Universidad Tecnológica Israel Escuela De Postgrados Maestría En Telemática

Total Page:16

File Type:pdf, Size:1020Kb

Universidad Tecnológica Israel Escuela De Postgrados Maestría En Telemática UNIVERSIDAD TECNOLÓGICA ISRAEL ESCUELA DE POSTGRADOS MAESTRÍA EN TELEMÁTICA MENCIÓN: CALIDAD EN EL SERVICIO (Aprobado por: RPC-SO-19-No.300-2016-CES) TRABAJO DE TITULACIÓN EN OPCIÓN AL GRADO DE MAGISTER Título: Sistema integrado para la operación de un brazo robótico teleoperado en tiempo real mediante la plataforma Firebase con el uso de dispositivos móviles Línea de Investigación: Telecomunicaciones y sistemas informáticos aplicados a la producción y la sociedad. Autor: Juan David Chimarro Amaguaña, Ing. Tutor: Ing. Fidel David Parra Balza, Ph.D Quito - Ecuador 2020 ii DEDICATORIA Dedico este Master a mi familia por haberme apoyado tanto en los momentos difíciles, como los satisfactorios y estar a mi lado durante el tiempo que he trabajado para lograr esta nueva meta en mi vida, ya que con esfuerzo y dedicación se puede alcanzar el éxito. iii AGRADECIMIENTOS A Dios y a mi familia por motivarme día a día para lograr los objetivos. A la Universidad Tecnológica Israel, a mi Tutor de Tesis, docentes y a todas las personas que forman parte de la Escuela de Postgrados, por dar una educación de calidad. Y a mis amistades de la UISRAEL, del trabajo INTSUPERIOR, y a las personas con las que he compartido momentos especiales siempre los tengo presentes. iv RESUMEN El proyecto de investigación tuvo por objeto desarrollar un sistema integrado para la operación de un brazo robótico teleoperado en tiempo real mediante la plataforma Firebase con el uso de dispositivos móviles, el enfoque metodológico de la investigación fue basado en una investigación aplicada ya que se centra específicamente en buscar la aplicación o utilización de conocimientos teóricos, a la vez que se adquieren otros, después de implementar y sistematizar. La técnica de levantamiento de información que se usó fue la observación indirecta ya que la investigación se llevó acabo por revisión de bibliografía. La teleoperación del brazo robótico se basó sobre la arquitectura del Cloud Computing usando las API y Services de Google Cloud Platform y permitió una interacción directa con Firebase y esta plataforma a su vez, tienen enlaces directos con dispositivos móviles, se hizo uso de protocolos de comunicación IoT (Internet of Things) y pudo conectarse con una la tarjeta Wifi, lo que consistió en tener el control de todas las variables del robot de forma remota en tiempo real, carga y descarga de información de la base de datos, seguridad de la información y obtener estadísticas sobre el uso de la aplicación. Como resultados se valoró el funcionamiento del sistema teleoperado obteniendo información sobre el tráfico tele- transmitido, tiempos de latencia, errores, eventos, estos parámetros permiten mejorar el rendimiento y la calidad del servicio de la aplicación. Palabras claves: teleoperación, Firebase, Cloud Computing, aplicaciones móviles, IoT, tiempos de latencia. v ABSTRACT The purpose of the research project was to develop an integrated system for the operation of a teleoperated robotic arm in real time using the Firebase platform with the use of mobile devices, the methodological approach of the research was based on an applied research since it focuses specifically in seeking the application or use of theoretical knowledge, while others are acquired, after implementing and systematizing. The information gathering technique that was used was indirect observation since the investigation was carried out by literature review. The teleoperation of the robotic arm was based on the architecture of Cloud Computing using the APIs and Services of Google Cloud Platform and allowed a direct interaction with Firebase and this platform in turn, have direct links with mobile devices, communication protocols were used IoT (Internet of Things) and was able to connect with a Wifi card, which consisted of having control of all robot variables remotely in real time, loading and unloading information from the database, information security and obtain statistics on the use of the application. As results, the operation of the teleoperated system was evaluated obtaining information on the tele-transmitted traffic, latency times, errors, events, these parameters allow to improve the performance and the quality of the service of the application. Keywords: Teleoperation, Firebase, Cloud Computing, Mobile Applications, IoT, latency times. vi INDICE DE CONTENIDOS CERTIFICADO DE APROBACION ................................................. ¡Error! Marcador no definido. DEDICATORIA ............................................................................................................................... iii AGRADECIMIENTOS .................................................................................................................... iv RESUMEN ........................................................................................................................................ v ABSTRACT ...................................................................................................................................... vi INDICE DE CONTENIDOS........................................................................................................... viii LISTA DE FIGURAS ........................................................................................................................ x LISTA DE TABLAS....................................................................................................................... xiii INTRODUCCIÓN .............................................................................................................................1 CAPÍTULO I .....................................................................................................................................7 1. MARCO TEÓRICO ...................................................................................................................7 1.1. Sistemas integrados en tiempo real .....................................................................................7 1.1.1. Descripción Sistemas integrados en tiempo real .........................................................7 1.1.2. Aplicaciones de los Sistemas integrados en tiempo real como transformación digital…………………………………………………………………………………………... .9 1.2. Sistemas robóticos teleoperados .......................................................................................13 1.2.1. Descripción de los sistemas robóticos teleoperados ..................................................13 1.3. Plataforma Firebase ..........................................................................................................17 1.3.1. Cloud Firestore .........................................................................................................18 1.3.2. Realtime Database ....................................................................................................18 1.3.3. Authentication ..........................................................................................................19 1.3.4. Crashlytics ................................................................................................................19 1.3.5. Performance Monitoring ...........................................................................................20 1.3.6. Cloud Messaging ......................................................................................................20 1.4. Desarrollo de aplicaciones en dispositivos móviles ..........................................................20 1.4.1. Diseño de aplicaciones para dispositivos móviles ....................................................21 1.4.2. Tecnologías para dispositivos móviles .....................................................................23 1.4.3. Plataformas de desarrollo de aplicaciones móviles ...................................................25 1.4.4. Aplicaciones en dispositivos móviles ventajas y desventajas ...................................26 CAPÍTULO II ..................................................................................................................................30 2. DESCRIPCIÓN DEL PROCESO INVESTIGATIVO .............................................................30 2.1. Enfoque metodológico de la investigación. ......................................................................30 viii 2.2. Técnica de recolección de datos .......................................................................................31 2.3. Situación actual ................................................................................................................31 2.4. Metodología seleccionada ................................................................................................40 2.5. Cuadro de fases metodológicas ........................................................................................42 2.6. Cronograma de actividades y recursos .............................................................................44 CAPITULO III .................................................................................................................................45 3. PROPUESTA ...........................................................................................................................45 3.1. Definición de las especificaciones del sistema robótico teleoperado ................................45 3.2. Esquema general del hardware del sistema robótico teleoperado .....................................46 3.3. Ordinograma general del sistema robótico teleoperado ....................................................46 3.4.
