Example Computer Science Essays (Page 12)
Ebook Security With Adobe Adapt DRM
Example essay. Last modified: 22nd Jun 2018
Introduction:
Abstract
EBooks can be secured in various ways dependant on device or format. The report focuses on the encryption method used by Adobe in their Adept DRM used to secure EPUB and PDF formats.
The re...
Circuit Switching Versus Packet Switching
Example essay. Last modified: 21st Jun 2018
Introduction:
Nurhazimah Binti Mohd Za’ba
Nursyafikah Binti Farakkasi
Nursyahirah Binti Mohd Sanusi
Nur Hidayu Binti Salleh
Nur Syafiqah Binti Zulkiflee
Nurul Ain Binti Mohd Nassir Adabi
ABSTRACT
The purpo...
Algorithm for Robot Navigation Without Collisions
Example essay. Last modified: 19th Apr 2018
Introduction:
ALGORITHM FOR ROBOT NAVIGATION AT ENVIRONMENT WITHOUT COLLISION
ALGORITHM REPRESENTATION FOR NAVIGATION OF MOBILE ROBOT WITHOUT OBSTACLE COLLISON
Mobile robot It is a kind of robot that has the ab...
A Review on the Role of Expert System in Nephrology
Example essay. Last modified: 19th Apr 2018
Introduction:
Mr. Sagar S. Mali, Dr. R. V. Kulkarni
Abstract
Expert system refers to ability of the machine to collect data, performing operations on that data, and provide the correct and accurate results. The ...
Analysis of Cloud Storage In Robotic Environment
Example essay. Last modified: 19th Apr 2018
Introduction:
Cloud Computing: Analysis of Cloud Storage In Robotic Environment
Tushar Gupta
Sunil Yadav
Abstract— Cloud is a well-designed data storage model concerned with the storage of information on th...
Image Quality Assessment Techniques Using Gabor Filters
Example essay. Last modified: 19th Apr 2018
Introduction:
A SURVEY ON IMAGE QUALITY ASSESSMENT TECHNIQUES USING GABOR FILTERS
Deepa Maria Thomas, S. John Livingson
(DEEPA MARIA THOMAS, ROOM NO 303, DMR RESIDENCE, KARUNYA LADIES HOSTEL, KARUNYA UNIVERSI...
Power Line Communication: a Green Computing
Example essay. Last modified: 19th Apr 2018
Introduction:
Varsha Mohite Tejas Kandgaonkar
ABSTRACT
After evolution of wireless technology, classical Public Switched Telephone Network (PSTN) suffered through the drastic change. As a result of it, approxima...
Dentitic Cell and Immune Networks Algorithm Comparison
Example essay. Last modified: 19th Apr 2018
Introduction:
A Comparative study of Dentitic cell and immune networks algorithm for Artificial immune networks.
Jaspreet kaur, Kamal Kumar
Abstract – Artificial immune systems are the systems used for adva...
Cactus Stack Approach with Dijkstra’s Algorithm
Example essay. Last modified: 19th Apr 2018
Introduction:
Advance Dijkstra’s Algorithm with Cactus Stack Implementation Logic
Idea Proposed for the Cactus Stack Approach with Dijkstra’s Algorithm
Palak Kalani
Nayyar Khan
Abstract— This paper illu...
Intelligent Public Transport System Design
Example essay. Last modified: 19th Apr 2018
Introduction:
An Intelligent Public Transport System for Smart City
Gurnoor Walia, Kuljit Kaur
Abstract — Road safety has changed into a main subject for governments and automobile manufacturers in the ...
Concepts in Differential Privacy
Example essay. Last modified: 19th Apr 2018
Introduction:
Abstract
Stored data in search log is insecure process to the search engine. Search log contains extremely sensitive data, as evidenced by the AOL incident. To Store information in the search log is ...
Privacy-handling Techniques and Algorithms for Data Mining
Example essay. Last modified: 18th Apr 2018
Introduction:
VIVEK UNIYAL
ABSTRACT
Data mining can extract a previously unknown patterns from vast collection of data. Nowadays networking, hardware and software technology are rapidly growing outstanding in co...
HDFC Bank: Securing Online Banking
Example essay. Last modified: 18th Apr 2018
Introduction:
James Rapp
Managing Information Security in Information Systems
Summary
The importance of banking online has grown enormously in the past decade. Making for more profit and better convenience it...
Enhanced Frame-based Video Coding
Example essay. Last modified: 18th Apr 2018
Introduction:
Abstract-
This paper displays the improved edge based feature coding plan. The info source feature to the improved edge based feature encoder comprises of a rectangular-size feature and states of sub...
Architecture for Secure IPv4/IPv6 Address Translation
Example essay. Last modified: 18th Apr 2018
Introduction:
An Integrated Architecture for Secure IPv4/IPv6 Address Translation between IPv4 and IPv6 Networks
Amutha J, Meenakshi Sundaram R, Albert Rabara S3
Abstract. An All-IP network is probably gettin...
Improving the Performance of Overbooking
Example essay. Last modified: 18th Apr 2018
Introduction:
Improving the Performance of Overbooking by Application Collocate Using Affinity Function
ABSTRACT: One of the main features provided by clouds is elasticity, which allows users to dynamically adjust...
Study of Document Layout Analysis Algorithms
Example essay. Last modified: 18th Apr 2018
Introduction:
Relative Study of Document Layout Analysis Algorithms for Printed Document Images
Divya Kamat, Divya Sharma, Parag Chitale, Prateek Dasgupta
ABSTRACT
In the following survey paper, the different...
An Architecture for Source Code Protection
Example essay. Last modified: 18th Apr 2018
Introduction:
Abstract—Due to great competition in software industry the source code and binaries have to be protected. Source code available in plain form could be easily stolen and launched on any computer usi...
Distance Measurement Using RSSI Method in WSN
Example essay. Last modified: 18th Apr 2018
Introduction:
Distance Measurement Using RSSI Method in Wireless Sensor Networks
Akhand Pratp Singh, Devesh Pratap Singh, Santosh Kumar
Abstract. RSSI method gives distance measurement between beacon nodes an...
Higher Quality Input Phrase To Driven Reverse Dictionary
Example essay. Last modified: 18th Apr 2018
Introduction:
Implementing a Higher Quality Input Phrase To Driven Reverse Dictionary
E.Kamalanathan and C.Sunitha Ram
ABSTRACT
Implementing a higher quality input phrase to driven reverse wordbook. In contrast...
Improving the Efficiency of Semantic Based Search
Example essay. Last modified: 18th Apr 2018
Introduction:
An Effective Approach to Improve the Efficiency of Semantic Based Search
Merlin Ann Roy
ABSTRACT: The incredible progress in the size of data and with the great growth of amount of web pages, ou...
Conditional Statement Strategies for Code Obfuscation
Example essay. Last modified: 18th Apr 2018
Introduction:
Chandan Kumar Behera, Pawan Kumar, D. Lalitha Bhaskari
Abstract
Obfuscated code syntax has been set intentionally unclear. Different obfuscation techniques may have different impacts on the sour...
Security Metrics Maturity Model for Operational Security
Example essay. Last modified: 18th Apr 2018
Introduction:
CHAPTER ONE: Introduction
In this chapter, the key concepts and definitions by well known security authorities on security metrics is introduced and discussed. Then the issues and motivation that bri...
Understanding Linear Cryptanalysis
Example essay. Last modified: 18th Apr 2018
Introduction:
Dipanjan Bhowmik
Abstract
The objective of this paper is to provide a better understanding of the Linear Cryptanalysis Attack developed by M.Matsui [2]. This paper has been written after going throug...
Big Data as an e-Health Service
Example essay. Last modified: 18th Apr 2018
Introduction:
Abstract:
Bigdata in healthcare relates to electronic health records, patients reported outcomes all other data sets.It is not possible to maintain large and complex data with traditional database to...
Our Essay Services
At UKEssays.ae we provide a range of essay writing services to help you with your studies: