1857 reviews

Computer Science Essays

The essays below were written by students to help you with your own studies. If you are looking for help with your essay then we offer a comprehensive writing service, provided by fully qualified academics in your field of study.

Essay Writing Service

Example Computer Science Essays (Page 12)

Ebook Security With Adobe Adapt DRM
Example essay. Last modified: 22nd Jun 2018
Introduction: Abstract EBooks can be secured in various ways dependant on device or format. The report focuses on the encryption method used by Adobe in their Adept DRM used to secure EPUB and PDF formats. The re...

Circuit Switching Versus Packet Switching
Example essay. Last modified: 21st Jun 2018
Introduction: Nurhazimah Binti Mohd Za’ba Nursyafikah Binti Farakkasi  Nursyahirah Binti Mohd Sanusi  Nur Hidayu Binti Salleh Nur Syafiqah Binti Zulkiflee Nurul Ain Binti Mohd Nassir Adabi ABSTRACT The purpo...

Algorithm for Robot Navigation Without Collisions
Example essay. Last modified: 19th Apr 2018
Introduction: ALGORITHM FOR ROBOT NAVIGATION AT ENVIRONMENT WITHOUT COLLISION   ALGORITHM REPRESENTATION FOR NAVIGATION OF MOBILE ROBOT WITHOUT OBSTACLE COLLISON Mobile robot It is a kind of robot that has the ab...

A Review on the Role of Expert System in Nephrology
Example essay. Last modified: 19th Apr 2018
Introduction: Mr. Sagar S. Mali, Dr. R. V. Kulkarni Abstract Expert system refers to ability of the machine to collect data, performing operations on that data, and provide the correct and accurate results. The ...

Analysis of Cloud Storage In Robotic Environment
Example essay. Last modified: 19th Apr 2018
Introduction: Cloud Computing: Analysis of Cloud Storage In Robotic Environment Tushar Gupta Sunil Yadav   Abstract— Cloud is a well-designed data storage model concerned with the storage of information on th...

Image Quality Assessment Techniques Using Gabor Filters
Example essay. Last modified: 19th Apr 2018
Introduction: A SURVEY ON IMAGE QUALITY ASSESSMENT TECHNIQUES USING GABOR FILTERS Deepa Maria Thomas, S. John Livingson   (DEEPA MARIA THOMAS, ROOM NO 303, DMR RESIDENCE, KARUNYA LADIES HOSTEL, KARUNYA UNIVERSI...

Power Line Communication: a Green Computing
Example essay. Last modified: 19th Apr 2018
Introduction: Varsha Mohite Tejas Kandgaonkar ABSTRACT After evolution of wireless technology, classical Public Switched Telephone Network (PSTN) suffered through the drastic change. As a result of it, approxima...

Dentitic Cell and Immune Networks Algorithm Comparison
Example essay. Last modified: 19th Apr 2018
Introduction: A Comparative study of Dentitic cell and immune networks algorithm for Artificial immune networks. Jaspreet kaur, Kamal Kumar   Abstract – Artificial immune systems are the systems used for adva...

Cactus Stack Approach with Dijkstra’s Algorithm
Example essay. Last modified: 19th Apr 2018
Introduction: Advance Dijkstra’s Algorithm with Cactus Stack Implementation Logic Idea Proposed for the Cactus Stack Approach with Dijkstra’s Algorithm Palak Kalani Nayyar Khan   Abstract— This paper illu...

Intelligent Public Transport System Design
Example essay. Last modified: 19th Apr 2018
Introduction: An Intelligent Public Transport System for Smart City Gurnoor Walia, Kuljit Kaur   Abstract — Road safety has changed into a main subject for governments and automobile manufacturers in the ...

Concepts in Differential Privacy
Example essay. Last modified: 19th Apr 2018
Introduction: Abstract Stored data in search log is insecure process to the search engine. Search log contains extremely sensitive data, as evidenced by the AOL incident. To Store information in the search log is ...

Privacy-handling Techniques and Algorithms for Data Mining
Example essay. Last modified: 18th Apr 2018
Introduction: VIVEK UNIYAL ABSTRACT Data mining can extract a previously unknown patterns from vast collection of data. Nowadays networking, hardware and software technology are rapidly growing outstanding in co...

HDFC Bank: Securing Online Banking
Example essay. Last modified: 18th Apr 2018
Introduction: James Rapp Managing Information Security in Information Systems   Summary The importance of banking online has grown enormously in the past decade. Making for more profit and better convenience it...

Enhanced Frame-based Video Coding
Example essay. Last modified: 18th Apr 2018
Introduction: Abstract- This paper displays the improved edge based feature coding plan. The info source feature to the improved edge based feature encoder comprises of a rectangular-size feature and states of sub...

Architecture for Secure IPv4/IPv6 Address Translation
Example essay. Last modified: 18th Apr 2018
Introduction: An Integrated Architecture for Secure IPv4/IPv6 Address Translation between IPv4 and IPv6 Networks Amutha J, Meenakshi Sundaram R, Albert Rabara S3   Abstract. An All-IP network is probably gettin...

Improving the Performance of Overbooking
Example essay. Last modified: 18th Apr 2018
Introduction: Improving the Performance of Overbooking by Application Collocate Using Affinity Function ABSTRACT: One of the main features provided by clouds is elasticity, which allows users to dynamically adjust...

Study of Document Layout Analysis Algorithms
Example essay. Last modified: 18th Apr 2018
Introduction: Relative Study of Document Layout Analysis Algorithms for Printed Document Images Divya Kamat, Divya Sharma, Parag Chitale, Prateek Dasgupta   ABSTRACT In the following survey paper, the different...

An Architecture for Source Code Protection
Example essay. Last modified: 18th Apr 2018
Introduction: Abstract—Due to great competition in software industry the source code and binaries have to be protected. Source code available in plain form could be easily stolen and launched on any computer usi...

Distance Measurement Using RSSI Method in WSN
Example essay. Last modified: 18th Apr 2018
Introduction: Distance Measurement Using RSSI Method in Wireless Sensor Networks Akhand Pratp Singh, Devesh Pratap Singh, Santosh Kumar   Abstract. RSSI method gives distance measurement between beacon nodes an...

Higher Quality Input Phrase To Driven Reverse Dictionary
Example essay. Last modified: 18th Apr 2018
Introduction: Implementing a Higher Quality Input Phrase To Driven Reverse Dictionary E.Kamalanathan and C.Sunitha Ram ABSTRACT Implementing a higher quality input phrase to driven reverse wordbook. In contrast...

Improving the Efficiency of Semantic Based Search
Example essay. Last modified: 18th Apr 2018
Introduction: An Effective Approach to Improve the Efficiency of Semantic Based Search Merlin Ann Roy   ABSTRACT: The incredible progress in the size of data and with the great growth of amount of web pages, ou...

Conditional Statement Strategies for Code Obfuscation
Example essay. Last modified: 18th Apr 2018
Introduction: Chandan Kumar Behera, Pawan Kumar, D. Lalitha Bhaskari   Abstract Obfuscated code syntax has been set intentionally unclear. Different obfuscation techniques may have different impacts on the sour...

Security Metrics Maturity Model for Operational Security
Example essay. Last modified: 18th Apr 2018
Introduction: CHAPTER ONE: Introduction In this chapter, the key concepts and definitions by well known security authorities on security metrics is introduced and discussed. Then the issues and motivation that bri...

Understanding Linear Cryptanalysis
Example essay. Last modified: 18th Apr 2018
Introduction: Dipanjan Bhowmik Abstract The objective of this paper is to provide a better understanding of the Linear Cryptanalysis Attack developed by M.Matsui [2]. This paper has been written after going throug...

Big Data as an e-Health Service
Example essay. Last modified: 18th Apr 2018
Introduction: Abstract: Bigdata in healthcare relates to electronic health records, patients reported outcomes all other data sets.It is not possible to maintain large and complex data with traditional database to...

Get Academic Help Today!

Encrypted with a 256-bit secure payment provider