through Quality-Aware Prefetching on Smartphones 9 2.1 Introduction . 9 2.2 Related Work . 11 2.3 Preliminaries . 13 2.3.1 Background: In-app Advertising . 13 2.3.1.1 In-app Ad Ecosystem . 13 v 2.3.1.2 In-app Ad Format and Size . 13 2.3.1.3 What Ads to Prefetch . 14 2.3.2 Design Considerations and Basic Ideas . 14 2.4 Network Quality Aware Prefetching . 15 2.4.1 Prediction Based on a Series of Probabilities . 15 2.4.1.1 Feature Selection . 17 2.4.1.2 App Usage Record . 17 2.4.1.3 Partitioning App Usage Records into Clusters . 19 2.4.1.4 Classifying Current App Usage to a Cluster . 19 2.4.1.5 Generating Prediction Results for a Cluster . 20 2.4.2 Prefetching Algorithms . 20 2.4.2.1 Energy Model . 21 2.4.2.2 Network Quality . 22 2.4.2.3 Energy-aware Prefetching Algorithm . 23 2.4.2.4 Energy-and-data Aware Prefetching Algorithm . 25 2.5 Performance Evaluation . 26 2.5.1 Evaluation Setup . 27 2.5.1.1 App Usage Trace . 27 2.5.1.2 Measuring Network Quality . 27 2.5.2 Evaluation Result (Measurement-based Network Quality) . 29 2.6 Testbed Development and Evaluation . 30 2.6.1 Testbed Development . 31 2.6.2 Experimental Results . 31 2.7 Conclusion . 32 Chapter 3 Prefetch-Based Energy Optimization on Smartphones 33 3.1 Introduction . 33 3.2 Related Work . 35 3.3 Preliminaries . 36 3.3.1 Energy Model . 36 3.3.2 Motivations . 39 3.4 Prefetch-Based Energy Optimization . 41 3.4.1 Problem Formulation . 41 3.4.2 Greedy Algorithm . 42 3.4.3 Discrete Algorithm . 43 3.4.3.1 Value of the segment size A . 45 3.4.4 Greedy Algorithm vs Discrete Algorithm . 46 3.4.5 Discussions . 46 3.5 Performance Evaluations: In-app Advertising . 47 vi 3.5.1 In-app Advertising . 47 3.5.2 Ad Prefetching Algorithm . 48 3.5.3 App Usage and Throughput Traces . 48 3.5.4 Parameter Setup and Algorithm Training . 49 3.5.5 Trace-Driven Simulations . 50 3.5.6 Testbed Development and Evaluation . 51 3.6 Performance Evaluations: Mobile Video Streaming . 53 3.6.1 Mobile Video Streaming . 53 3.6.2 Mobile Video Streaming Algorithms . 53 3.6.3 Video Viewing Traces . 54 3.6.4 Trace-Driven Simulations . 55 3.6.4.1 Energy Consumption . 55 3.6.4.2 Data Wastage . 57 3.6.5 Testbed Development and Evaluation . 58 3.6.5.1 Parameter Setup . 59 3.6.5.2 Evaluation Results . 59 3.6.5.3 Compatibility with DASH . 61 3.7 Conclusions . 61 Chapter 4 Context-Aware Task Offloading for Wearable Devices 63 4.1 Introduction . 63 4.2 Preliminaries . 65 4.2.1 Task Execution in Android . 66 4.2.2 big.LITTLE Architecture on Smartphones . 67 4.2.3 big.LITTLE Support in Android . 68 4.3 The Motivation for Context-Aware Task Offloading . 68 4.4 Context-Aware Task Offloading (CATO) . 70 4.4.1 CATO Overview . 70 4.4.2 Client and Server Proxies . 71 4.4.3 Profiler . 72 4.4.3.1 CPU Profiling . 72 4.4.3.2 Network Profiling . 73 4.4.4 Solver . 74 4.4.4.1 Estimating Latency and Energy Cost . 74 4.4.4.2 Offload Decision . 76 4.5 Implementation . 77 4.5.1 CATO API . 78 4.5.1.1 Preparing a Task . 78 4.5.1.2 Offloading a Task . 78 vii 4.5.2 Applications . 78 4.5.2.1 Speech Recognition . 78 4.5.2.2 Smart Alarm . 79 4.6 Performance Evaluation . 79 4.6.1 Experimental Setup . 80 4.6.2 Speech Recognition . 82 4.6.3 Smart Alarm . 83 4.6.4 CATO Overhead . 83 4.7 Related Work . 84 4.8 Conclusion . 85 Chapter 5 Characterizing and Optimizing Background Data Transfers on Smartwatches 86 5.1 Introduction . 86 5.2 Related Work . 88 5.3 Preliminaries . 89 5.3.1 Bluetooth Overview . 90 5.3.2 Bluetooth Modes . 91 5.3.3 Bluetooth on Android Smartwatches . 92 5.4 Bluetooth Power Model . 93 5.4.1 Methodology . 93 5.4.2 Power Model . 94 5.4.3 Model Validation . 96 5.5 Background Data Transfers on Smartwatches . 97 5.5.1 Packet Traces . 97 5.5.2 Origins of Background Data Transfers . 97 5.5.3 Energy Impact . 99 5.5.3.1 Energy breakdown for each application . 100 5.5.3.2 Total energy impact . 100 5.6 Energy Optimizing Techniques . 102 5.6.1 Fast Dormancy . 102 5.6.2 Phone Initiated Polling . 103 5.6.3 Two-stage Sensor Processing . ..
Recommended publications
  • June 7, 2010 ANALYSIS of the FTC's DECISION NOT to BLOCK
    June 7, 2010 ANALYSIS OF THE FTC’S DECISION NOT TO BLOCK GOOGLE’S ACQUISITION OF ADMOB Randy Stutz and Richard Brunell* Introduction On May 21, 2010, after months of investigation, the Federal Trade Commission (FTC) announced that it would not challenge Google’s $750 million acquisition of AdMob, a mobile advertising network and mobile ad solutions and services provider.1 In this white paper, we present AAI’s analysis of the FTC’s decision. The FTC found that, but for recent developments concerning Apple, the acquisition “appeared likely to lead to a substantial lessening of competition in violation of Section 7 of the Clayton Act.” According to the FTC, Google and AdMob “currently are the two leading mobile advertising networks, and the Commission was concerned about the loss of head-to-head competition between them.” The companies “generate the most revenue among mobile advertising networks, and both companies are particularly strong in … performance ad networks,” i.e. those networks that sell advertising by auction on a “per click” or other direct response basis. Without necessarily defining a relevant market, the Commission apparently saw a likelihood of unilateral anticompetitive effects, as it found “each of the merging parties viewed the other as its primary competitor, and that each firm made business decisions in direct response to this perceived competitive threat.” Yet, Apple’s acquisition of the third largest mobile ad network, Quattro Wireless, in December 2009, and its introduction of its own mobile advertising network, iAd, as part of its iPhone applications package, convinced the FTC that the anticompetitive effects of the acquisition “should [be] mitigate[d].” The Commission “ha[d] reason to believe that Apple * Randy Stutz is a Research Fellow and Richard Brunell is the Director of Legal Advocacy of the American Antitrust Institute (AAI), a non-profit research and advocacy organization devoted to advancing the role of competition in the economy, protecting consumers, and sustaining the vitality of the antitrust laws.
    [Show full text]
  • July 23, 2020 the Honorable William P. Barr Attorney General United
    July 23, 2020 The Honorable William P. Barr Attorney General United States Department of Justice 950 Pennsylvania Avenue, NW Washington, DC 20530 Dear Attorney General Barr: We write to raise serious concerns regarding Google LLC’s (Google) proposed acquisition of Fitbit, Inc. (Fitbit).1 We are aware that the Antitrust Division of the Department of Justice is investigating this transaction and has issued a Second Request to gather additional information about the acquisition’s potential effects on competition.2 Amid reports that Google is offering modest, short-term concessions to overseas enforcers to avoid a full-scale investigation of the transaction in Europe,3 we write to urge the Division to continue with its efforts to conduct a thorough and comprehensive review of this proposed merger and to take any and all enforcement action warranted by the law and the evidence. It is no exaggeration to say that Google is under intense antitrust scrutiny across the globe. As you know, the company has been under investigation for potential anticompetitive conduct across a number of product markets by the Department and numerous state attorneys general, as well as by a number of foreign competition enforcers, some of which are also reviewing the proposed Fitbit acquisition. Competition concerns about Google are widespread and bipartisan. Against this backdrop, in November 2019, Google announced its proposed acquisition of Fitbit for $2.1 billion, a staggering 71 percent premium over Fitbit’s pre-announcement stock price.4 Fitbit—which makes wearable technology devices, such as smartwatches and fitness trackers— has more than 28 million active users submitting sensitive location and health data to the company.
    [Show full text]
  • Gmail for Devices.Docx
    Gmail onto iPads Follow the steps below to setup Google Sync on your iPhone, iPad, or iPod Touch. Getting Started 1. Open the Settings application on your device's home screen. 2. Open Mail, Contacts, Calendars. 3. Press Add Account.... 4. Select Microsoft Exchange Enter Account Info 5. In the Email field, enter your full Google Account email address. Use your sedubois account: Example is [email protected], you may see an "Unable to verify certificate" warning when you proceed to the next step. 6. Leave the Domain field blank. 7. Enter your full Google Account email address as the Username. 8. Enter your Google Account password as the Password. 9. Tap Next at the top of your screen. 9a. Choose Cancel if the Unable to Verify Certificate dialog appears. 10. When the new Server field appears, enter m.google.com. ● To access m.google.com, set the language to English (US). 11. Press Next at the top of your screen again. Set up "Send Mail As" feature Enable "Send Mail As" feature Gmail and Google Apps users can send mail from a custom "From" address using the web browser on their iOS device or computer. 1. Sign in to Gmail using your web browser. 2. Click the gear in the top right. 3. Select Settings. 4. Select the Accounts tab. 5. Under Send mail as, click Add another email address you own. 6. In the Email address field, enter your name and alternate email address. If you want this address to be your default one, deselect Treat as an alias.
    [Show full text]
  • Amicus Link Guide: Google Contacts & Calendar
    Amicus Link Guide: Google Contacts & Calendar Applies to: Amicus Attorney Synchronize your Amicus and Google contacts and appointments. About the Link 2 What you need 2 Advantages of using the Link 3 Link overview 4 Synchronization direction 4 When synchronizations occur 4 Administering the Link at the firm level 5 Amicus Administrator checklist 5 Ensuring that Firm Members have access rights 5 Configuring the Link 6 Firm Member checklist 6 Special note if upgrading from an earlier version of Amicus Attorney 6 Using the Link Configuration wizard 7 Initializing the Link 14 Using the Link after initialization 16 Synchronizing information 16 Flagging individual Amicus Contacts & Appointments for synchronization 16 Preference settings for new items 17 Changing your Link configuration 18 Disabling the Link 18 Synchronization details 19 Match criteria 19 Contact synchronizations 20 Appointment synchronizations 21 Troubleshooting 23 Google Link Log 23 Resetting the Link 23 Other Important Information 24 Amicus Google Contacts & Calendar Link Guide © 2020 Abacus Data Systems Canada, Inc. 1 About the Link The Amicus Google Contacts & Calendar Link provides bi-directional synchronization that aligns your Amicus and Google Contacts and Appointments, and optionally Amicus Firm Members. And the sync is server-side. That means your Amicus workstation doesn’t have to be running when the sync takes place—a sync takes place automatically about every 15 minutes, regardless. And your assistant can do an immediate sync for you if necessary. You stay up to date when away from the office. Only Amicus Contacts and Appointments that are individually designated by you are synchronized. You select which of your Google Calendars to synchronize.
    [Show full text]
  • If Google Is a 'Bad' Monopoly, What Should Be Done?
    If Google Is A 'Bad' Monopoly, What Should Be Done? Google Inc. is currently subject to antitrust investigations by state attorneys general in the United States, as well as antitrust authorities in the European Union. Google and its allies have mounted a vigorous public defense, arguing that Google’s activity should be immune from antitrust scrutiny or that imposing a remedy on Google would transform antitrust enforcers into some kind of undesirable “software regulatory agency,” which would threaten innovation in the Internet. These arguments are reminiscent of the claims made 20 years ago that antitrust analysis was too outdated to apply to high-tech industries. That argument was rejected then, and it should be rejected now. Exclusionary conduct by a dominant firm can distort fair competition in high-tech markets, Samuel Miller just as in more traditional markets. Antitrust remedies can, and should, be imposed to make sure that a dominant company does not improperly keep rivals out of its markets or improperly strengthen its dominant position, to the detriment of consumers and innovation. EU Competition Commissioner Joaquin Almunia rejected Google’s original proposals to resolve claims of anti-competitive conduct in July 2013, and is currently considering a revised proposal submitted by Google. So what remedy proposals would make sense? This article will outline potential antitrust remedies that may appropriately be imposed upon Google, assuming antitrust authorities or courts determine that Google has violated the antitrust laws. What Is an Illegal Monopoly? A company violates Section 2 of the Sherman Act when it acquires or maintains or “monopoly power” in a relevant market by “exclusionary” conduct.
    [Show full text]
  • Technology Tidbits Title
    Volume 4, Issue 1 August 2017 C O L C H E S T E R I NFORMATION T E C H N O L O G Y D EPARTMENT T ECHNOLOGY TIDBITS INSIDE THIS ISSUE: Welcome Back! T ITLE Welcome Back 1 Welcome back to the Colchester School District for the 2017 – 2018 school year. We hope that Movie Creation 1 you had a fantastic summer. It is hard to believe Old Wireless 2 we are ready to start a new school year. This summer has been quite busy for IT, as we have Team Drive 3 been preparing technology for the start of the new school year. If you return to your building Android Apps 3 and/or classroom and something is not as you Windows 10 4 desire, please submit a helpdesk ticket, and we will help you as quickly as possible. Laptops for CHS Students! Interactive Projectors 5 Certain classrooms received new interactive Google Drive Sync 5 respond appropriately to your needs and projectors over the summer whereas others had to get the most out of our limited Technology Helpdesk 6 them installed towards the end of last year. If resources. I often hear when I am out in anyone needs a refresher course on how to use the buildings that technology is not the new technology, please review the article on working properly. When I inquire further, the subject later in this newsletter. If you need a it is not uncommon to learn that a more personal touch, please submit a helpdesk conversation was had with a technician in ticket.