Recommended publications
  • RBM Página 1 Código Descripción De Bien Mueble Valor En Libros UPSRJ0543 PIZARRON MOD
    UNIVERSIDAD POLITÉCNICA DE SANTA ROSA JÁUREGUI Cuenta Pública Ejercicio 2020 RELACIÓN DE BIENES MUEBLES Del 1 de enero al 31 de diciembre de 2020 (Pesos) Con el propósito de dar cumplimiento al artículo 23 de la Ley General de Contabilidad Gubernamental (LGCG), en seguida, se presenta la relación de bienes muebles al 31 de diciembre del 2020 que componen el patrimonio del presente organismo: Código Descripción de Bien Mueble Valor en libros UPSRJ0392 PC DE ESCRITORIO THINKCENTRE M92p Tiny LENOVO 13,455.00 UPSRJ0395 MACBOOK PRO 13.3/IC 5 2.5 2X2GB/500GB/INTEL HD 4000/ETHERNET-WIFI 19,180.46 UPSRJ0396 NOTEBOOK ASUS N-SERIES N56, CI7-15.6"-8GB-1T-NVIDIA-WIN 8 17,922.00 UPSRJ0428 MONITOR BEQ LED 20 GL2055A WIDE HD NEGRO PLANO 1.00 UPSRJ0452 CAMIONETA NP300 ESTACAS T/M DH VERSION ESPECIAL MARCA NISSAN MODELO 2014 COLOR BLANCO CAPACIDAD 1200Kgs. MOTOR: KA24662015A CVE.VEHICULAR: 1041525 182,966.00 UPSRJ0453 GUILLOTINA DE MESA 705-A8 TRABAJO PESADO DLC 5,441.56 UPSRJ0457 SILLA DE RUEDAS ELECTRICA POWER IZZYGO R205091 AZUL 19,895.10 UPSRJ0458 TARJETA DE ADQUISICION DE DATOS DAQ MULTIFUNCION 14 BITS MOD 4,587.80 UPSRJ0460 LECTOR DE HUELLAS DACTILARES 3,340.80 UPSRJ0463 BAFLE AMPLIFICADO BEHRINGER B115 6,472.80 UPSRJ0464 SISTEMA AMPLIFICADOR MEZCLADOR DE 200W CON MICROFONO 11,576.80 UPSRJ0465 GABINETE RACK PARA EQUIPO DE SONIDO 22" X 1.2 MTS 4,454.40 UPSRJ0466 ESPEJO MOVIL PARA VALORAR POSTURA EN MADERA COLOR CLARO 3,590.01 UPSRJ0467 LAPTOP DELL VOSTRO 3560 CI5 6GB HDD 500GB COLOR SILVER 12,487.40 UPSRJ0469 LAPTOP DELL VOSTRO 3560 CI5 6GB HDD 500GB
    [Show full text]
  • HR Kompatibilitätsübersicht
    HR-imotion Kompatibilität/Compatibility 2018 / 11 Gerätetyp Telefon 22410001 23010201 22110001 23010001 23010101 22010401 22010501 22010301 22010201 22110101 22010701 22011101 22010101 22210101 22210001 23510101 23010501 23010601 23010701 23510320 22610001 23510420 Smartphone Acer Liquid Zest Plus Smartphone AEG Voxtel M250 Smartphone Alcatel 1X Smartphone Alcatel 3 Smartphone Alcatel 3C Smartphone Alcatel 3V Smartphone Alcatel 3X Smartphone Alcatel 5 Smartphone Alcatel 5v Smartphone Alcatel 7 Smartphone Alcatel A3 Smartphone Alcatel A3 XL Smartphone Alcatel A5 LED Smartphone Alcatel Idol 4S Smartphone Alcatel U5 Smartphone Allview P8 Pro Smartphone Allview Soul X5 Pro Smartphone Allview V3 Viper Smartphone Allview X3 Soul Smartphone Allview X5 Soul Smartphone Apple iPhone Smartphone Apple iPhone 3G / 3GS Smartphone Apple iPhone 4 / 4S Smartphone Apple iPhone 5 / 5S Smartphone Apple iPhone 5C Smartphone Apple iPhone 6 / 6S Smartphone Apple iPhone 6 Plus / 6S Plus Smartphone Apple iPhone 7 Smartphone Apple iPhone 7 Plus Smartphone Apple iPhone 8 Smartphone Apple iPhone 8 Plus Smartphone Apple iPhone SE Smartphone Apple iPhone X Smartphone Apple iPhone XR Smartphone Apple iPhone Xs Smartphone Apple iPhone Xs Max Smartphone Archos 50 Saphir Smartphone Archos Diamond 2 Plus Smartphone Archos Saphir 50x Smartphone Asus ROG Phone Smartphone Asus ZenFone 3 Smartphone Asus ZenFone 3 Deluxe Smartphone Asus ZenFone 3 Zoom Smartphone Asus Zenfone 5 Lite ZC600KL Smartphone Asus Zenfone 5 ZE620KL Smartphone Asus Zenfone 5z ZS620KL Smartphone Asus
    [Show full text]
  • The Android Platform Security Model∗
    The Android Platform Security Model∗ RENÉ MAYRHOFER, Google and Johannes Kepler University Linz JEFFREY VANDER STOEP, Google CHAD BRUBAKER, Google NICK KRALEVICH, Google Android is the most widely deployed end-user focused operating system. With its growing set of use cases encompassing communication, navigation, media consumption, entertainment, finance, health, and access to sensors, actuators, cameras, or microphones, its underlying security model needs to address a host of practical threats in a wide variety of scenarios while being useful to non-security experts. The model needs to strike a difficult balance between security, privacy, and usability for end users, assurances for app developers, and system performance under tight hardware constraints. While many of the underlying design principles have implicitly informed the overall system architecture, access control mechanisms, and mitigation techniques, the Android security model has previously not been formally published. This paper aims to both document the abstract model and discuss its implications. Based on a definition of the threat model and Android ecosystem context in which it operates, we analyze how the different security measures in past and current Android implementations work together to mitigate these threats. There are some special cases in applying the security model, and we discuss such deliberate deviations from the abstract model. CCS Concepts: • Security and privacy → Software and application security; Domain-specific security and privacy architectures; Operating systems security; • Human-centered computing → Ubiquitous and mobile devices. Additional Key Words and Phrases: Android, security, operating system, informal model 1 INTRODUCTION Android is, at the time of this writing, the most widely deployed end-user operating system.
    [Show full text]
  • Android Wear Notification Settings
    Android Wear Notification Settings Millicent remains lambdoid: she farce her zeds quirts too knee-high? Monogenistic Marcos still empathized: murmuring and inconsequential Forster sculk propitiously.quite glancingly but quick-freezes her girasoles unduly. Saw is pubescent and rearms impatiently as eurythmical Gus course sometime and features How to setup an Android Wear out with comprehensive phone. 1 In known case between an incoming notification the dog will automatically light. Why certainly I intend getting notifications on my Android? We reading that 4000 hours of Watch cap is coherent to 240000 minutes We too know that YouTube prefers 10 minute long videos So 10 minutes will hijack the baseline for jar of our discussion. 7 Tips & Tricks For The Motorola Moto 360 Plus The Android. Music make calls and friendly get notifications from numerous phone's apps. Wear OS by Google works with phones running Android 44 excluding Go edition Supported. On two phone imagine the Android Wear app Touch the Settings icon Image. Basecamp 3 for Android Basecamp 3 Help. Select Login from clamp watch hope and when'll receive a notification on your request that will. Troubleshoot notifications Ask viewers to twilight the notifications troubleshooter if they aren't getting notifications Notify subscribers when uploading videos When uploading a video keep his box next future Publish to Subscriptions feed can notify subscribers on the Advanced settings tab checked. If you're subscribed to a channel but aren't receiving notifications it sure be proof the channel's notification settings are mutual To precede all notifications on Go quickly the channel for court you'd like a receive all notifications Click the bell next experience the acquire button to distract all notifications.
    [Show full text]
  • Public Wireless Access Security Assessment Tool
    WiFiCue: Public Wireless Access Security Assessment Tool GIAC (GCIA) Gold Certification and RES 5500 Author: Jonathan K Adams, [email protected] Advisor: Sally Vandeven Accepted: September 30th 2019 Abstract Public wireless access points are commonly provided by governments, businesses, schools and other organizations and provide access to the Internet for numerous use cases and can present varying degrees of risk to users. While there are steps that can be taken to mitigate public Wi-Fi risks, ranging from avoidance to the application of end-to-end encryption, application specific encryption, and other technologies and tools, these options are not always viable. This paper examines risks associated with Wi-Fi from on a network-by-network perspective. Recommender Systems are presented as part of a proposed mechanism for informing users of the risks of connecting to a specific access point. Implementing prototype architecture for this purpose is examined. WiFiCue: Public Wireless Access Security Assessment Tool 2 1. Introduction Public wireless access points present an untrusted computing environment for users, whether they are witting of the threat or not. One of the remedies often suggested is to utilize a Virtual Private Network [VPN]. On some wireless networks, VPNs may be disallowed. Even if allowed, Virtual Private Networks vary greatly in their security, and depending upon the vendor, may introduce additional risks and reasons for concern. Additionally, depending upon the application to be used, VPNs can inject network latency that makes some uses suffer, resulting in a poor user experience. Some key factors in assessing the security of a public wireless network are what version of 802.11 is implemented, whether the wireless access point provides the option for encryption, and if so, what the level of encryption is and what mechanism is used for key exchange.
    [Show full text]
  • For Patients
    User Guide for patients CAUTION--Investigational device. Limited by Federal (or United States) law to investigational use. IMPORTANT USER INFORMATION Review the product instructions before using the Bios device. Instructions can be found in this user manual. Failure to use the Bios device and its components according to the instructions for use and all indications, contraindications, warnings, precautions, and cautions may result in injury associated with misuse of device. Manufacturer information GraphWear Technologies Inc. 953 Indiana Street, San Francisco CA 94107 Website: www.graphwear.co Email: [email protected] 1 Table of Contents Safety Statement 4 Indications for use 4 Contraindication 5 No MRI/CT/Diathermy - MR Unsafe 5 Warnings 5 Read user manual 5 Don’t ignore high/low symptoms 5 Don’t use if… 5 Avoid contact with broken skin 5 Inspect 6 Use as directed 6 Check settings 6 Where to wear 6 Precaution 7 Avoid sunscreen and insect repellant 7 Keep transmitter close to display 7 Is It On? 7 Keep dry 8 Application needs to always remain open 8 Device description 8 Purpose of device 8 What’s in the box 8 Operating information 11 Minimum smart device specifications 11 Android 11 iOS 12 Installing the app 12 Setting up Bios devices 32 Setting up Left Wrist (LW) device 32 Setting up Right Wrist (RW) device 42 Setting up Lower Abdomen (LA) device 52 2 Confirming that all devices are connected 64 Removing the devices 65 Removing the sensors 67 How to charge the transmitter 69 Setting up and using your Self Monitoring Blood Glucose (SMBG) meter 78 Inserting blood values into the application 79 Inserting meal and exercise information 85 Inserting medication information 89 Change sensor 92 Providing feedback 98 Troubleshooting information 101 What messages on your transmitter display mean 101 FAQ? 102 I need to access the FAQ from my app 102 I am unable to install the mobile application on my smart device.
    [Show full text]
  • Portable Customised Android OS for Different Computing Devices
    International Journal of Research in Engineering, Science and Management 495 Volume-3, Issue-3, March-2020 www.ijresm.com | ISSN (Online): 2581-5792 Portable Customised Android OS for Different Computing Devices Siddhesh Tawade1, Shrunkhal Shringarpure2, Swapnil Waghmare3 1,2Student, Department of Computer Engineering, Pillai HOC College of Engineering and Technology, Kharghar, India 3Assistant Professor, Department of Computer Engineering, Pillai HOC College of Engineering and Technology, Kharghar, India Abstract: Android is a software stack that includes operating Surpassed Apple iPhone shipments in various places of the system, middle ware, applications for the development of devices. world, clearly showing how Android is open for innovation. Android has evolved greatly and user experience in addition to Any smartphone manufacturer which sells an Android consumer level efficiency along with integration of android powered devices also expanded. Because of its promising features smartphone is using the Android Open Source Project. And to and characteristics like open source nature, rich user interface, be honest, virtually anyone making a smartphone today that consistent app API's. Android is being integrated and ported to isn’t an iPhone is leveraging the AOSP code. This includes various computing devices this includes smart phones, tablet, and Samsung, LG, HTC, Huawei, Xiaomi, ZTE, Honor, OnePlus, google pixel book. One major advantage of using android and many others. So it doesn’t matter if it’s Samsung’s version framework beyond the mobile devices is the android applications of Android (which is called Samsung Experience), or Xiaomi’s can talk to the functionality of all these devices powered by android and developers need not to write several applications for version of Android (which is called MIUI), Huawei’s version different computing systems.
    [Show full text]
  • Mobile- H2 2018
    Barometer of mobile Internet connections in Turkey Publication of August 12 th , 2019 H2 2018 – H1 2019 nPerf is a trademark owned by nPerf SAS, 87 rue de Sèze 69006 LYON – France. Contents 1 Summary of results ...................................................................................................................... 2 1.1 Summary table and nPerf score, all technologies combined .............................................. 2 1.2 Our analysis ........................................................................................................................... 3 2 Overall results 2G/3G/4G ............................................................................................................. 3 2.1 Data amount and distribution ............................................................................................... 3 2.2 Success rate 2G/3G/4G ........................................................................................................ 4 2.3 Download speed 2G/3G/4G .................................................................................................. 4 2.4 Upload speed 2G/3G/4G ....................................................................................................... 6 2.5 Latency 2G/3G/4G ................................................................................................................ 7 2.6 Browsing test 2G/3G/4G....................................................................................................... 8 2.7 Streaming test 2G/3G/4G ....................................................................................................
    [Show full text]
  • Produto 2 Roadmap Tecnológico
    1 Produto 2 Roadmap tecnológico Versão 2.0 2017 Roadmap Tecnológico- Versão 2.0 2 Esclarecimentos sobre o roadmap tecnológico “O documento referente ao roadmap tecnológico registrou as iniciativas desenvolvidas em âmbito global no tema de Internet das Coisas, não levando em consideração questões específicas de qualquer país. Os dados descritos neste documento foram encontrados em diversas fontes públicas, entre o período de dezembro de 2016 a fevereiro de 2017, dentre elas a Consulta Pública intitulada Identificação dos tópicos de relevância para a viabilização da Internet das Coisas no Brasil. Foram também consideradas informações coletadas por meio de entrevistas com especialistas de diversos setores relevantes para a implantação da Internet das Coisas no Brasil, bem como aquelas obtidas durante uma oficina realizada em fevereiro de 2017, com a participação de dezenove Instituições Científicas e Tecnológicas (ICTs). Esse esforço de colaboração envolvendo vários atores constituiu, assim, o sólido alicerce sobre o qual repousam os resultados apresentados. Cabe ressaltar que as tendências tecnológicas relacionadas a IoT descritas no presente documento não representam a opinião ou o juízo de valor do Ministério da Ciência, Tecnologia, Inovações e Comunicações, do Banco Nacional de Desenvolvimento Econômico e Social ou dos membros do Consórcio. ” Roadmap Tecnológico- Versão 2.0 3 Lista de Acrônimos 3GPP 3rd Generation Partnership Project 6LoWPAN IPv6 over Low Power Wireless Personal Area Networks API Application Program Interface BI Business
    [Show full text]
  • Huawei Nova 3I Manual
    User Guide Contents Exciting Features Featured Usage Tips 1 Camera Tips 5 New Device New Device Configuration 7 Gestures and Operations Screenshots and Screen Recording 12 Home Screen Navigation Bar 16 Quick Switch 17 Notification Panel and Status Bar 18 Screen Lock and Unlock 21 Go Back to Basics with Simple Mode 22 Home Screen Management 23 Contacts Managing Business Cards 27 Search Contacts 29 Managing Contacts 30 Merging Third-party App Contacts 31 Dialing Basic Calling Functions 33 Block Nuisance Calls: Get the Peace and Quiet You Deserve 35 VoLTE 35 Use VoWi-Fi for a New Calling Experience 36 Message Basic Messaging Functions 37 Camera Basic Camera Functions 39 Portrait Mode 42 Use AR Lens to Add Effects to Your Photos 43 Wide Aperture 44 Panorama 45 3D Panorama 46 Pro Mode 47 Light Painting Mode 49 More Capture Modes 54 i Contents Gallery Highlights 57 Photo Management 59 Phone Manager Use One-touch Optimization 64 Manage Mobile Data Usage 64 Enable Smart Power-Saving Management to Optimize Power 65 Consumption Enable Virus Scanner 66 Email Add Email Accounts 67 Manage Email Accounts 67 Manage VIP Email Contacts 68 Set Auto Response for Exchange Email 68 Calendar Calendar: Your Event Management Center 69 Navigate the Calendar 69 Import To-Dos to Keep Your Work Organized 70 View Global Holidays 70 Clock Use the Clock 71 Notepad Manage Your Notes to Keep Your Records in Order 73 Utilities Check Additional Weather Forecasts 74 Use Recorder to Make Audio Notes 74 Multiple Users Multiple Users: Create Separate User Accounts on Your Phone
    [Show full text]
  • Initiation INDUSTRY N M INDU STRY ME E
    Initiation Company Report Consumer E INDUSTRY NM INDUSTRYME NM INDUSTRY How to make the impossible mission possible? February 26, 2019 Two roads diverge in the triathlon track Research Team Tianli Wen ● Xiaomi today as a regional and marketing innovator faces an uphill battle against Head of Research Huawei, a global and technology innovator. Yet Xiaomi’s user base, Internet root and brand loyalty are its key strength. As Internet-Of-Things (IOT) taking root, the Tris X. Gong battle ground will shift to Xiaomi’s favour; ● We suggest Xiaomi to focus on two areas to enhance its valuation: (1) developing +852 21856112 Internet content, (2) spending on R&D. Both require a healthy cash flow, which [email protected] makes margin and profitability improvement imperative; ● Given Xiaomi’s near-term challenges as a global company, we rate the stock a HOLD with a TP of HK$14.55. Xiaomi’s brand, Mi, stands for Mission Impossible. See the last page of the report for important disclosures Blue Lotus Capital Advisors Limited 1 China|Asia ●Initiation Consumer ● Electronics Xiaomi Inc. (HK: 1810) Making the impossible mission possible BUY HOLD SELL ● We initiate Xiaomi with a HOLD rating and TP of HK$14.55 because we Target Price: HK$ 14.55 Current Price: HK$ 12.20 Initiation believe Xiaomi still need to hone its skills as either a technology champion RIC: (HK:1810) BBG: 1810 HK Market cap (HK$ mn) 291,500 like Huawei, or a platform+content powerhouse like Tencent, or both; Average daily volume (HK$ mn) 678 ● Xiaomi’s near-term challenge is to achieve greater profitability so that it can Shares out/float (mn) 17,204/4,360 Source: Bloomberg, Blue Lotus (as of Feb 26, 2019) further build up Internet services and play in the technology top league; ● Global expansion and content are opportunities.
    [Show full text]
  • Android Development Based on Linux Rohan Veer1, Rushikesh Patil2, Abhishek Mhatre3, Prof
    Vol-4 Issue-5 2018 IJARIIE-ISSN(O)-2395-4396 Android Development based on Linux Rohan Veer1, Rushikesh Patil2, Abhishek Mhatre3, Prof. Shobhana Gaikwad4 1 Student, Computer Technology, Bharati Vidyapeeth Institute of Technology, Maharashtra, India 2 Student, Computer Technology, Bharati Vidyapeeth Institute of Technology, Maharashtra, India 3 Student, Computer Technology, Bharati Vidyapeeth Institute of Technology, Maharashtra, India 4 Professor, Computer Technology, Bharati Vidyapeeth Institute of Technology, Maharashtra, India ABSTRACT Android software development is used to produce apps for mobile devices that includes an OS (Operating System) and various applications. It can be used to make video applications, music applications, games, editing software etc. The android operating system was showcased by Google after which android development started. The Google initially released the android operating system on 23th September 2008.Google hired some developers and started building applications which started app development and fast production of android applications. The applications and operating system for android are written in Java as the android is based on Linux so it was difficult at the start to write programs for android. But as the technical skills were improving to debug an application so it became easier for developers to solve the issues and debug the errors in the applications. The first android operating system was able to perform some basic task like messaging, calling, downloading some specific applications etc. After that Google released various versions of android operating system with newly added features and design. With every new version of android speed of device and user experience were getting much better in day to day life.
    [Show full text]