• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1618
  • 643
  • 580
  • 293
  • 278
  • 193
  • 151
  • 77
  • 52
  • 50
  • 43
  • 42
  • 39
  • 34
  • 32
  • Tagged with
  • 4693
  • 891
  • 737
  • 700
  • 578
  • 561
  • 486
  • 465
  • 419
  • 418
  • 413
  • 372
  • 359
  • 353
  • 336
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
321

Forensic Insights: Analyzing and Visualizing Fitbit Cloud Data

Poorvi Umesh Hegde (17635896) 15 December 2023 (has links)
<p dir="ltr">Wearable devices are ubiquitous. There are over 1.1 billion wearable devices in the<br>market today[1]. The market is projected to grow at a rate of 14.6% annually till 2030[2].<br>These devices collect and store a large amount of data[3]. A major amount of this collected<br>data is stored in the cloud. For many years now, law enforcement organizations have been<br>continuously encountering cases that involve a wearable device in some capacity. There have<br>also been examples of how these wearable devices have helped in crime investigations and<br>insurance fraud investigations [4],[5],[6],[7],[8]. The article [4] performs an analysis of 5 case<br>studies and 57 news articles and shows how the framing of wearables in the context of the<br>crimes helped those cases. However, there still isn’t enough awareness and understanding<br>among law enforcement agencies on leveraging the data collected by these devices to solve<br>crimes. Many of the fitness trackers and smartwatches in the market today have more or<br>less similar functionalities of tracking data on an individual’s fitness-related activities, heart<br>rate, sleep, temperature, and stress [9]. One of the major players in the smartwatch space is<br>Fitbit. Fitbit synchronizes the data that it collects, directly to Fitbit Cloud [10]. It provides<br>an Android app and a web dashboard for users to access some of these data, but not all.<br>Application developers on the other hand can make use of Fitbit APIs to use user’s data.<br>These APIs can also be leveraged by law enforcement agencies to aid in digital forensic<br>investigations. There have been previous studies where they have developed tools that make<br>use of Fitbit Web APIs [11],[12], [13] but for various other purposes, not for forensic research.<br>There are a few studies on the topic of using fitness tracker data for forensic investigations<br>[14],[15]. But very few have used the Fitbit developer APIs [16]. Thus this study aims to<br>propose a proof-of-concept platform that can be leveraged by law enforcement agencies to<br>access and view the data stored on the Fitbit cloud on a person of interest. The results<br>display data on 12 categories - activity, body, sleep, breathing, devices, friends, nutrition,<br>heart rate variability, ECG, temperature, oxygen level, and cardio data, in a tabular format<br>that is easily viewable and searchable. This data can be further utilized for various analyses.<br>The tool developed is Open Source and well documented, thus anyone can reproduce the<br>process.<br>12<br></p>
322

Evaluating the Performance of Android and Web Applications for the 2048 Game : Using Firebase

Kokatam, Om Tejaswini, Pulimi, Pavithra Reddy January 2023 (has links)
Background: In the rapidly evolving field of game development, the demand for diverse platform support is increasingly significant. This thesis explores the creation of a Unity-based game compatible with both Web and Android platforms, addressing the rising need for cross-platform gaming experiences. The project aims for a comprehensive and adaptable methodology.Objectives: Our thesis aims to conduct a thorough performance comparison between an Android gaming application and a gaming web application, both featuring a similar user interface, using Firebase metrics. The evaluation will be performed on two designated devices, D1 and D2, measuring CPU load, network load, and memory usage. The research aims to provide insights into the performance variations of these applications while playing the 2048 game on specific devices. This investigation contributes to a deeper understanding of how different platforms and device specifications impact gaming experiences in terms of computational load and network responsiveness.Method: In our thesis, we optimize Unity as the main game engine, allowing for easy-platform-to-platform code exchange. To gather user information and performance metrics, it incorporates Firebase SDK(Software Development Kit), which includes Firebase Analytics and Firebase Performance SDK. Using Android Studio and VisualStudio Code as the main development tool and Firebase Hosting for web deployment, the project is exported for both Android and the Web. The test was conducted on two devices (D1 and D2) while playing the game 2048 for 30 seconds.Results: The result of our analysis shows the comparison of metrics for CPU, memory, and network load of 2048 games for web and Android applications for two devices d1 and d2. The Web D2 consumes more memory than Android D2. Web and Android D1 use similar amounts of memory. Coming to CPU load D2 consumes more than D1 for both Web and Android. The network for web D2 has more network load than web D1 and both Android D1, and D2 have similar network loadConclusions: In conclusion, the Android applications will provide a more streamlined user experience, notably in terms of CPU and network efficiency when compared to the Web app While Android D1 and Web D1 have comparable memory requirements, Web tasks, particularly on Web D2, and Android tasks, especially on AndroidD2, both need significant memory utilization.Keywords: Web application, Android application, Firebase, Unity, Test lab, Performance
323