    [Show full text]
  • Mobile Developer's Guide to the Galaxy
    Don’t Panic MOBILE DEVELOPER’S GUIDE TO THE GALAXY U PD A TE D & EX TE ND 12th ED EDITION published by: Services and Tools for All Mobile Platforms Enough Software GmbH + Co. KG Sögestrasse 70 28195 Bremen Germany www.enough.de Please send your feedback, questions or sponsorship requests to: [email protected] Follow us on Twitter: @enoughsoftware 12th Edition February 2013 This Developer Guide is licensed under the Creative Commons Some Rights Reserved License. Editors: Marco Tabor (Enough Software) Julian Harty Izabella Balce Art Direction and Design by Andrej Balaz (Enough Software) Mobile Developer’s Guide Contents I Prologue 1 The Galaxy of Mobile: An Introduction 1 Topology: Form Factors and Usage Patterns 2 Star Formation: Creating a Mobile Service 6 The Universe of Mobile Operating Systems 12 About Time and Space 12 Lost in Space 14 Conceptional Design For Mobile 14 Capturing The Idea 16 Designing User Experience 22 Android 22 The Ecosystem 24 Prerequisites 25 Implementation 28 Testing 30 Building 30 Signing 31 Distribution 32 Monetization 34 BlackBerry Java Apps 34 The Ecosystem 35 Prerequisites 36 Implementation 38 Testing 39 Signing 39 Distribution 40 Learn More 42 BlackBerry 10 42 The Ecosystem 43 Development 51 Testing 51 Signing 52 Distribution 54 iOS 54 The Ecosystem 55 Technology Overview 57 Testing & Debugging 59 Learn More 62 Java ME (J2ME) 62 The Ecosystem 63 Prerequisites 64 Implementation 67 Testing 68 Porting 70 Signing 71 Distribution 72 Learn More 4 75 Windows Phone 75 The Ecosystem 76 Implementation 82 Testing
    [Show full text]
  • GOOGLE ADVERTISING TOOLS (FORMERLY DOUBLECLICK) OVERVIEW Last Updated October 1, 2019
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
    [Show full text]
  • Online Advertising in the UK
    Online advertising in the UK A report commissioned by the Department for Digital, Culture, Media & Sport January 2019 Stephen Adshead, Grant Forsyth, Sam Wood, Laura Wilkinson plumconsulting.co.uk About Plum Plum is an independent consulting firm, focused on the telecommunications, media, technology, and adjacent sectors. We apply extensive industry knowledge, consulting experience, and rigorous analysis to address challenges and opportunities across regulatory, radio spectrum, economic, commercial, and technology domains. About this study This study for the Department of Digital, Culture, Media & Sport explores the structure of the online advertising sector, and the movement of data, content and money through the online advertising supply chain. It also assesses the potential for harms to arise as a result of the structure and operation of the sector. Plum Consulting 10 Fitzroy Square London W1T 5HP T +44 20 7047 1919 E [email protected] Online advertising in the UK Contents Executive summary 5 Introduction 5 Taxonomy of online advertising 6 Market size and growth 7 Value chain and roles 8 Market dynamics 11 Money flows 12 Data flows 14 Ad flows and control points 16 Assessment of potential harms 17 1 Introduction 20 1.1 Terms of reference 20 1.2 Methodology 20 1.3 Caveats 20 1.4 Press publishers 21 1.5 Structure of this report 21 2 Taxonomy of online advertising 22 2.1 Online advertising formats 22 2.2 Targeting of online advertising 33 2.3 Future developments 34 3 Market size and growth 35 4 Value chain and roles 40 4.1 Overview
    [Show full text]
  • Better Alignment of Flash Storage to Mobile System Behavior
    The SanDisk Brand § A global leader in storage technology § Most compelling value proposition § Unmatched innovation and IP § We are Data Champions 1 The Better Alignment of Managed Flash To System Behavior Alex Lemberg SW Manager 2 Agenda § Flash Storage in Mobile & Embedded § Real Performance Requirements § The Gap Between Synthetic and User Activities § Usage Case – Performance Peaks § How to Handle Performance Peaks in Flash Management Architecture § How it Affects the Endurance § Driver Support How to Get Better Performance? 