Monday, May 18, 2020

The Manhattan Project And The Creation Of The Atomic Bomb

In the early morning hours of July 16, 1945, the first ever nuclear explosion took place in Alamogordo, New Mexico. The explosion was the first test of the most destructive weapon ever known to man and was the result of almost six years of research and development by some of the world’s top scientists. This endeavor was known as the Manhattan Project. Less than a month after the test, which was known as Trinity, the United States dropped two nuclear bombs on Japan, three days apart, which forced the Japanese to surrender. The story of the Manhattan Project is an abysmal subject, as is the effect of the Manhattan Project on international politics, and both will be covered in this paper. Indeed, the Manhattan Project and the creation of the atomic bomb were good things, because it actually decreased the likelihood of nuclear war in the post- World War II era. The Manhattan Project was preceded by a variety of scientific discoveries in the 1920’s and the 1930’s. During this time of scientific discovery, Hitler had been steadily rising to power in Germany, and before long, physicist Leo Szilard and fellow Hungarian Jews Eugene Wigner and Edward Teller became worried. They decided that the President of the United States must be informed about the new fission technology that had been discovered, which they believed was capable of making bombs. The three physicists enlisted the help of Albert Einstein, the foremost scientist in that period, and together they drafted aShow MoreRelatedA Scientific Breakthrough That Changed The Face Of International And Domestic Warfare Forever1614 Words   |  7 Pagesbreakthrough that changed the face of international and domestic warfare forever was named the Manhattan Project (1942). The Manhattan Project (1942) was under the direction of physicist J. Robert Oppenheimer. Its focus was to cre ate a bomb using the expulsion of atomic energy. This secret operation where they built and assembled the first atomic bomb was located in Los Alamos, New Mexico. With the creation of such a device of destruction no one imaged it would lead to the deaths of almost 300,000 JapaneseRead MoreAmerica Chose To Drop Atomic Bombs On Japan, And This Affected1314 Words   |  6 PagesAmerica chose to drop atomic bombs on Japan, and this affected the war and the country in many ways. America was trying to stop the war and make Japan surrender. Atomic bombs, which are nuclear weapons, were dropped by the United States on the cities of Hiroshima and Nagasaki, Japan. Atomic bombs terrify everyone today, but at that time, they were considered an indispensable step for an early end to the war with minimal human losses. Some people believed the bombings of Hiroshima and Nagasaki wereRead MoreThe World s First Atomic Bomb Essay1326 Words   |  6 PagesRobert Oppenheimer. The Manhattan Project was the research and making of the world’s first atomic weapons. This was a major asset that led the U.S into beating Japan and caused the war to cumulate. The Manhattan Project brought nations together, took the necessary measure to end World War II, and gave America multiple industrial advancements used in modern day warfare. The Manhattan Project was the code name for the effort to produce the first atomic bomb during WWII. The project began in 1939, whenRead MoreThe Manhattan Project Shaped History1093 Words   |  5 Pagesthis day because of the creation of the Manhattan Project brought into existence over 70 years ago. Long and short term affects have been acknowledged due to the creation of atomic warfare. Harry S. Truman stated â€Å"I knew what I was doing when I stopped the war†¦ I have no regrets and, under the same circumstances, I would do it again.† The Manhattan Project shaped history as we know it today. In 1939 President Roosevelt was told of the German exploration to yield atomic artilleries for war. RooseveltRead MoreThe Atomic Bomb1094 Words   |  5 PagesThere are many scientists and nations that can be accredited to helping create the atomic bomb. The idea of the atomic bomb with atoms and fission was not conceived overnight. The scientist from Ernest Rutherford who is from New Zealand to German, British, Japanese, and other scientist from across the globe all contributed to nuclear physics and research on the atom. Most who worked on the famous Manhattan Project were from other countries. The Republic of science was not an actual institution butRead MoreUSSR Will Get a Bomb, It Just Matters if US Can Hold Them Off1498 Words   |  6 Pageswill get a bomb, it just matters if US can hold tehm off Franklin Delano Roosevelt (FDR) should have shared limited information on the Manhattan Project with the Soviet Union (USSR) in order to bolster the integrity of their momentary coalition, promote international scientific collaboration, as well as prevent the eventual possibility of a nuclear armaments race. By the end of WWII Soviets spies had so deeply infiltrated the Manhattan Project that the possibility of keeping atomic weapons underRead MoreThe Manhattan Project Essay example1381 Words   |  6 Pagesthreatening to build an atomic weapon, created a secret project to develop the technology first. Under the codename, the Manhattan Project, leading scientists carried out top secret research on fission and the technology needed to create the first atomic bomb. The immediate impact of the Manhattan Project was the dropping of two atomic bombs on Japan, ending the war in the Pacific. However, more important influences of this project can be seen following the detonation of the fi rst bombs. The emergence ofRead MoreBuilding An Atomic Bomb Of The United States Entered Into World War II1507 Words   |  7 Pages Manhattan Project Nuclear research all started when the Japanese bombed Pearl Harbor, and the United States entered into World War II. When the United States realized that Germany attempted to build an atomic bomb, Americans began to concentrate on their research about creating an atomic bomb more heavily. President Franklin D. Roosevelt created the Manhattan Project, which included a group of top scientists, under General Leslie R. Groves, who worked around the clock to try to develop an atomicRead MoreThe Atomic Bomb Of The United States Essay1748 Words   |  7 Pagesthe detonation of the first atomic bomb took place near Los Alamos, New Mexico. This atomic bomb testing would forever change the meaning of war. As the atomic bomb was detonated it sent shock-waves all over the world. There was endless research done on the bomb in the United States. The research was called The Manhattan Engineer District Project but it was more commonly known as The Manhattan Project. The Manhattan Project was brought by fear of Germany and its atomic research. On account of theRead MoreOutline Of The Manhattan Project1621 Words   |  7 Pages The Manhattan Project Jervontae Young Mr.Davis English III 16 october 2017 Outline Thesis Statement: The Manhattan Project was the American program for researching and developing the first atomic bombs because of the project it cost a lot of people their lives. Introduction Which President form the Atomic Bomb in why? The agencies leading up to the Manhattan Project were first formed in 1939 by President Franklin D. Roosevelt U.S. intelligence operatives reported that scientists working

Wednesday, May 6, 2020

Essay about Medicinal Value of Yoga - 2978 Words

Medicinal Value of Yoga What most Westerners picture when you say Yoga, is an Indian guru in cloth shorts or a long flowing robe, twisted up in a some sort of a pretzel pose. You may picture the Yoga practitioner in peak physical shape, as well as, being a very peaceful human being. It is attaining this goal that is the aim of Yoga, but what most of people dont realize, is exactly how much goes into achieving this state. Yoga time honored teaching on how to achieve physical health, psychological well being and spiritual peace. This can be achieved by concentrating for hours in a state of complete focus, know as meditation. While mediating, the practitioner assumes various body positions known as asanas, that allows for maximum†¦show more content†¦Yoga exercises (physical, mental or spiritual) based on eastern metaphysical assumptions designed to aid in enlightenment or self-realization. Goals sometimes include Altered States of consciousness or uniting the practitioner with the impersonal pant heistic God. Yoga philosophy is based on the concept of Reincarnation, the Upanishads and other Hindu scripture. In this essay I would like to briefly explore the primary branches of Yoga: Karma, Bhakti, Juana, and Raja Yoga and point out their advantages and pitfalls as well as point out the value of their practice as it pertains to keep the body healthy and free from disease. ): Yoga can be experienced on many different levels for example: as a way to relax after a long stressful day; or a more physically demanding focus on strengthening and invigorating the body; as a more therapeutic practice for a particular physical difficulty or ailment; or as a path to spiritual enlightenment to reach a higher state of consciousness and a union with the Divine. Medicinal Value of Yoga In India, yoga has been practiced for thousands of years, and for the past 80 years, western scientists have studied its use as a therapy in various disorders. A session of yoga lasts about 20 minutes and includes a secession of postures progressing from simple to complex with simultaneous, structured, deep breathing. Yoga enables a person to control many physiological aspects including metabolic rate andShow MoreRelatedHealth, Illness And Wellness2522 Words   |  11 Pagesof health, illness and wellness and my own personal ideologies about health, family beliefs and cultural health concepts which could affect the health and wellbeing. My visual presentation represents mammography for Visualization for breast cancer, yoga meditation, home remedies, nutritious diet and hand washing. How they impact and influence me in supporting my health and health needs of my family. I also discuss the influence of these conceptions on my personal life and how all these apply to myRead MoreHealth , Illness And Wellness2377 Words   |  10 Pagesof health, illness and wellness and my own personal ideologies about health, family beliefs and cultural health concepts which could affect the health