An Exploratory Analysis of Ex-Offender Employment in a Non-Urban Setting

Pape, Catherine M. 11 August 2014 (has links)
No description available.
324

Application-Aware Resource Management

Ghadse, Sheetal Prakash 21 March 2011 (has links)
No description available.
325

Simply Cooking - an interaction design project for children aged 8-12

Houlberg-Laursen, Maria January 2013 (has links)
The skill of cooking a meal from start to end is becoming a stressful every day activity in many homes in Denmark. Less and less parents focus on including their children in preparing dinner because they see it as a time-consuming activity that the child would rather be left out of. In this paper we examine the importance of teaching children how to cook from a young age as well as we investigate in why it can seem like such a big task for them to actually get started with cooking. The study focuses on how to develop an interactive tablet and smartphone application that provides children with an explorative platform for them to develop their cooking skills on. The detailed process of developing a simple tablet/smartphone application is explored in order to arrive at an understand of the challenges children face when cooking, how we encourage them to cook and how we facilitate them with the best possible options for this. By doing several explorative workshops and studying previous research about how children learn, understand and explore their creativity, we arrive at an understanding of the challenges, limits and benefits there would be with an application like this.
326

Simple Indoor Environmental Monitoring System for Houseplant using Web and Mobile Applications / Enkelt inomhus miljöövervakningssystem för krukväxt med webb- och mobilapplikationer

Jabbar, Maher January 2020 (has links)
In recent times, attention to the indoor plants in the houses has increased, which can be used to produce food or just for decoration and for health purposes. However, moving plants from their original place in nature to a closed place leads to negative effects due to changing environmental parameters around them. For instance, fluctuations in temperature, light, and soil moisture might affect indoor plant growth process. This work investigates the possibility of using the smart mobile and web applications to monitor remotely the most of changing environmental parameters around plants. These parameters can give the user the real-time information on air temperature and humidity, soil temperature and moisture, as well as amount of light. The Top-down method has been used to design a monitoring system to help the user keep informed of indoor climate changes. This system contains Raspberry and some sensors that are used in sensing various environmental conditions. It also includes the software component which defines services and actions to be taken on the data collected by sensing objects. The system is tested and evaluated in the indoor environment to prove the required concepts. The results indicated that web and mobile interfaces transfer data in real-time manner and send environmental information to the user. The data collected is visualized by different charts and figures to give a better understanding of the surrounding conditions in which the plant grows. It is concluded that the proposed system provides a user-friendly monitoring application to monitor the most indoor environmental parameters.
327

<b>Fate of soil residual herbicides in cover cropping systems</b>

Lucas Oliveira Ribeiro Maia (18420270), William G. Johnson (6508424), Eileen J. Kladivko (17477358), Shalamar D. Armstrong (18387737), Bryan G. Young (6508421) 22 April 2024 (has links)
<p dir="ltr">Cover crops and soil residual herbicides are some of the essential tools within the integrated weed management. When used at cover crop termination, residual herbicides can extend the period of weed control and reduce the selection pressure for herbicide resistance. However, previous research has indicated that the use of cover crops can increase the microbial activity of the soil which, in turn, is the primary route for herbicide degradation in the soil. In addition to the potential effect on the microbial breakdown of herbicides, cover crops can also alter the fate of herbicides by interception. Three field projects were established to (1) investigate the influence of cover crop [cereal rye (<i>Secale cereale</i> L.) and crimson clover (<i>Trifolium incarnatum</i> L.)] use on soil enzyme activities [β-glucosidase (BG) and dehydrogenase (DHA)], its effect on the concentration of residual herbicides (sulfentrazone, <i>s</i>-metolachlor, cloransulam-methyl, atrazine, and mesotrione) in the soil, and the interception of herbicides by cover crop residue; (2) to investigate the effect of cover crop termination strategies (fallow, standing, and roller crimped 1 d prior to application) and simulated rainfall volumes (0, 4.2, and 8.3 mm simulated over 20 min; equivalent to 0, 12.5, and 25 mm h<sup>-1</sup>) on atrazine wash off from cereal rye biomass onto the soil; (3) to investigate the effect of cereal rye termination strategies on the concentration of sulfentrazone, <i>s</i>-metolachlor, and cloransulam-methyl in the soil, weed control, and soybean [Glycine max (L.) Merr.] yield.</p><p dir="ltr">Results from the first project suggests that the use of cover crops occasionally resulted in increased BG and DHA activities relative to the fallow treatment. However, even when there was an increase in the activity of these two enzymes, increased degradation of the residual herbicides was not observed. Furthermore, the use of cereal rye or crimson clover as cover crops did not reduce the efficacy of the residual herbicides in controlling weeds early in the growing season.</p><p dir="ltr">In regards to the fate of atrazine after simulated rainfall, the results from the second project indicated that cereal rye biomass accumulation negatively impacted the amount of herbicide reaching the soil at the time of application. Although the roller crimped cereal rye reduced the amount of herbicide reaching the soil relative to the standing cereal rye, it also reduced atrazine leaching below the 0-5 cm of soil. Furthermore, in cover cropping systems with high levels of cereal rye biomass, more than 8.3 mm of rain are required to wash most of the atrazine off of the biomass.</p><p dir="ltr">Lastly, the adoption of the planting green systems resulted in up to 84% interception of residual herbicides by the roller crimped cereal rye biomass. The use of cereal rye as cover crop did not improve the weed control relative to the fallow during the two years of field research. Soybean yield losses ranged from 10 to 44% with the adoption of the planting green system, primarily due to stand losses. However, there are strategies and proper equipment available that can be used to minimize soybean stand losses.</p>
328

Using a Web Server Test Bed to Analyze the Limitations of Web Application Vulnerability Scanners

Shelly, David Andrew 17 September 2010 (has links)
The threat of cyber attacks due to improper security is a real and evolving danger. Corporate and personal data is breached and lost because of web application vulnerabilities thousands of times every year. The large number of cyber attacks can partially be attributed to the fact that web application vulnerability scanners are not used by web site administrators to scan for flaws. Web application vulnerability scanners are tools that can be used by network administrators and security experts to help prevent and detect vulnerabilities such as SQL injection, buffer overflows, cross-site scripting, malicious file execution, and session hijacking. However, these tools have been found to have flaws and limitations as well. Research has shown that web application vulnerability scanners are not capable of always detecting vulnerabilities and attack vectors, and do not give effective measurements of web application security. This research presents a method to analyze the flaws and limitations of several of the most popular commercial and free/open-source web application scanners by using a secure and insecure version of a custom-built web application. Using this described method, key improvements that should be made to web application scanner techniques to reduce the number of false-positive and false-negative results are proposed. / Master of Science
329

Generation of safe environmentsin geolocation applications

Börjesson, Arvid January 2023 (has links)
Mobile applications may employ the GPS as user input to create location-based games. The existing landscape of location-based applications predominantly falls into two categories: those offering high-paced action with free movement and those providing movement between established locations at a leisurely pace. However, the combination of fast player movement between game-selected locations can potentially lead to significant accidents if the locations are poorly chosen. A naively designed system may encourage players to traverse rivers, cross highways,or trespass into private areas. This report introduces a design aimed at establishing a safe real-world environment in mobile applications by mapping the surroundings and guiding the player safely. A map generationsystem is proposed, along with a conceptual framework for utilization the generated map.
330

Analyzing the feasibility of using secure application integration methodology (SAIM) for integrating don enterprise resource planning (ERP) application

Marin, Ramon O. 03 1900 (has links)
Approved for public release, distribution is unlimited / A thorough examination of the Secure Application Integration Methodology (SAIM) for applicability in the Department of the Navy (DON) would provide useful information about a beneficial methodology. SAIM is analyzed, by accessing its step by step directions, for suitability in the integration of the Enterprise Resource Planning (ERP) projects implemented by the SYSTEMS COMMANDS (SYSCOMS). The Navy Enterprise Convergence Team (NECT) that leads the ERP integration effort could benefit from a sound Enterprise Application Integration methodology. Results do not support SAIM as the sole guiding EAI methodology however it could have some value to the NECT. SAIM has three primary benefits which NECT could employ: 1) It provides a complete walkthrough of the EAI process, 2) It emphasizes the importance of an Enterprise Architecture, and 3) It provides useful management checklists along with other important considerations. SAIM also has some significant shortcomings: 1) It does not support all the DON Chief Information Officer requirements, 2) It does not provide Change Management Guidance, 3) It does not take into account the uniqueness of the Navy's environment, and finally 4) SAIM relies on an Enterprise Architecture as its foundation which the Navy does not currently have. / Lieutenant Commander, United States Navy

Page generated in 0.1022 seconds