Sei sulla pagina 1di 2

Total No. of Questions : 10] SEAT No.

P2334 [Total No. of Pages : 2

3
3:2
[5254]-669

3:4
B.E. (Computer Engineering)

71
2/2 1
PERVASIVE COMPUTING

9
01
8 0 30
(2012 Pattern) (Elective - II) (Semester-I)
.23 01
Time : 2½ Hours] 9/1 [Max. Marks : 70
P

Instructions to the candidates:


8.2 G

1) Attempt Q1 or Q2, Q3 or Q4, Q5 or Q6, Q7 or Q8, or Q9 or Q10.


.24 CE
16

2) Figures to the right indicate full marks.


3) Neat diagrams must be drawn wherever necessary.

3
4) Assume Suitable data if necessary.

3:2
49

3:4
Q1) a) What is transparency? What is openness? Are they complementry to
71
91
each other? [5]
01
30

b) Define context? Comment on context awareness? [5]


2/2
01
9/1

OR
GP
80

Q2) a) Explain dynamic adaptation in IBM'S transcoding application. [5]


.23
CE

b) Comment on improvement in device technology how devices can be


16

more suitable for pervasive computing? [5]


8.2

3
.24

3:2
Q3) a) What is posthuman model of UbiCom? How sense of presence and
49

3:4

telepresence is generated in UbiCom? [6]


71
91

b) How the brain computer interface is facilitated? [4]


01
30
2/2

OR
01
9/1

Q4) a) Discuss any application of hidden UI in wearable computing. [4]


GP
80

b) Differentiate between. [6]


.23
CE

i) Virtual vs. Augmented reality.


16
8.2

ii) Mediated vs. Embodied Reality.


.24
49

P.T.O.
Q5) a) What is middleware? What can be adapted in middleware. [6]
b) Explain core capabilities of context aware applications. [6]
c) How service discovery helps in middleware adaption. Explain in brief

3
with example. [4]

3:2
3:4
OR

71
2/2 1
9
Q6) a) How data adaption is done in Ubicom? Explain. [6]

01
8 0 30
b) What is mobile agent? Give architecture? Mobile agent? [6]
c) Write short note on mobile middleware. [4]
.23 01
9/1
P

Q7) a) Differentiate between security and Privacy in Ubicom? [6]


8.2 G

b) Explain kerberos as authentication algorithm. [7]


.24 CE

c) Discuss different defense strategies for network security. [4]


16

OR

3
3:2
49

Q8) a) Explain V-SAT Security models in Ubicom? [6]

3:4
b) Discuss blowfish algorithm in detail for authentication. [7]
71
91
c) Compare different collaborative defense strategies. [4]
01
30
2/2

Q9) a) Discuss challenges in Ubicom? How they can be overcome? [9]


01
9/1

b) Differentiate between machine intelligence and human intelligence. [8]


GP
80

OR
.23
CE
16

Q10)a) Discuss device interaction in smart devices. [8]


8.2

b) Write Short note on: [9]


3
.24

3:2
i) Smart watch
ii) Smart boards, Pads and Tabs.
49

3:4

iii) Smart meeting Rooms.


71
91
01
30
2/2

mmm
01
9/1
GP
80
.23
CE
16
8.2
.24
49

[5254]-669 2

Potrebbero piacerti anche