3 Embedded Flash Memory is Everywhere IoT MOBILE WEARABLES COMPUTE HOME AUTO INDUSTRIAL 4 The “Real” Storage Performance Requirements § What is the Most Important Performance Metric? Sequential Write (MB/Sec) Sequential Read (MB/Sec) – Synthetic Benchmarks Random Write (IOPS) Random Read (IOPS) SQL Insert/Update/Delete IO Latency – System Analysis IO Flow IO Stack Level ? App Launch Time – User Experience Boot Time Multitasking Etc. 5 Getting IO Metrics – Is the Key 24-96 Hours of intensive “managed” user activity Statistics System Analysis & Research Wide platforms coverage Simulations \ Testing User Experience Various Android & Linux Versions 7 OEMs 16GB-64GB High End/Mid Range 1GB-4GB RAM EXT4/F2FS Regions 6 Enhanced Low Level Tracing Catch the Process and FS Info eMMC Device Driver Trace point eMMC Host Controller eMMC Device 7 Enhanced Low Level Tracing Allows to Gather Per-Process Stat. User Operation Context Gmail, W PS In stagram WifiDirect + Gmail 2.5K Night Suspend AppInstall + 4 K P layb ack (~16 Hours)
    [Show full text]
  • US Department of Health and Human Services
    US Department of Health and Human Services Third Party Websites and Applications Privacy Impact Assessment Date Signed: May 09, 2018 OPDIV: CMS Name: GOOGLE ADVERTISING SERVICES – DoubleClick, AdWords, AdMob TPWA Unique Identifier: T-5775483-419703 Is this a new TPWA? Yes Will the use of a third-party Website or application create a new or modify an existing HHS/OPDIV System of Records Notice (SORN) under the Privacy Act? No If SORN is not yet published, identify plans to put one in place. Not applicable. Will the use of a third-party Website or application create an information collection subject to OMB clearance under the Paperwork Reduction Act (PRA)? No Indicate the OMB approval number expiration date (or describe the plans to obtain OMB clearance). N/A. Describe the plans to obtain OMB clearance. N/A. Does the third-party Website or application contain Federal Records? No Describe the specific purpose for the OPDIV use of the third-party Website or application: Google Advertising Services consisting of, DoubleClick, AdWords, and AdMob deliver digital advertising on third-party websites in order to reach new users and provide information to previous visitors to Centers for Medicare & Medicaid Services (CMS) websites. This outreach helps inform consumers about the variety of services CMS offers. Google advertising services consists of the following: DoubleClick collects information about consumer behavior on websites across the Internet including CMS websites, using technology such as cookies. Cookies capture data such as date and time of web browsing, IP address, browser type, and operating system type, tracked by an alphanumeric identifier.
    [Show full text]
  • Application Development in Android
    ISSN (Online) : 2278-1021 ISSN (Print) : 2319-5940 International Journal of Advanced Research in Computer and Communication Engineering Vol. 3, Issue 6, June 2014 Application Development in Android Sana1, Dr. Ravindra kumar2 Department of Computer Engineering, Al-Falah School of Engineering & Technology, Haryana, India1 Ex-Director General, VGI Dadri2 Abstract: Apps are usually available through application distribution platforms. Android came in the world with a boom and has given a new era of technology. A new application is provided as instance to illustrate the basic working processes of Android application components. A guidance to understand the operation mechanism of Android applications and to develop an application on Android platform is described in this paper. Keywords: Dalvik virtual machine; Framework; Activity;Linux kernal I. INTRODUCTION Android is an operating system based on the Linux kernel, ―lines and circles.‖ This approach to application and designed primarily for touch screen mobile devices development helps you see the big picture—how the such as smart phones and tablet computers. Initially components fit together and how it all makes sense. developed by Android, Inc, which Google backed financially and later bought in 2005. Android‖ is the 1. Activities package of software used in the mobile devices. It is a An activity is usually a single screen that the user sees on comprehensive operating environment which is released the device at one time. An application typically has on Nov 12, 2007 by the open Handset alliance of Google, multiple activities, and the user flips back and forth among a consortium of hardware, software, and them. As such, activities are the most visible part of your telecommunication companies devoted to advancing open application.
    [Show full text]