and wellbeing. My visual presentation represents, mammography for Visualization for breast cancer, yoga meditation, hand washing, home remedies and nutritious diet. How they impact and influence me in supporting my health and health needs of my family. I also discuss the influence of these conceptions on my personal life and how all these apply to myRead MoreCareer Planning Guidelines : State Of Employment Essay1644 Words   |  7 Pagessince we have such a large number of requests we may see as clashing. Here are approaches to deal with your time all the more viably: †¢ Take a seat with your mate or accomplice to talk about and arrange relationship desires. †¢ Adjust your needs and values amongst home and work. †¢ Search for ranges where you ought as far as possible and limits on your time—both at home and at work—and stick to them. †¢ Set breaking points with patients while as yet passing on compassion and ingraining their trust inRead MoreHealth Tourism1035 Words   |  5 Pagespaper? Health tourism is a boon to any country as it gets revenue and foreign exchange Health Tourism in India The quality of service coupled with comparatively low charges for common surgeries has made India an attractive destination for medical value travel. The main clientele comes from the neighbouring countries but an increasing number of non-resident Indians (NRIs) settled in the US and the UK have also been availing of the healthcare services in India. There is a good prospect of patientsRead MoreThe Cannabis Wellness Center: Industry Competitive Analysis3305 Words   |  14 Pagestissue of the spinal cord with intractable spasticity, epilepsy, HIV/AIDS and hospice patients. Its services/products include cannabis growing techniques, medicating techniques, medicated or non-medicated foods, tinctures, et cetera, and a line of medicinal products under its own brand name: Canna-balance. There will be a retail market for hydroponics, aeroponics, vertical farming, a multiple kitchenette filled classroom, and a restaurant. The company will be based in large warehouses, throughout theRead Mo reThe Spiritual Responsibility Of The Healthcare1608 Words   |  7 Pagesoffer their patients better counsel. This leads to the spiritual responsibility of the healthcare workers to the patient. The first responsibility is to acknowledge the patient’s spiritual experience as a significant foundation and enhancement to medicinal healing. It is imperative that the healthcare worker listens attentively to the patient’s negative spiritual experience and shows compassion, which affirms to the patient that the healthcare worker is committed and sympathetic. This gives the healthcareRead MoreMedical Tourism Industry - Advantage India by C.B. Venkata Krishna Prasad2670 Words   |  11 Pagespromoted a consumerist culture leading to the mushrooming of corporate healthcare setting seized with the necessity to maximize profits and expand their coverage. India is unique as it offers holistic healthcare addressing the mind, body and spirit, with yoga, meditation, ayurveda an d other Indian systems of medicine. India offers a vast array of services combined with the cultural warmth that is difficult to match by other countries. The medical travelers In the late 1980s and early 1990s, most medicalRead MoreMedimix4051 Words   |  17 PagesDirector of AVA Cholayil Health Care Pvt. Ltd. The focus of AVAPS is to provide Products amp; Services which benefit the human kind with the knowledge and time-tested procedures assimilated from the traditional system of Ayurveda, Naturopathy and Yoga which has been followed from time immemorial. | | The handmade soaps of Medimix Classic, Medimix Transparent, Medimix Sandal and Medimix Handwash are being marketed by AVAPS in the Southern states of India namely Andra Pradesh, Karnataka, TamilRead MoreChinese Food Culture5877 Words   |  24 PagesInclusion of Medicinal Foodstuffs/ Herbs - The cooking tradition of China, since time immemorial, has been intricately linked to the use of herbs and other foodstuffs and/or spices that are believed to have a beneficial effect on the body, and in some cases may be considered as part of a traditional (folk or ancestral) treatment. Some of these foodstuffs/ herbs may be quite tasty in and of themselves, and might be desired as a taste enhancer even should their putative medicinal value be provenRead MoreA Study on the Employee Welfare Measures Ai Nagarjuna Ayurvedic Herbal Concentratesltd8247 Words   |  33 Pageswelfare measures of Nagarjuna from the employees’ point of view. 4. To provide some valuable suggestions for improving the existing welfare measure of the company. SCOPE OF THE STUDY In a world of changing values, where ideologies are rapidly under going transformation, rigid statements about the field of labour welfare need to be revised. Labour welfare work is increasing with changing opportunities and need to meet varying

Strength free essay sample

Question: Select a creative work a novel, a film, a poem, a musical piece, a painting or another work of art that has influenced the way you view the world and the way you view yourself. Discuss the work and its effect on you. The way her overbearing wrinkles read of strain and unnecessary stress. The way a single blanket drapes across her arm, protecting her from nothing but a minor set of chills passing with the wind. The way her children shun any light from entering their weak eyes by hiding behind their mother’s scrupulous, yet broken back. The Migrant Mother by Dorthea Lange is a disheartening picture on the surface, but below its rough exterior it gives a new found hope. Because The Migrant Mother reveals issues that make society seem insignificant in perspective, a thought came upon me: the world is not always fair, it is not always kind, but it is the only world we have and we have to make the best with what it gives us. As she began to grow up, the times spent in the dollhouse gradually came to a halt. We grew apart, but that vision of her future life stuck with me, and soon everything began to fall into place. She had the big, burly husband, the house (although not Victorian), and, to top it all off, she had the baby bump. The vision for her future had now become her reality. But one doctor’s visit later, her reality had morphed into a nightmare. â€Å"A†¦ a what?† My ears picked up the distress in my mom’s voice instantly, and I looked up from my homework as she gently put the phone down and leaned on the kitchen counter for support. Something was wrong. â€Å"Mom†¦Ã¢â‚¬  I said timidly. She took a deep breath and looked up at me with a tear rolling down her cheek. My sister had had a miscarriage, and it took every ounce of my mom’s strength to say it out loud, as if leaving it unsaid made it any less real. I did not expect to see my sister at church for a while because in my weak little mind it was completely reasonable to be angry with God after what had happened. However, my sister came, and she did not merely come just to come; she had come to worship. This continued Sunday after Sunday through miscarriage after miscarriage, and after her fourth, it seemed as if she was worshipping even more wholeheartedly than she ever had before. How? I kept asking myself. Where did she get this inner strength? When I finally asked her these questions that had been plaguing me, she just smiled and simply said, â€Å"Christ. He gives me strength when I am weak.† This simple Biblical truth that I had learned in Sunday school ten years before, when uttered by my sister, now stared me straight in the face. How could this woman, who had lost four babies in the last two years, remain so strong while I gave up at the simplest challenge? She did it through Christ, of course, and I could do it too. My sister, my wonderful sister, spoke the words that utterly changed my definition of weakness and of myself. So, what is my definition of weakness now? Weakness is anything in me apart from Christ. He is my strength.

Digital Forensic on WeChat on Android †MyAssignmenthelp.com

Question: Discuss about the Digital Forensic on WeChat on Android. Answer: Introduction: The selected topic is forensic analysis of WeChat on Android phones. In the whole world, WeChat can be considered as one of the most used IM or instant messaging android application. By 2015, WeChat achieved six-hundred and ninety seven million of users from all over two hundred countries. The article has presented WeChat forensic through five stages such as installation path and data acquisition, decrypting the message database, communication of records, moments and conversion of audio file format. The use of the world wide based application is being extensively increasing each year. Moreover, various criminals are currently using the application for illegal activities. The application has two basic functionalities such as chat and moments. In the chat section, the user communicate with other person and in the moments section, the user shares the life events. Wu et al. (2017) has provided various information regarding the forensic of the application on the android devices and analyzed all those gathered data into bounded parameter. This study has reviewed all those information that was provided into the journal. Moreover, critically reviews the process of investigating and data gathering process of the author. For better understanding of the topic various other journals have been accessed and information gathered from those articles has also been included into this study. The comparison between the information provided in the articles can be visualized into the study. This study includes the information gathered from various articles regarding the forensic investigation of WeChat. The actual study is based on the data gathered by various articles during investigation of WeChat on android devices. These investigations are the process of acquiring data of WeChat and decoding the encrypted database, what was communicated by the user and whom did he/she communicate and the information shred through the moments. Development: Installation paths and data acquisition For the installation of the Wechat application ann installation path is required to be specified on the android device and by default the path of the application is set as /data/data/com.tencent.mm/ and /sdcard/Tencent/MicroMsg. The sub directories are created in the installation location for storing the chat records and the media files. For storing the configuration of the application com.tencent.mm is used. It acts as the database of the application and the authentication of the users and cache data are also stored here. The directory created MicroMsg is used for storing the record of the user and activity in WeChat (Wu et al., 2017). A unique number is created in WeChat for representing the identity of the user and a personal data folder is created in the installed location /data/data/com.tencent.mm/MicroMsg. Encryption is applied and the personal folder appears using the MD5 number transformed from the user unique ID. The user directory is also used for storing the multimedia fil es under the path /sdcard/Tencent/MicroMsg. The multimedia files can be of different types such as audio, pictures, gifs, videos, etc (Gao Zhang, 2013). For each of the user a private encrypted folder is created using the MD5. Rooting the android device can give access permission for the com.tencent.mm directory and it can be used for getting digital evidence from the android device. The data can be extracted directly from the rooted android device and exported using the Android Debug Bridge command (adb). The adb pull command is used for accessing the directory /data/data/com.tencent.mm. In case of the unrooted android devices the data cannot be accessed and using the adb pull command (Zhang, Yu Ji, 2016). It requires new method and numerous test is required to be done on the device for getting the data. The version of the android is also dependent for getting the backup of data of the unrooted android devices. The unrooted backup method work on the weChat version 6.0 and the bac kup command is used for compressing the backup to a .tar.gz file and it can be used for getting the necessary data ythat can be used for the forensics. For the WeChat verison later than 6.0 it is required to be downgraded and the adb backup command is used for backing the user data (Choi, Park Kim, 2017). There is an possibility of loss of data due to down grading the WeChat to the 6.0 version and thus necessary test is required to be done on the device. The directory /sdcard/Tencent/MicroMsg can be accessed directly and it does not require any root permission so it can be extracted using the adb pull command for avoiding the risk of loss of data. Decrypting the messages database The messages sent using the WeChat are encrypted for increasing the security and EnMicroMsg.db is used for the encryption of the message. The encryption is applied using the SQLCipher (Yuming, Junren Kai, 2015). Thus a decryption code is required for decryption of the message and the decryption code can be used by analyzing the IMEI International Mobile Equipment Identity code of the android device. The unique Id of the WeChat user profile is as dec_key = Left7 (Md5 (IMEI + uni)), here the Left 7 is used for extracting the first 7 string of the Md5 value. The IMEI data is used and extracted from the configuration file system_config_prefs.xml and CompatibilityInfo.cfg (Chen Wang, 2015). The encryption of the database is done using the SQLite where the database file is divided into small blocks of 4 kb and the cipher text of the files are computed using the AES algorithm. The decryption of the database is done by using the decryption key and converting the cipher text into plain text . The unique Id is the main element used for the computation of the decryption key and in case of multiple WeChat account in a same android device the unique ID of the last user is kept in the system_config_prefs.xml file and the personal folder is required to be accessed and the unique ID is required to be computed from the name used in the personal folder (Chu, Wang Deng, 2016). The folder is names as the name of the dir_name i.e. Md5 (mm + uni) and the value of the uni is 32 bit length and thus it can be searched for finding the value of the uni. More time is required for finding the value and it can be about 48 hours and pre computation of the names stored in the directory requires storage space of 100 gb and they are stored in the format of the balanced binary tree (Zhang, 2016). Scripts can be created in different language for making the decryption process easier and the files are given as input for getting the desired output from the file. There are different tools that can be used for finding the IMEI and the EnMicroMsg.db can be used as the input for decrypting the file and finding the pragam key. Communication records For performing a forensic analysis on the communication records of WeChat all conversation records are required to be accessed and their time and sender information is also required to be available to the analyst (Yanni Junren, 2016). The chat in the WeChat application often contains images, multimedia informations, emojis, voice record and chat messages. The conversation records of te user is stored in the message table of the database created in EnMicroMsg.db. There are different storage scheme and for recording the message and different fields are created for storing different types of messages (Lee Chung, 2015). The normal text conversations are stored in the database with a field labelled contents and for the multimedia contents such as audio, images and videos local storage is used. The multimedia files can be accessed directly by analyzing the encoded strings and for example if isSend is encoded as 1 the message was sent to the recipient by the sender or it was sent by the t alker. The complete recovery of the chat message is important for understanding the whole scenario and better understand the meaning of the communication (Sun Qin, 2014). The detailed process for recovering the multimedia file is to find the encoded string THUMB_DIRPATH://th_dbb5e4622e87f85226c8da6893698fc0. Let S1represent the header string THUMB_DIRPATH://th_. The pathof this image is computed as follows: File_path = uDir + /image2/ +substr(S1,2,3) + / + substr(S1,6,7) +/th_ + S1, Here, uDir = /sdcard/Tencent/MicroMsg/uDir and substr(S, start,end) is used for returning a string at the beginning of the start index and running at the end of the index. For the audio files it can be fetched by calculating the Md5 value of the encoding string which is stored in the image path and for the video files it can be get directly in the video folder and .mp4 format is used for storage of the video files (Dai et al., 2017). Different methods are analyzed for retrieving the audio, video and the messages and it has been found that are are different forensic tools available that can be used for retrieval of the messages successfully with the timestamp. A data table can be created for analyzing the chat history and proceeding with the forensic analysis. Moments The moments in the WeChat are used by the users for sharing their life events and achieves with the friends and the contacts in the WeChat list. The user can share their moments with attaching multimedia files and the messages are stored in the database SnsMicroMsg.db (Shang, 2016). In the database two tables are created for storing the comments and the other information separately. The SnsInfo table is used for the Moment messages and it contains the text multimedia files such as images and videos and different links (Lien Cao,2014). The SnsComment table is used for including the sharing message and comments associated with the post in the database. The major focus on the data is given on the username, cretedTime and the content. The field username is used for identification of the owner of the message and content is used for recording the data of sharing message that is stored as a BLOB (binary large object). The data residing in the content field is used for storing multiple data segments following the TLD structure (Azfar, Choo, Liu, 2016). The first byte is used for identification of the type of the data content, the second byte is used for indication of the length of the data and the third part is used for storage of the data contents. The details of the format in the content field of the WeChat Moments can be analyzed using the BLOB data. The key elements used for the content field are depicted as msg Owner, msgResID, msgContent, msgImagePath2 and msgImagePath and they are stored in the TLD structure of the database (Zhou et al., 2015). The msgOwner contains the user who sents the text or message, msgResID contains the identity of the multimedia resources and it is 20 bytes in length, msgContent contains the text used in the moment message, msgImagePath2 contains the thumbnail or the path of the image and the msgImagePath2 is used for storing the image source URL of the image shared in the moments. For the extraction of the multimedia files from the We Chat server Moments are required to be explored and is required to be extracted from the cache memory of the device. Conversion of Audio File Format: The audio file format extension of the WeChat application is of .aud format which is modified format of the AMR and SILK-v3. These formats are standard audio file format. In order to encode and store audio file format, the earlier version of the application used AMR format. Therefore, through the usage of the FFmpeg package (it is a type of decoder that WeChat uses) through including #!AMR as the file header, the audio files (AMR and .aud format) is decoded and played. Gao and Zhang (2013) has used the approach of investing an android application through volatile and non-volatile memory data acquisition and analysis. The application that the author investigated is Whatsapp which is also a application like WeChat for the android devices. The application uses SQLite database for storing the audio files. However, the location of the data and storage differentiate on the basis of device usage. Wu et al. (2017) has failed to state which database WeChat particularly uses for storing the audio files. Though the author has included the database that WeChat currently uses in its most recent version which are EnMicroMsg.db, SnsMicroMsg.db ad many more. As opined by Gao and Zhang (2013), in the IPhone, the subfolders which are named as MD5 hash under the folder named Audio records the voice message. There is also a MesServerID folder that stores the name of the audio files such as the MD5 folder. This is the eminence free (RF) SILK wideband sound encoding design gave by Skype. Keeping in mind the end goal to unravel and play the voice message with basic mixed media players amid crime scene investigation, the encoding configuration of sound records must be changed over. A SILK_v3 sound document could be changed over to a PCM sound record utilizing the Opus voice coder11 with the testing rate set at 48 kHz. Since PCM sound is comparative toWAV sound, the PCM sound document can be decoded and played by regular sound players by including a WAV record header. The WeChat application on the IPhone device also uses the .aud format for the audio file extension. From the above discussion it has been clear that the use of the audio files in the WeChat on android device is used effectively and efficiently. The name tag stored in the MesServerID folder is used for better search of the files from the database. Conclusion: Through creating the above study, it has been understood that the digital forensic investigation is a critical and in-depth analysis of a digital application. An application that is installed in various mobile platforms such as windows, android and IPphoe, uses almost same kind of technology. However, the application may differ in internal functionalities due to the technicalities and features of the operating system. Forensic investigations can be done on the basis of the various factors such as memory, functions, features and many more. The internal functions of the applications of android vary due to the application efficiency mainly. There are still various factors that the author could have included into the article such as investigation through the storage factors. This thing can be done through two ways. The first way is to investigating through memory type and another is storage locations. The value that has been found through the study is that gathering data from various articles is an essential and valuable task. It is because, this allows to gather adequate amount of data and provides the opportunity to verify data gathered from the sources. References: Azfar, A., Choo, K. K. R., Liu, L. (2016, January). An android social app forensics adversary model. In System Sciences (HICSS), 2016 49th Hawaii International Conference on (pp. 5597-5606). IEEE. Chen, L., Wang, Y. Q. (2015). Forensic Analysis towards the user behavior of Sina microblog. Choi, J., Park, J., Kim, H. (2017, February). Forensic analysis of the backup database file in KakaoTalk messenger. In Big Data and Smart Computing (BigComp), 2017 IEEE International Conference on (pp. 156-161). IEEE. Chu, H. C., Wang, G. G., Deng, D. J. (2016). The social networking investigation of metadata of forensic artifacts of a typical WeChat session under Windows. Security and Communication Networks, 9(18), 5698-5709. Dai, Z., Chua, T. W., Balakrishnan, D. K., Thing, V. L. (2017). Chat-App Decryption Key Extraction Through Information Flow Analysis. Gao, F., Zhang, Y. (2013). Analysis of WeChat on iPhone. In2nd International Symposium on Computer, Communication, Control, and Automation (3CA)(pp. 278-281). Gao, F., Zhang, Y. (2013). Analysis of WeChat on iPhone. In2nd International Symposium on Computer, Communication, Control, and Automation (3CA)(pp. 278-281). Gao, F., Zhang, Y. (2013, December). Analysis of WeChat on iPhone. In 2nd International Symposium on Computer, Communication, Control, and Automation (3CA) (pp. 278-281). Lee, C., Chung, M. (2015). Digital Forensic Analysis on Window8 Style UI Instant Messenger Applications. In Computer Science and its Applications (pp. 1037-1042). Springer, Berlin, Heidelberg. Lien, C. H., Cao, Y. (2014). Examining WeChat users motivations, trust, attitudes, and positive word-of-mouth: Evidence from China. Computers in Human Behavior, 41, 104-111. Shang, W. (2016). Construction and Application of WeChat Learning Platform in" Folk Literature" Teaching. International Journal of Emerging Technologies in Learning, 11(5). Sun, W., Qin, X. (2014, October). End-to-end delay analysis of wechat video call service in live dc-hspa+ network. In Wireless Communications and Signal Processing (WCSP), 2014 Sixth International Conference on (pp. 1-5). IEEE. Wu, S., Zhang, Y., Wang, X., Xiong, X., Du, L. (2017). Forensic analysis of WeChat on Android smartphones.Digital Investigation,21, 3-10. Wu, S., Zhang, Y., Wang, X., Xiong, X., Du, L. (2017). Forensic analysis of WeChat on Android smartphones. Digital Investigation, 21, 3-10. Yanni, Y., Junren, M. (2016). The Survey and Analysis about the Construction of Mobile Micro-Service of Academic Library. Library Work and Study, 11, 014. Yuming, Z., Junren, M., Kai, G. (2015). An Analysis of Application and Current Situation of We Chat about the Project 211 University Libraries. Research on Library Science, 15, 004. Zhang, L., Yu, F., Ji, Q. (2016, July). The Forensic Analysis of WeChat Message. In Instrumentation Measurement, Computer, Communication and Control (IMCCC), 2016 Sixth International Conference on (pp. 500-503). IEEE. Zhang, M. (2016). A rhetorical analysis of Chinese WeChat messages among midlife adults. China Media Research, 12(3), 7-17. Zhou, F., Yang, Y., Ding, Z., Sun, G. (2015, June). Dump and analysis of android volatile memory on wechat. In Communications (ICC), 2015 IEEE International Conference on (pp. 7151-7156). IEEE.