Example Computer Science Essays (Page 14)
Improving Effectiveness and Efficiency of Sentiment Analysis
Example essay. Last modified: 9th Apr 2018
Introduction:
Modha Jalaj S.
Chapter – 1
1. Introduction:
Big Data has been created lot of buzz in Information Technology word. Big Data contain large amount of data from various sources like Social Media, News ...
GDI Security Policy Document
Example essay. Last modified: 9th Apr 2018
Introduction:
1.0 Introduction
This security policy document offers a sufficient summary of the state of security concerns with the herein mention corporation and no alteration of the information contained here...
How to Write a Research Dissertation/Thesis
Example essay. Last modified: 9th Apr 2018
Introduction:
How Research is to be written and presented
Research writing
Research writing is a major factor of success for any student, scholar or anyone interested in the pursuit of knowledge as a research pape...
Survey on Spatial Database Systems
Example essay. Last modified: 9th Apr 2018
Introduction:
ï›ï€ ï
Abstract—In this survey, the term of “spatial database”, its data models, its data types with implementations, and its management techniques are described with providing a...
Reducing Communication and Processing Overhead
Example essay. Last modified: 9th Apr 2018
Introduction:
RACE: Reducing Communication And Processing Overhead And Ensuring Security
Milu Sayed
Liyamol Aliyar
Abstract—
RACE, Report based payment scheme for multi-hop wireless network. Race is a secur...
OpenMP Based Fast Data Searching with Multithreading
Example essay. Last modified: 9th Apr 2018
Introduction:
V.Karthikeyan, Dr. S.Ravi and S.Flora Magdalene
Abstract
The multiprocessor cores with multithreaded capability are continuing to gain a significant share and offer high performance. The use of O...
Email Protocol: SMTP, POP, and MIME
Example essay. Last modified: 5th Apr 2018
Introduction:
Email protocol governs the interactions between email clients and servers. An Email protocol is a standard method which is used at each end of a communication channel either server side or client sid...
Analysis of Tools for Data Cleaning and Quality Management
Example essay. Last modified: 5th Apr 2018
Introduction:
Data cleaning is needed in process of combining heterogeneous data sources with relation or tables in databases. Data cleaning or data cleansing or data scrubbing is defined as removing and detecting...
System to Filter Unwanted Messages from OSN User Walls
Example essay. Last modified: 5th Apr 2018
Introduction:
M.Renuga Devi, G.Seetha lakshmi, M.Sarmila
Abstract—One fundamental issue in today’s Online Social Networks (OSNs) is to give users the ability to control the messages posted on their own priva...
Acoustic Cryptanalysis of RSA and Its Counter Measure
Example essay. Last modified: 5th Apr 2018
Introduction:
Prof. J P Agrawal Saurabh Sharma Siddharth Gupta
ABSTRACT
Acoustics has come up as a new vulnerability in the field of information security. The RSA encryption algorithm, although h very hard to br...
Smart Prepaid Energy Meter Using GSM Module
Example essay. Last modified: 5th Apr 2018
Introduction:
KISHORE KUMAR K
GAYATHRI N
RAJESH KUMAR V T
Abstract
This paper aims at proposing a system that reduces the power loss and power theft due to illegal activities. This frame...
Techniques for Understanding Human Walking Motion
Example essay. Last modified: 5th Apr 2018
Introduction:
Introduction
Multimedia is a term that collectively describes a variety of media content available in various forms of text, speech, audio, still images, video, animation, graphics, 3D models and ...
Vulnerability Assessment and Penetration Testing Comparison
Example essay. Last modified: 5th Apr 2018
Introduction:
Jignesh C Doshi
Bhushan Trivedi
ABSTRACT
Business using internet has grown drastically in past decade. Attacks on web application have increased. Web application security is a big challenge for any ...
Smartphone Operating Systems: Evaluation & Enhancements
Example essay. Last modified: 5th Apr 2018
Introduction:
Muneer Ahmad Dar
Javed Parvez
Abstract—The increasing number of mobile operating systems that operates the small hand held devices called the Smartphone, has become integral part of our lives. Th...
Concepts and Research into Green Networking
Example essay. Last modified: 5th Apr 2018
Introduction:
Green Networking
Abstract:
Saving of excessive energy consumption is becoming a key concern in networking, because of theprobable economical benefits. These concerns, usually argued to as “green ne...
Load Balancing as an Optimization Problem: GSO Solution
Example essay. Last modified: 5th Apr 2018
Introduction:
METHODOLOGY
INTRODUCTION
In this chapter, we presented a novel methodology which considers load balancing as an optimization problem. A stochastic approach, Glowworm swarm optimization (GSO) is em...
Automatic Metadata Harvesting From Digital Content
Example essay. Last modified: 5th Apr 2018
Introduction:
MR. RUSHABH D. DOSHI, MR. GIRISH H MULCHANDANI
Abstract: Metadata Extraction is one of the predominant research fields in information retrieval. Metadata is used to references information resource...
Proficient Key Tree Structure for Secure Dynamic Groups
Example essay. Last modified: 5th Apr 2018
Introduction:
Secure Group Communication ensures forward secrecy and backward secrecy of the data. It is the responsibility of the Group Center (GC) to disallow new members to have access to previous data called b...
Information Security Management Plan
Example essay. Last modified: 5th Apr 2018
Introduction:
Cyber security is about protecting your computer-based equipment and information from unintended or unauthorised access, change, theft or destruction HM Governement (2015), you can manage the risks b...
Stages of Alzheimer's Utilizing Machine Learning Techniques
Example essay. Last modified: 5th Apr 2018
Introduction:
Abstract:
Alzheimer’s disease (AD) is the general type of dementia that affects the elderly population globally. An accurate and early diagnosis of Alzheimer is crucial for the treatment of patient...
Mutation Testing by Using Formal Method
Example essay. Last modified: 4th Apr 2018
Introduction:
Jaspreet Singh
Abstract
Mutation testing was introduced in 1970’s in the field of software testing as a process of testing the test suites by intentionally seeding errors i.e. mutation operators,...
Heterogeneous Wireless Sensor Networks (HWSN) Management
Example essay. Last modified: 4th Apr 2018
Introduction:
A Key Management & Establishment Scheme in Heterogeneous Wireless Sensor Networks (HWSN)
Premamayudu B, Venkata rao K, and Suresh Varma P
Abstract: Key management is the one of the fundamen...
Skew Detection of Devanagari Script Using Pixels
Example essay. Last modified: 4th Apr 2018
Introduction:
Skew Detection of Devanagari Script Using Pixels of Axes-Parallel Rectangle and Linear Regression
Trupti A. Jundale
Ravindra S. Hegadi
Abstract—Skew detection and correction of handwritten dat...
Efficient Database Driven Reverse Mapping Dictionary
Example essay. Last modified: 4th Apr 2018
Introduction:
Building an Efficient Database Driven Reverse Mapping Dictionary
ABSTRACT
With the enormous availability of words in usage it is always being a challenge to find the meaning. Even the versatile speak...
Asynchronous JavaScript and XML (AJAX)
Example essay. Last modified: 4th Apr 2018
Introduction:
Anjan Thapaliya
Abstract
AJAX stands for Asynchronous JavaScript and XML. It is a web technology that evolved in early 2000 and uses a mix of technology like JavaScript and XML. This paper discusse...
Our Essay Services
At UKEssays.ae we provide a range of essay writing services to help you with your studies: