Example Computer Science Essays (Page 15)
Emotion Recognition System for Affective Text
Example essay. Last modified: 4th Apr 2018
Introduction:
K.Thendral, Dr.S.Chitrakala, S.P.Surendernath
ABSTRACT:
Mining social emotions deals with a new aspect for categorizing the document based on the emotions such as happy, sad, sympathy, etc., the...
Literature Review of the Industrial Wireless
Example essay. Last modified: 4th Apr 2018
Introduction:
Industrial wireless infrastructure goes beyond a hand full of WSN in the field sending back information to a localised host system, the broader picture of a truly industrial wireless infrastructure e...
Optimization of Benchmark Functions using VTS-ABC Algorithm
Example essay. Last modified: 4th Apr 2018
Introduction:
Performance Optimization of Benchmark Functions using VTS-ABC Algorithm
Twinkle Gupta and Dharmender Kumar
Abstract– A new variant based on tournament selection called VTS-ABC algorithm is p...
Performance Analysis of Reusable Software Systems
Example essay. Last modified: 4th Apr 2018
Introduction:
Monika Kalotra
Dr. Kuljit Kaur
Abstract: To improve the quality of software system, there is a need to eliminate or reduce the rework. Software reuse is one of the solution proposed for it. Soft...
Ensuring All Stages Pipelining and Accuracy in PASQUAL
Example essay. Last modified: 4th Apr 2018
Introduction:
Nachiket D. More
Abstract
GENOME is term used for genetic material of organism. It is used to encode DNA of organisms, or RNA of various kinds of viruses. Ii contains both coding and non coding parts...
Comparative Study of 6T and 8T SRAM Using Tanner Tool
Example essay. Last modified: 4th Apr 2018
Introduction:
Rajnarayan Sharma, Ravi Antil, Jonish
Abstract— in this paper we focus on the dynamic power dissipation during the Write operation in CMOS SRAM cell. The charging and discharging of bit lines co...
Increasing Time Efficiency of Insertion Sort
Example essay. Last modified: 4th Apr 2018
Introduction:
Increasing Time Efficiency of Insertion Sort for the Worst Case Scenario
Surabhi Patel, Moirangthem Dennis Singh
Abstract. Insertion sort gives us a time complexity of O(n) for the best case. In...
Review on Video Steganography Technique
Example essay. Last modified: 4th Apr 2018
Introduction:
Kamred Udham Singh
Abstract
In the era of information security, Steganography is a most secure method, used for concealing existence of secret data in any digital cover object such as image, audio,...
GPU-Accelerated Impact Maximization in Professional Networks
Example essay. Last modified: 4th Apr 2018
Introduction:
GPU-Accelerated Impact Maximization in Large-Scale Professional Networks
Dr. M. Rajasekhara, Babu B. V. Arunragavan
Abstract
Impact Maximization means to discover the top-K fascinating people to e...
Analyzing of Economic Data Using Big Data
Example essay. Last modified: 4th Apr 2018
Introduction:
N.Rajanikumar, Dr.A.Suresh babu, Mr.G.Murali
Abstract: Big data can help at the e commerce data. The big-picture problems, the economic indicator many investors, business fortunate and judges ar...
Review on Micro-climate Changer with Sensor Broadcasted Data
Example essay. Last modified: 4th Apr 2018
Introduction:
Prof. Vikas Nandgaonkar, Prof.Prashant Dongare
Pratap Madane, Priyanka Rasal,Aniket Shilimkar, Vaibhav Waghmode
Abstract : micro-environment changer using sensor broadcasted data gives human centri...
Mobile Computing with WirelessLAN and its Modes
Example essay. Last modified: 4th Apr 2018
Introduction:
Mobile computing with WirelessLAN And its modes Ad hoc network with challenges
Pallavi D. Dudhe, Prof. P. L. Ramteke
Abstract – In this paper, we summarized Mobile computing with WirelessL...
Process of Embedding Fuzzy Logic Methodology In Racing Game
Example essay. Last modified: 4th Apr 2018
Introduction:
Alamin Hussain
Key words: fuzzy logic, XNA, AI, racing game
ABSTRACT
Fuzzy Logic has many opinions and understanding from people to people. In its simplest understanding Fuzzy Logic outputs truth(s...
Evolution of Server-side Technologies
Example essay. Last modified: 4th Apr 2018
Introduction:
Chris Avgerinos
Introduction
A fundamental change has been occurring for the last fifteen years in the way people write computer programs. Scripting languages such as Perl and Tcl replaced the syst...
Control on Remote Sensing Network Using Cloud Computing
Example essay. Last modified: 4th Apr 2018
Introduction:
CHAPTER 3
SYSTEM REQUIREMENTS
The system requirements usually specify the needs of the system to accomplish the project successfully and the requirements can be classified as software and hardware re...
Development of an Online Crime Management System (OCMS)
Example essay. Last modified: 4th Apr 2018
Introduction:
Case study of the Nigerian Police Force
OYEKUNLE OYEBOLA COMFORT
Abstract
The aim of this project and implementation is to develop interactive online crime management system which is easily acce...
Real Time Motion Detection Using Dynamic Camera
Example essay. Last modified: 4th Apr 2018
Introduction:
Abstract— nowadays, security of valuable and secret assets is very important for large organisation companies. Due to limitation of human resources and man power we need an efficient and reliable s...
Subscriber System using Identity-Based Encryption
Example essay. Last modified: 4th Apr 2018
Introduction:
Secure Message Transmission to the Publisher
Vivek Sharma
INTRODUCTION
The major mechanism regarding to the Publish-Subscribe based system are security, confidentiality, scalability and authenti...
Analysis Diabetes Mellitus on Complications with Data Mining
Example essay. Last modified: 4th Apr 2018
Introduction:
M. Mayilvaganan T.Sivaranjani
Abstract:
Diabetes mellitus is incredible growing and seems to be emerging as a main public health problem for our country.The prevalence of diabetes is rapidly incre...
Adopting MapReduce and Hummingbird for Information Retrieval
Example essay. Last modified: 3rd Apr 2018
Introduction:
Adopting MapReduce and Hummingbird for Information Retrieval in dedicated cloud Environment
Dr. Piyush Gupta
Chandelkar Kashinath K.
Abstract:
Data collected in section 3 indicated ...
Secure Encounter-based Mobile Social Networks
Example essay. Last modified: 3rd Apr 2018
Introduction:
ABSTRACT:
Encounter-based social networks and encounter-based systems link users who share a location at the same time, as opposed to the traditional social network paradigm of linking users who have...
Network Management System: Light Weight SNMP Implementation
Example essay. Last modified: 3rd Apr 2018
Introduction:
Chapter 6
Implementation
Initially the Java (JDK 1.6) and Netbeans IDE 5.4 should be installed in a system. Then the SNMP4J API should be added to the Netbeans library. The Mysql-JDBC sever sh...
A Review on Client Side Load Balancing
Example essay. Last modified: 3rd Apr 2018
Introduction:
Prof. Vikas Nandgaonkar, Prof.Prashant Dongare
Harshal Mahajan, Awadhoot Lele, Akshay Gaikwad
Abstract : Load balancing is an important issue while managing server resources in a cloud environment....
Secure Barcode Authentication using Genetic Algorithm
Example essay. Last modified: 3rd Apr 2018
Introduction:
Dr. Poornima G. Naik
Mr. Girish R. Naik
Abstract— Genetic Algorithm (GA) is an invaluable tool for solving optimization problems due to its robustness. It does not break even if the inputs are...
Review Paper on Fault Tolerance in Cloud Computing
Example essay. Last modified: 3rd Apr 2018
Introduction:
A REVIEW PAPER ON FAULT TOLERANCE IN CLOUD COMPUTING
Deepali Mittal
Ms. Neha Agarwal
Abstract— Cloud computing demand is increasing due to which it is important to provide correct services in ...
Our Essay Services
At UKEssays.ae we provide a range of essay writing services to help you with your studies: