Skip to main content
ANDROID APPLICATION DEVELOPMENT WORKSHOP
ON 24 AUGUST 2014


DETAILS:
                Android is an open source mobile OS led by Google. This workshop introduces about  Android, the fastest growing mobile OS. The job opportunities in this stream are not only  restricted to the  manufacturing, repairing and maintenance of mobile handsets but also it provides a lot of career opportunities in mobile application development for software professionals.

            The objective of the workshop is to enable the participants to develop mobile applications on their own and to train them to use Eclipse as IDE.

            To promote students technical career towards the new technological developments that happens in the industry.

            To bring students of various streams in to one roof and chance those to broaden technical knowledge of the students with the latest trends and technologies followed in the industry.

            Participating in this workshop gives an opportunity for the Students/Academicians Industry to interact participants with the technocrats.

            Technocrats are capable to train the students and provide the awareness for students on various latest technologies used by the industry experts

WORKSHOP HIGHLIGHTS:


Learn & interact with renowned industry experts
Receive an unparalleled education with personal attention
Hand on practical workshop on ANDROID Application Development
Students will get “Development tool kit” at free of cost
Android Development E-Book will also be provided to the students during the workshop


KEY BENEFITS:

Participants will be receiving the following from the workshop:

Development tools CD
Participation Certificate
File, Pen, Notepad

PARTICIPATION IS OPEN TO:

FACULTIES
STUDENTS

REGISTRATION FEES:

Rs.500 per delegate from institute (Faculty).
Rs.350 per delegate from institute(Student)


CONTACT:
SPRING SOURCE TECHNOLOGIES
9626247380,9003413525
http://spring-source.blogspot.in/


Comments

Popular posts from this blog

IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKING IN PUBLIC CLOUD report

IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKING IN PUBLIC CLOUD ABSTRACT More and more clients would like to store their data to PCS (public cloud servers) along with the rapid development of cloud computing. New security problems have to be solved in order to help more clients process their data in public cloud. When the client is restricted to access PCS, he will delegate its proxy to process his data and upload them. On the other hand, remote data integrity checking is also an important security problem in public cloud storage. It makes the clients check whether their outsourced data is kept intact without downloading the whole data. From the security problems, we propose a novel proxy-oriented data uploading and remote data integrity checking model in identity-based public key cryptography: IDPUIC (identity-based proxy-oriented data uploading and remote data integrity checking in public cloud). We give the formal definition, system model and se...

A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM

A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM ABSTRACT Authentication based on passwords is used largely in applications for computer security and privacy. However, human actions such as choosing bad passwords and inputting passwords in an insecure way are regarded as”the weakest link” in the authentication chain. Rather than arbitrary alphanumeric strings, users tend to choose passwords either short or meaningful for easy memorization. With web applications and mobile apps piling up, people can access these applications anytime and anywhere with various devices. This evolution brings great convenience but also increases the probability of exposing passwords to shoulder surfing attacks. Attackers can observe directly or use external recording devices to collect users’ credentials. To overcome this problem, we proposed a novel authentication system PassMatrix, based on graphical passwords to resist shoulder surfing attacks. With a one-time valid login indicator and ...

garbage monitoring using arduino code with gsm

#include <SoftwareSerial.h> #include <LiquidCrystal.h> //LiquidCrystal lcd(7, 6, 5, 4, 3, 2); LiquidCrystal lcd(13, 12, 11, 10, 9, 8); SoftwareSerial mySerial(0,1); #define trigPin 2 #define echoPin 3 #define PIR_sensor 4 #define m11 5 #define m12 6 void setup() {    lcd.begin(16, 2);    lcd.print("    Garbage    ");    Serial.println("garbage ");   lcd.setCursor(0,1);   lcd.print("   Open Close    ");   Serial.println(" open close");   delay(3000);   lcd.clear();   //lcd.print(" ");   delay(2000); mySerial.begin(9600); // Setting the baud rate of GSM Module Serial.begin (9600); pinMode(trigPin, OUTPUT); pinMode(echoPin, INPUT);  pinMode(m11, OUTPUT);   pinMode(m12, OUTPUT);   } void loop() {  readPIR();  pingDist();  SendMessage(); } void pingDist ()   {     long duration, distance;...