SPPU Computer Engineering (Semester 7)
Pervasive Computing
May 2017
Total marks: --
Total time: --
INSTRUCTIONS
(1) Assume appropriate data and state your reasons
(2) Marks are given to the right of every question
(3) Draw neat diagrams wherever necessary


Solve any one question from Q.1(a,b) & Q.2(a,b)
1(a) Outline five core properties that characterize UbiCom system.
5 M
1(b) Explain how CoolTown model can be implemented at workplace and home.
5 M

2(a) Discuss smart dust and tiny OS.
5 M
2(b) How dynamic adaptation is performed in IBM's transcoding application.
5 M

Solve any one question from Q.3(a,b,c) & Q.4(a,b)
3(a) Why user interfaces are primarily visible? Discuss benefits of using auditory interface.
5 M
3(b) What is PostHuman technology model?
3 M
3(c) Define Planned action & situated action.
2 M

4(a) What are different design characteristics of iHCI model?
5 M
4(b) Write short note on device connectivity.
5 M

Solve any one question from Q.5(a,b,c) & Q.6(a,b,c)
5(a) Explain core capabilities for context aware applications.
5 M
5(b) Write short note on Contextual services.
5 M
5(c) Discuss "Odyssey" system and comment whether it is uses applicaiton- level or System-level adaptation.
8 M

6(a) Discuss actuator services in detail.
6 M
6(b) What is meaning of following terms in adaptation:
Agility, Fidelity & concurrency
6 M
6(c) What is mobile agent? Give it's architecture.
6 M

Solve any one question from Q.7(a,b) & Q.8(a,b,c)
7(a) Explain various security issues & challenges in Pervasive Computing.
8 M
7(b) Define Authentication & authorization in detail with any case study as an example.
8 M

8(a) Explain Social netwroking & media exchange example for smart interaction.
8 M
8(b) What is Secure resoure discovery.
4 M
8(c) Give collaborative defense strategies for Netwok Security.
4 M

Solve any one question from Q.9(a,b,c) & Q.10(a,b,c)
9(a) Explain graduated levels & system support for each of UbiCom property.
5 M
9(b) Write short note on seven challenges highlighted by Grinder & Edwards for using ubiquitous applications in smart environment.
7 M
9(c) Differentiate in between Human Intelligence & Machine Intelligence.
4 M

10(a) Review following technologies & justify whether they are disruptive or substaining technologies: Mobile, Radio, email and eBook
8 M
10(b) Compare and comtrast the following techniques for lowering energy use:
i) Passive electronic components.
ii) MEMS
iii) Energy harvesting
iv) Ultra-capacitors and fuel cells.
8 M



More question papers from Pervasive Computing
SPONSORED ADVERTISEMENTS