Example Computer Science Essays (Page 17)
Solution of a System of Linear Equations for INTELx64
Example essay. Last modified: 29th Mar 2018
Introduction:
A multi core hyper-threaded solution of a system of linear equations for INTELx64 architecture
Richa Singhal
ABSTRACT. A system of linear equations forms a very fundamental principal of linear alge...
Computer Vision In Bad Weather.
Example essay. Last modified: 29th Mar 2018
Introduction:
Saswati Rakshit
Aim:
To take advantage of bad weather in estimation of depth of a scene from its image. As in bad weather atmosphere modulates original information of an image to the observer s...
Clone Detection in Object Oriented Systems
Example essay. Last modified: 29th Mar 2018
Introduction:
Program Slicing based Clone Detection in Object Oriented Systems
Ishu Singla
Rajesh Bhatia
Abstract— Program slicing is an efficient technique for understanding programs by simplifying them. I...
Macro Management Scheme in NEMO Environment
Example essay. Last modified: 29th Mar 2018
Introduction:
An enhanced Macro Management Scheme in NEMO Environment to Achieve Seamless Handoff
Qoutibah AlAssi
1. Abstract
In NEMO(NETWORK MOBILITY) and when they are connected to the Internet through mobi...
Overview of Cryptographic Techniques
Example essay. Last modified: 29th Mar 2018
Introduction:
Gunasekaran, Priya Dharshini
Cryptographic Techniques
The backbone of many organization is the electronic communications. Most of the information are communicated online. Hence the important infor...
Steps in System Design
Example essay. Last modified: 27th Mar 2018
Introduction:
CHAPTER 3
HIGH LEVEL DESIGN
3.0 High Level Design
The high level design discusses an overview of how a system be supposed to work and how the higher stage sections to contains the suggested answer. I...
The Blocking of Viber in Saudi Arabia
Example essay. Last modified: 27th Mar 2018
Introduction:
Mansour Alaithan
Ali alakalifa
INTRODUCTION
What’s Viber ?
Viber is a app for instant messaging also for Voice over IP (VoIP) for smart phones owned by Viber Media. Not only voice messag...
Evaluation of Code Smells Detection Using Meta-heuristics
Example essay. Last modified: 27th Mar 2018
Introduction:
Evaluation of code smells detection using Meta-heuristics Optimization algorithm
Ragulraja.M
Abstract-The development of software systems over many years leads to needless complexity and inflex...
Database Migration and Architecture: Bee Colony Optimization
Example essay. Last modified: 27th Mar 2018
Introduction:
Abstract: It is compulsory for two servers to be compatible if you have to either import or export the data. All the servers have unique protocol service through which they communicate. It is not pos...
Obfuscated Data Storage For Cloud Environment
Example essay. Last modified: 27th Mar 2018
Introduction:
Ravi Pandey, and Kamlesh Chandra Purohit
Abstract. Data storage service is one of the most attractive services provided by the cloud service provider. Despite the benefits of cloud computing thr...
Input and Output Devices in Computer
Example essay. Last modified: 27th Mar 2018
Introduction:
Name: THENG WEI JUN
Question 1
A computer receives incoming data, processes them and produces an output. Hence, in a typical computer, there is
An input device i.e, a key board
A Central Proces...
Friend Recommendation System Software Design
Example essay. Last modified: 27th Mar 2018
Introduction:
CHAPTER 4
SOFTWARE DESIGN DESCRIPTION
4.1 INTRODUCTION
The Software Design Document provides transcript which will be used to aid in the software development phase of this project by providing the d...
Android-based English Grammar Checker with Voice Recognition
Example essay. Last modified: 27th Mar 2018
Introduction:
ABSTRACT
In this paper, the Researchers describe an Android-based Voice Recognition system that acts as a grammar checker specifically geared to the needs of non-native speakers who are willing to le...
Current Computing Research on Long Term Data Storage
Example essay. Last modified: 27th Mar 2018
Introduction:
Samuel Kahura Wachira
Evaluation of Current Computing Research on Long Term Data Storage
Abstract
The increasing number of digitized documents and the content explosion that has been experienced...
Website Quality Evaluation Based on Sitemap
Example essay. Last modified: 27th Mar 2018
Introduction:
M.Chandran A.V.Ramani
Abstract
Website quality evaluation can be made based on creating site map for the WebPages for a single website which works properly. A website is taken for the analysis w...
System Requirements for Electric System for Car Rental
Example essay. Last modified: 26th Mar 2018
Introduction:
1. Introduction
XYZ is a car rental company located in Saudi Arabia, and has branches in all major cities. XYZ main business line is to provide rental service of small civilian cars for individu...
Ontology Development Through Concept Maps Using Text Indices
Example essay. Last modified: 26th Mar 2018
Introduction:
Abstract- Ontology acts as a platform for knowledge sharing and description to represent a particular domain in the form of customized web information gathering. While developing those onto...
Design of Automated Biomass Gasifier
Example essay. Last modified: 26th Mar 2018
Introduction:
ABSTRACT:
Biomass gasifiers have found a promising place in renewable energy resource field. Even then, these gasifiers are facing lots of practical difficulties on operational effectiveness due to s...
Evolution of Storage Media Technology Within the Data Centre
Example essay. Last modified: 26th Mar 2018
Introduction:
AN INVESTIGATION INTO THE EVOLUTION OF STORAGE MEDIA TECHNOLOGY WITHIN THE DATA CENTRE TO SUPPORT THE I/O REQUIREMENTS OF MODERN APPLICATIONS.
Chandan Chandapura Ramesh (x14111306)
Abstract
Technolo...
Developing a Brain Computer Interface
Example essay. Last modified: 26th Mar 2018
Introduction:
A
Seminar Report On
“Brain Computer Interface”
Submitted by:
Name: Sachin Kumar Roll No: 1214310301
ABSTRACT
Brain Computer Interface allows users to communicate with each others by using only ...
Securing MANET From Routing Attacks
Example essay. Last modified: 26th Mar 2018
Introduction:
CHAPTER 3
RESEARCH METHODOLOGY
3.1 RESEARCH PROBLEM
The increasing demand and utilization of wireless technology is making the need for more secure wireless networks. From the security viewpoint MANE...
Zero-Day Vulnerability Attack
Example essay. Last modified: 26th Mar 2018
Introduction:
As Forensics Expert discuss the process involve in investigating Zero-Day Vulnerability attack
Introduction
The Internet became essential in this 21st generation and people can’t live without Inter...
Analysis of Data Leakage Prevention Solution
Example essay. Last modified: 26th Mar 2018
Introduction:
Anuja Vasant Kale, Vishwajeet Bajpayee, Shyam P Dubey
ABSTRACT: In any organization or institution we have to deal with lots of data. Those data may contain confidential information about the cust...
Efficient Prediction System Using Artificial Neural Networks
Example essay. Last modified: 26th Mar 2018
Introduction:
Jay Patel
Abstract- Predicting is making claims about something that will happen, often based on information from past and from current state. Neural networks can be used for prediction with var...
Cryptography: Types, Methods and Uses
Example essay. Last modified: 26th Mar 2018
Introduction:
CHAPTER-1
INTRODUCTION
1.1 Introduction to Cryptography
Cryptography is art of writing and reading the secret information. It is used to send the information between the various participants. It can...
Our Essay Services
At UKEssays.ae we provide a range of essay writing services to help you with your studies: