AKSHAT RAO PATIL

Campus Ambassador at viden.io

Studied at St. Stephens senior secondary school

A Modern Study of Bluetooth Wireless Technology

A Bluetooth ad hoc network can be formed by interconnecting piconets into scatternets. The constraints and properties of Bluetooth scatternets present special challenges in forming an ad hoc network efficiently. This paper, the research contributions in this arena are brought together, to give an overview of the state-of-the-art. Simply stated, Bluetooth is a wireless communication protocol. Since it's a communication protocol, you can use Bluetooth to communicate to other Bluetooth-enabled devices. In this sense, Bluetooth is like any other communication protocol that you use every day, such as HTTP, FTP, SMTP, or IMAP. Bluetooth has a client-server architecture; the one that initiates the connection is the client, and the one who receives the connection is the server. Bluetooth is a great protocol for wireless communication because it's capable of transmitting data at nearly 1MB/s, while consuming 1/100th of the power of Wi-Fi. We discuss criteria for different types of scatternets and establish general models of scatternet topologies. Then we review the state-of-the-art approaches with respect to Bluetooth scatternet formation and contrast them

Overview and Evaluation of Bluetooth Low Energy: An Emerging Low-Power Wireless Technology

Bluetooth Low Energy (BLE) is an emerging low-power wireless technology developed for short-range control and monitoring applications that is expected to be incorporated into billions of devices in the next few years. This paper describes the main features of BLE, explores its potential applications, and investigates the impact of various critical parameters on its performance. BLE represents a trade-off between energy consumption, latency, piconet size, and throughput that mainly depends on parameters such as connInterval and connSlaveLatency. According to theoretical results, the lifetime of a BLE device powered by a coin cell battery ranges between 2.0 days and 14.1 years. The number of simultaneous slaves per master ranges between 2 and 5,917. The minimum latency for a master to obtain a sensor reading is 676 µs, although simulation results show that, under high bit error rate, average latency increases by up to three orders of magnitude. The paper provides experimental results that complement the theoretical and simulation findings, and indicates implementation constraints that may reduce BLE performance.

Bluetooth Technology Key Challenges and Initial Research

This paper introduces a number of problems faced by the Bluetooth technology when attempting to use it for building adhoc networks. The paper provides a brief overview of Bluetooth and describes some of the major issues that need to be addressed, if it is to be successful as a networking technology. Some important objectives that any solution must meet are also introduced and motivated. An initial exploration of some key issues such as topology formation and throughput maximization is also provided.

Decision Tree Learning

A tree where each branching (decision) node represents a choice between 2 or more alternatives, with every branching node being part of a path to a leaf node

MATHEMATICAL APPLICATIONS OF COBB-DOUGLAS PRODUCTION FUNCTION IN INDUSTRIES

The Cobb-Douglas production function is based on the empirical study of the American manufacturing industry made by Paul H. Douglas and C.W. Cobb. It is a linear homogeneous production function of degree one which takes into account two inputs, labour and capital, for the entire output of the manufacturing industry.

Analysis and characterization of Peer-to-Peer Filesharing Networks

Since Peer-To-Peer file-sharing networks appearance a few years ago, many Internet users have chosen this technology to search for programs, films, songs, documents, etc. This number of users is growing every day. The main reason has been the content (in occasions illegal) that can be found and downloaded over these networks. This article deals with the analysis and characterization of eight P2P Public networks: Gnutella, FastTrack, Freeenet, BitTorrent, Opennap, Edonkey, Soulseek and MP2P. Finally, the authors will show a relationship between their characteristics and, in six of them, between their number of users, files shared and the amount of data shared in their networks

Cyber Crime and Cyber Law under Information Technology Act 2000

Cybercrime, or computer oriented crime, is crime that involves a computer and a network. Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to the victim directly or indirectly, using modern telecommunication networks such as Internet and mobile phones. This research paper aims to discuss following aspects of Cybercrimes: the definition, why they occur, laws governing them, methods of committing cybercrimes, who they affect, and cybercrime prevention procedures. The report will show the usage and progression of technology has amplified different types of crimes such as theft crimes and terrorism. Also, this report will display statistical data which will give an idea of how far cybercrimes has increase over the period of ten years or more.

GST ––Constitutional Provisions and Features of Constitution

“Goods and services tax” means any tax on supply of goods, or services or both except taxes on the supply of the alcoholic liquor for human consumption GST shall be levied and collected by the Central Government and such tax shall be apportioned between the Union and the States in the manner as may be provided by Parliament by law on the recommendations of GST Council.

Introduction to NP-Completeness

o far we have discussed efficient algorithms for selected problems. In this section we will discuss problems for which no efficient algorithm is known. From now on we will consider • Polynomial time algorithm is “practical”. • Exponential and worse is “impractical”. In this part of the course we will: • Introduce theory of NP-completeness • Introduce the famous P = NP open problem • Learn how to prove that a problem is NP-complete

Software and the law - An Open University Course

This free course, Software and the law, explores the laws relevant to software and its use – taking a global perspective, since the trade in software is international and information made available on the web can be viewed globally. A major part of this course is devoted to intellectual-property law – the issue of who owns software and digital content and how that ownership can be protected by the law. You’ll learn about copyright and patents, and international agreements aimed at harmonising laws in this area. We will look at how the laws aimed at protecting public goods can also be exploited to protect the public good. Software is acquired or developed for a specific purpose, with the relationship between purchaser and supplier governed by some sort of contract. What should such a contract cover? Software can do people harm in a number of ways – including by making public information that should be kept private, by defamation, or by supplying false information that leads people into error. Who should be held liable? How can the law protect you?

Animal Testing

It is estimated that between 50 and 100 million animals are used in research each year including various vertebrates like monkeys, apes, cats, dogs, rabbits, guinea pigs etc. Some are purpose bred for testing but many are still caught in the wild. The testing is carried to check the effects of drugs for humans before they are released, or any other medical, biomedical, or commercial purposes. Animal Testing is carried out for researching newer breeds for domestic animals for use as beasts of burden, and for testing cosmetics. They provide new measures for the health and welfare of humans.

MISUSE OF HATE SPEECH LAWS

The Constitution of India does not provide for a state religion. Article 25(1) states, "Subject to public order, morality and health and to the other provisions of this Part, all persons are equally entitled to freedom of conscience and the right freely to profess, practise and propagate religion". Article 19 gives all citizens the right to freedom of speech and expression but subject to "reasonable restrictions" for preserving inter alia "public order, decency or morality". Article 28 prohibits any religious instruction in any educational institution wholly maintained out of state funds.