Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Business

Traffic Analysis Of Cities In San Bernardino County, Sai Kalyan Ayyagari May 2024

Traffic Analysis Of Cities In San Bernardino County, Sai Kalyan Ayyagari

Electronic Theses, Projects, and Dissertations

This research offers an in-depth analysis of vehicular traffic within San Bernardino County, California, aiming to spotlight congestion areas and suggest improvements for more efficient and sustainable transportation. Leveraging 2021 data from StreetLight Data, traffic patterns in 15 key cities were examined based on their population sizes, covering various vehicle types to dissect dynamics and flow. The methodology focused on analyzing trip purposes and metrics to calculate Vehicle Miles Traveled (VMT) and its influence on congestion and environmental factors.

Findings indicate considerable disparities in traffic volume, purposes, and timings across different urban areas, with population density and intercity connections significantly …


Truck Traffic Analysis In The Inland Empire, Bhavik Khatri May 2024

Truck Traffic Analysis In The Inland Empire, Bhavik Khatri

Electronic Theses, Projects, and Dissertations

This study undertakes a meticulous examination of truck traffic within the Inland Empire, focusing on the distribution and dynamics of medium and heavy-duty vehicles, to advocate for the region's transition to electric trucks. Utilizing advanced spatial analysis and data from Streetlight Data, it segments the region into six subregions, revealing distinct traffic patterns and environmental impacts. Notably, the research uncovers that the North Center and West zones, integral to the logistics and warehousing sectors, exhibit the highest traffic volumes, significantly influencing air quality and infrastructure.

Quantitative results from 2021 illustrate a pronounced disparity in truck activity: medium-weight vehicles accounted for …


Integration Of Blockchain Technology Into Automobiles To Prevent And Study The Causes Of Accidents, John Kim Dec 2021

Integration Of Blockchain Technology Into Automobiles To Prevent And Study The Causes Of Accidents, John Kim

Electronic Theses, Projects, and Dissertations

Automobile collisions occur daily. We now live in an information-driven world, one where technology is quickly evolving. Blockchain technology can change the automotive industry, the safety of the motoring public and its surrounding environment by incorporating this vast array of information. It can place safety and efficiency at the forefront to pedestrians, public establishments, and provide public agencies with pertinent information securely and efficiently. Other industries where Blockchain technology has been effective in are as follows: supply chain management, logistics, and banking. This paper reviews some statistical information regarding automobile collisions, Blockchain technology, Smart Contracts, Smart Cities; assesses the feasibility …


Integration Of Internet Of Things And Health Recommender Systems, Moonkyung Yang Dec 2021

Integration Of Internet Of Things And Health Recommender Systems, Moonkyung Yang

Electronic Theses, Projects, and Dissertations

The Internet of Things (IoT) has become a part of our lives and has provided many enhancements to day-to-day living. In this project, IoT in healthcare is reviewed. IoT-based healthcare is utilized in remote health monitoring, observing chronic diseases, individual fitness programs, helping the elderly, and many other healthcare fields. There are three main architectures of smart IoT healthcare: Three-Layer Architecture, Service-Oriented Based Architecture (SoA), and The Middleware-Based IoT Architecture. Depending on the required services, different IoT architecture are being used. In addition, IoT healthcare services, IoT healthcare service enablers, IoT healthcare applications, and IoT healthcare services focusing on Smartwatch …


Privacy Is Infringed In Plain Sight And How To Dissapear, Zachary Taylor May 2021

Privacy Is Infringed In Plain Sight And How To Dissapear, Zachary Taylor

Electronic Theses, Projects, and Dissertations

This culminating project explored how Amazon, Apple, Facebook, Google, and Microsoft infringe on their user's information privacy. Focus was on tools and techniques one can use to strengthen their information privacy. Privacy or information privacy was defined as the right to have some control over how your personal information is collected and used. This project will also introduce a verity of open-source tools and techniques that would help the unsuspected user to maintain their privacy.The questions asked were: what are some common techniques that Amazon, Apple, Facebook, Google, or Microsoft use to gain personal information?, At what cost would it …


Analysis On Suicidal Ideation Among Adolescents (12-17 Years) In The Usa, Himani Raturi Jul 2020

Analysis On Suicidal Ideation Among Adolescents (12-17 Years) In The Usa, Himani Raturi

Electronic Theses, Projects, and Dissertations

Suicide is one of the leading health concerns in United States among adolescents and the presence of suicidal ideation (SI) is quite high, with ~20-30% of adolescents reporting it at some point. Though we have seen growth and development in the prevention of suicide, there is limited research on the ability to identify the adolescents which might be at risk for SI. The objective behind the project is to identify adolescents with SI using machine learning.

The project shows statistics from different articles on adolescents in the U.S. For this study, adolescent data was taken from NSDUH 2018. Moreover, detailed …


Email Data Breach Analysis And Prevention Using Hook And Eye System, Shubhankar Jayant Jathar Jul 2020

Email Data Breach Analysis And Prevention Using Hook And Eye System, Shubhankar Jayant Jathar

Electronic Theses, Projects, and Dissertations

Due to the recent COVID-19 outbreak, there were a lot of data leaks from the health sector. This project is about the increase in data breach incidents that are taking place. In this project, There is an analysis of different types of breaches that are found online and are practiced to steal valuable information. Talking about different aspects that lead to data breaches and which are the main sector or main epicenter for data leaks. The analysis tells that most of the data breaches are done using emails and to overcome this limitation a system has been designed that will …