Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Question :
Context aware mobile web applications are the important to achieve ubiquity, device independence and personalization. The context provides detailed information about the environment of a web application and the web application itself. Thereby the context influences not only the requirements as gathered by requirements elicitation but also triggers the actual customisation as soon as the context changes. Context can be divided into a physical and logical context.
a) Define physical context and provide examples of the physical context properties.
b) Using your definition above, and with the help of the Unified Modeling Language (UML), describe how you can design a physical context model for mobile Web applications. You can consider a small well defined set of physical context properties, but as the list is virtually unlimited and certain applications would require specific ones, you have to focus on a model which is extensible.
c) Define logical context and explain why it is a necessary element in context aware mobile Web applications?
d) Explain how the logical context can take the form of profiles.
e) Describe the following profiles i. Location Profile ii. Time Profile iii. User Agent Profile iv. Network Profile
Define end series and its application
Q. Explain working of Counters? A counter is a register that goes through a predetermined sequence of states when clock pulse is applied. In principle value of counters is incr
Identify three specific weaknesses in the design of the websites, derived from your analyses within Questions Part (c) and/or Question Part (a). There should be at least one weakne
Explain the operation of 8:1 multiplexer. Ans: In this multiplexer 8 Input and 1 Output and three select lines i.e. S 2 , S 1 , S 0 are given. Any one of the inputs will be
Discuss the CSMA/CD and CSMA/CA protocols. CSMA/CD: this is an access method used mainly with LANs configured in a bus topology. Along with CSMA/CD, any station (node) can se
Q. What do you mean by artificial intelligence? Show the artificial intelligence systems used widely in business. ANSWER: Artificial intelligence (AI) is the science of making
Everything stored on a computer can be represented as a string of bits. However, different types of data (for example, characters and numbers) may be represented by the same string
Direct Mapping: In this particular technique, block j of the primary memory maps onto block j modulo 128 of the cache. The primary memory blocks 0,128,256,...is loaded
Classification according to pipeline configuration: According to the configuration of a pipeline, the following parts are recognized under this classification: Unifunct
MAC is the abbreviation for: (A) Multimedia access control (B) Media access control (C) Mobile access control (D) Master access point control Ans: MAC is th
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd