121 research outputs found

    Introductory Computer Forensics

    Get PDF
    INTERPOL (International Police) built cybercrime programs to keep up with emerging cyber threats, and aims to coordinate and assist international operations for ?ghting crimes involving computers. Although signi?cant international efforts are being made in dealing with cybercrime and cyber-terrorism, ?nding effective, cooperative, and collaborative ways to deal with complicated cases that span multiple jurisdictions has proven dif?cult in practic

    Marketing health and nutrition claims; Their subjective importance, attitudinal influences and cognitive representation

    Get PDF
    This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University.This thesis analyses the subjective importance, attitudinal influences and cognitive representation of marketing health and nutrition claims. Examining the importance of claims to choices of members of the public revealed that claims were accorded the highest subjective importance, despite low visual attention. This finding was replicated with students and staff of a Food Science department, an indication that relatively higher knowledge does not alter their perceived importance. The attitudinal influence of claim information was measured by ratings on attributes, previously generated specifically for the study, for packages shown with and without claims on computer. Packages with-claims were perceived as significantly more informative, easier to purchase and influenced participants to believe that others, whose opinion is important to them, would think that they should buy them. Data reduction of the attribute scores produced three factors; enjoyment, nutrition and surface appearance. Enjoyment was twice as important to participants' attitude to purchase than nutrition. With French participants, the results showed that the claims only influenced the perception of flavour, which was thought to be worse in the with-claims condition. There was no replication of the finding that others would be significantly more likely to think they should buy the products that displayed claims. Both population samples thought the provision of information on food labels to be highly important. The cognitive representation of claims was explored using recognition and recollection tests. The first experiments revealed that British consumers have an expectation that claims will be worded in implication form to avoid legal infringements. Food and vocabulary related knowledge differences did not alter this finding. Testing long term memory showed an increased effect with British participants, but no effect with the French owing to their lack of experience of such claims. Finally, no distinction between the meaning of the implied and asserted forms of the claims were shown in a test conducted using only British participants

    Learning and Automation GPIO Platform

    Get PDF
    Tato práce popisuje vývoj univerzální softwarové a hardwarové platformy pro přístup k hardwarovým sběrnicím a elektrickým obvodům z prostředí vysokoúrovňových programovacích jazyků a aplikací běžících na PC, a to za využití USB, UARTU a také bezdrátově. Byly vyhodnoceny požadavky typických problémů vyskytujících se při práci s vestavěnými systémy a ve výuce za účelem návrhu snadno rozšiřitelného a přenastavitleného hardwarového modulu který bude praktickým, pohodlným a dostupným nástrojem, který navíc v některých případech může nahradit profesionální laboratorní přístroje. Bylo navrženo několik prototypů hardwarových modulů spolu s obslužnými knihovnami v jazycích C a Python; Python knihovnu lze dále používat z prostředí MATLAB. Navržené moduly umožňují přístup k většině běžných hardwarových sběrnic (I2C, SPI, USART, 1-Wire) a umožňují také měřit frekvenci a vzorkovat či generovat analogové signály.This thesis documents the development of a universal software and hardware platform providing high-level user applications running on a PC with access to GPIO pins, hardware buses, and signal acquisition and generation functions, using USB, USART, or a wireless connection. The requirements of common engineering tasks and problems occurring in the university environment were evaluated to design an extensible, reconfigurable hardware module that would make a versatile and low-cost tool that in some cases eliminates the need for professional measurement and testing equipment. We designed custom hardware modules, an extensible microcontroller firmware, and PC support libraries for programming languages C and Python. The Python library may further be used in MATLAB scripts. The devices provide access to hardware buses (I2C, SPI, USART, and 1-Wire) and microcontroller peripherals (GPIO, ADC, and DAC), implement frequency measurement and other useful features. They are configured in INI files accessed through on a virtual USB mass storage device, or programmatically

    Formalization Of Input And Output In Modern Operating Systems: The Hadley Model

    Get PDF
    We present the Hadley model, a formal descriptive model of input and output for modern computer operating systems. Our model is intentionally inspired by the Open Systems Interconnection model of networking; I/O as a process is defined as a set of translations between a set of computer-sensible forms, or layers, of information. To illustrate an initial application domain, we discuss the utility of the Hadley model and a potential associated I/O system as a tool for digital forensic investigators. To illustrate practical uses of the Hadley model we present the Hadley Specification Language, an essentially functional language designed to allow the translations that comprise I/O to be written in a concise format allowing for relatively easy verifiability. To further illustrate the utility of the language we present a read/write Microsoft DOS FAT12 and read-only Linux ext2 file system specification written in the new format. We prove the correctness of the read-only side of these descriptions. We present test results from operation of our HSL-driven system both in user mode on stored disk images and as part of a Linux kernel module allowing file systems to be read. We conclude by discussing future directions for the research

    Construction, Operation and Maintenance of Network System(Junior Level)

    Get PDF
    This open access book follows the development rules of network technical talents, simultaneously placing its focus on the transfer of network knowledge, the accumulation of network skills, and the improvement of professionalism. Through the complete process from the elaboration of the theories of network technology to the analysis of application scenarios then to the design and implementation of case projects, readers are enabled to accumulate project experience and eventually acquire knowledge and cultivate their ability so as to lay a solid foundation for adapting to their future positions. This book comprises six chapters, which include “General Operation Safety of Network System,” “Cabling Project,” “Hardware Installation of Network System,” “Basic Knowledge of Network System,” “Basic Operation of Network System,” and “Basic Operation and Maintenance of Network System.” This book can be used for teaching and training for the vocational skills certification of network system construction, operation, and maintenance in the pilot work of Huawei’s “1+X” Certification System, and it is also suitable as a textbook for application-oriented universities, vocational colleges, and technical colleges. In the meantime, it can also serve as a reference book for technicians engaged in network technology development, network management and maintenance, and network system integration. As the world’s leading ICT (information and communications technology) infrastructure and intelligent terminal provider, Huawei Technologies Co., Ltd. has covered many fields such as data communication, security, wireless, storage, cloud computing, intelligent computing, and artificial intelligence. Taking Huawei network equipment (routers, switches, wireless controllers, and wireless access points) as the platform, and based on network engineering projects, this book organizes all the contents according to the actual needs of the industry

    Cyberspace and Real-World Behavioral Relationships: Towards the Application of Internet Search Queries to Identify Individuals At-risk for Suicide

    Get PDF
    The Internet has become an integral and pervasive aspect of society. Not surprisingly, the growth of ecommerce has led to focused research on identifying relationships between user behavior in cyberspace and the real world - retailers are tracking items customers are viewing and purchasing in order to recommend additional products and to better direct advertising. As the relationship between online search patterns and real-world behavior becomes more understood, the practice is likely to expand to other applications. Indeed, Google Flu Trends has implemented an algorithm that accurately charts the relationship between the number of people searching for flu-related topics on the Internet, and the number of people who actually have flu symptoms in that region. Because the results are real-time, studies show Google Flu Trends estimates are typically two weeks ahead of the Center for Disease Control. The Air Force has devoted considerable resources to suicide awareness and prevention. Despite these efforts, suicide rates have remained largely unaffected. The Air Force Suicide Prevention Program assists family, friends, and co-workers of airmen in recognizing and discussing behavioral changes with at-risk individuals. Based on other successes in correlating behaviors in cyberspace and the real world, is it possible to leverage online activities to help identify individuals that exhibit suicidal or depression-related symptoms? This research explores the notion of using Internet search queries to classify individuals with common search patterns. Text mining was performed on user search histories for a one-month period from nine Air Force installations. The search histories were clustered based on search term probabilities, providing the ability to identify relationships between individuals searching for common terms. Analysis was then performed to identify relationships between individuals searching for key terms associated with suicide, anxiety, and post-traumatic stress

    Intel Galileo and Intel Galileo Gen 2

    Get PDF
    Computer scienc
    corecore