1856 reviews

Computer Science Essays

The essays below were written by students to help you with your own studies. If you are looking for help with your essay then we offer a comprehensive writing service, provided by fully qualified academics in your field of study.

Essay Writing Service

Example Computer Science Essays (Page 11)

Methods for Routing Improvement in WSNs
Example essay. Last modified: 26th Jul 2018
Introduction: As was concluded on the first chapter of the work, one of the best routing protocols, which is less energy-intensive and in the same time have other good conditions, like mobility, multipath usabilit...

Passive Optical Networks (PON)
Example essay. Last modified: 26th Jul 2018
Introduction: With the popularity of broadband services of the terminal users the demands for bandwidth in the access network is rapidly increasing. Rapid increase of global data traffic and massive deployment of ...

Decentralized Approach for Achieving Seamlessness
Example essay. Last modified: 26th Jul 2018
Introduction: CONCLUSION AND FUTURE WORK Thesis Outcome The major outcome of this research effort is to analyse the feasibility and benefits of achieving seamlessness with the proposed decentralized approach augme...

Implementation of User-Pairing Algorithm for OFDMA
Example essay. Last modified: 24th Jul 2018
Introduction:   Table of Contents (Jump to) Introduction Literature Survey Problem Formulation References CHAPTER 1: INTRODUCTION Introduction Orthogonal frequency division multiple access (OFDMA) is an encour...

Ultra Wideband (UWB) Innovation
Example essay. Last modified: 18th Jul 2018
Introduction: Dynamic UWB is another fascinating innovation for remote correspondences. It can supplant generally bearer based radio transmission by heartbeat based transmission utilizing ultra wide band recurrenc...

Modification of Power Series Expansion
Example essay. Last modified: 18th Jul 2018
Introduction: The available methods to compute the logarithm of a number using digital circuits can be divided in two main groups. On the one hand, we have the look-up table based algorithms and, on the other, ite...

Evolution of Substrate Integrated Waveguide (SIW)
Example essay. Last modified: 17th Jul 2018
Introduction: ­­EVOLUTION OF SUBSTRATE INTEGRATED WAVEGUIDE STRUCTURES: AN OVERVIEW , and   Abstract — Substrate integrated waveguide(SIW) is the most captivating technology for easy integration onto planar...

Software Architecture Design Approach
Example essay. Last modified: 22nd Jun 2018
Introduction: Rizwan Umaid Ali 1 Generate and Test as a Software Architecture Design Approach 1.1 About the Writer Len Bass from the Software Engineering Institute, CMU. Published in European Conference on Softw...

Content-Based Video Retrieval Method
Example essay. Last modified: 22nd Jun 2018
Introduction: An Approach for Analyzing keyframes based on Self Adaptive Threshold and Scene Descriptors Suruthi.K, Tamil Selvan.T, Velu.S, Maheswaran.R, Kumaresan.A Abstract In this paper, we propose a CBVR (co...

Application Performance Optimization and Load Balancing
Example essay. Last modified: 22nd Jun 2018
Introduction: Application Performance Optimization and Load Balancing using RAID and Caching Techniques Akilesh Kailash Sunil Iyer Kolar Suresh Kumar Sabarish Venkatraman   ABSTRACT As the data processing and d...

Variable Length Hash Algorithm Using RC6
Example essay. Last modified: 22nd Jun 2018
Introduction: Hash_RC6 – Variable Length Hash Algorithm using RC6 Kirti Aggarwal Dr. Harsh K. Verma   ABSTRACT In this paper, we present a hash algorithm using RC6 that can generate hash value of variable...

Open Source Software: Advantages and Methods
Example essay. Last modified: 22nd Jun 2018
Introduction: Background Open source software is treated as the software which is freely accessed by anyone. The source code of the software is publically accessible by anyone so that anyone can use it in his own ...

Face Image Retrieval With Attribute Based Search
Example essay. Last modified: 22nd Jun 2018
Introduction: Implementation is the process of converting a new system design into operation. Implementation is the stage of turning the theoretical design into a working system. Therefore it is considered as most...

Inverse Matrix Condition Number
Example essay. Last modified: 22nd Jun 2018
Introduction: Inverse Matrix and Condition No. Saswati Rakshit Contents (Jump to) Aim Scope/Applications Introduction/Basics Objective System Flow Mathematics Figure/Descriptions Future Works References Aim: Con...

Factor Language Model Programming
Example essay. Last modified: 22nd Jun 2018
Introduction: Language Model Language model helps a speech recognizer figure out how likely a word sequence is, independent of acoustics. There is a linguistic and statistical approach to calculate the probability...

Face Recognition Using PCA Algorithm
Example essay. Last modified: 22nd Jun 2018
Introduction: Bollini Lokesh, Abhishek Nallamothu, Mr.S.Planiappan   ABSTRACT Day by day technology is changing and way of securing and automation is also trending. Facial recognition (or face recognition) is ...

Content Based Image Retrieval System Project
Example essay. Last modified: 22nd Jun 2018
Introduction: An Efficient Content-based Image Retrieval System Integrating Wavelet-based Image Sub-blocks with Dominant Colors and Texture Analysis ABSTRACT Multimedia information retrieval is a part of computer ...

Cancer Prediction Using Data Mining
Example essay. Last modified: 22nd Jun 2018
Introduction: Cancer Disease Prediction from Horoscope of a Person Using Data Mining D. JAGADEESWARAN Abstract This paper deals with finding out the possibilities of affliction a person from cancer disease i.e. ...

Tracks Covering in Penetration Testing
Example essay. Last modified: 22nd Jun 2018
Introduction: Er. Ramesh Narwal Er. Gaurav Gupta   Abstract After completing attack, covering tracks is the next step in penetration testing. In tracks covering after completing attack we will return to each ex...

User Level Rootkit: Computer Security Systems
Example essay. Last modified: 22nd Jun 2018
Introduction: Hamid Tarmazdi Sohaib Irshad   1 Introduction Let us have a look at the definition of the word. The word has two components, root and kit. Root is usually a UNIX/Linux term that is used for admini...

Comparative Analysis of Rank Techniques
Example essay. Last modified: 22nd Jun 2018
Introduction: Abstract There is paramount web data available in the form of web pages on the World Wide Web (WWW). So whenever a user makes a query, a lot of search results having different web links corresponding...

Development of Interactive Science Learning Material
Example essay. Last modified: 22nd Jun 2018
Introduction: Firoz Hasan   Project Objective Tab-Based Interactive Science Laboratory for school’s Students. The objective of this project is to use create an interactive science laboratory on the tab for th...

Algorithm to Prevent Obstacle Collision
Example essay. Last modified: 22nd Jun 2018
Introduction: Description: In this paper, we develop an algorithm to prevent collision with obstacles autonomous mobile robot based on visual observation of obstacles. The input to the algorithm is fed a sequence ...

ACM ICPC Regional Problem
Example essay. Last modified: 22nd Jun 2018
Introduction: Siti Nazihah Binti Sarpin (L) Nurul Aini Binti Mohd Hisan Table of Contents (Jump to) Introduction Problem Description Problem Statistics Problem Details ACM ICPC Regional Problem Reaso...

Data Anonymization in Cloud Computing
Example essay. Last modified: 22nd Jun 2018
Introduction: Data Anonymization Approach For Privacy Preserving In Cloud Saranya M   Abstract—Private data such as electronic health records and banking transactions must be shared within the cloud ...

Get Academic Help Today!

Encrypted with a 256-bit secure payment provider