1856 reviews

Computer Science Essays

The essays below were written by students to help you with your own studies. If you are looking for help with your essay then we offer a comprehensive writing service, provided by fully qualified academics in your field of study.

Essay Writing Service

Example Computer Science Essays (Page 2)

Advantages and Disadvantages of Optimisation Techniques
Example essay. Last modified: 26th Aug 2021
Introduction: Client side security is one of the most important topics in internet security. All the information which has been downloaded from servers is stored on the client’s machine. All the site preferences as well as your login details are stored as cookies on the local machine and we need to keep those files safe from hackers....

The Different Types of Bluetooth Hacking
Example essay. Last modified: 24th Aug 2021
Introduction: Given that the Bluetooth has been used for a long time, there exist several flaws in the system. These flaws have been subject to different types of attacks over time, which makes the technology very vulnerable to hacking....

Comparison of Triple DES and RC4
Example essay. Last modified: 20th Aug 2021
Introduction: Triple DES, aka “3DES” is a cryptography method based on the Data Encryption Standard (DES). DES is a block cipher designed to encrypt and decrypt data blocks that contain 64 bits by utilizing a 64-bit key. ...

Comparison of Land Line & Mobile Phones
Example essay. Last modified: 18th Aug 2021
Introduction: Cell phone has become a part of our daily life. Let it be business deals, any personal work or meetings everything today can be done with the help of mobile phone....

Replica Synchronization in Distributed File System
Example essay. Last modified: 9th Aug 2021
Introduction: In this paper, we propose an algorithm to improve the I/O performance of the distributed file systems. The technique is used to reduce the communication bandwidth and increase the performance in the distributed file system....

Principal Component Analysis for Numerals
Example essay. Last modified: 6th Aug 2021
Introduction: In this paper we have proposed principal component analysis (PCA) for feature extraction and used Probabilistic Neural Network (PNN) based model for classification and recognition of off-line handwritten numerals of telugu script...

Overview of Ethernet Technology
Example essay. Last modified: 5th Aug 2021
Introduction: In this research, we shall discuss interface options for Ethernet and the optical transport network (OTN) beyond 100G. 100G Ethernet technologies give carriers the flexibility to phase in the implementation of these higher-speed rates to better align capacity increases with their specific growth and budget strategies...

Detecting of Ransomware using Software Defined Networking
Example essay. Last modified: 5th Aug 2021
Introduction: Ransomware is a major weapon for cyber-extortion. The traditional signature-based detection no longer holds good against modern, sophisticated malware that employs encryption techniques and social engineering....

Safety requirements, process, and design of building a PC
Example essay. Last modified: 2nd Aug 2021
Introduction: The purpose of this manual is to assist an entry level technician in the safety requirements, process, and design of building a PC. Initially this first section will cover workspace preparation and installation of components such as the motherboard, power supply, CPU and RAM....

Dual Trapezoidal Fuzzy Number and Its Applications
Example essay. Last modified: 29th Jul 2021
Introduction: In this paper, we introduce Convergence of α-Cut. We define at which point the α-Cut converges to the fuzzy numbers it will be illustrated by example using dual trapezoidal fuzzy number and Some elementary applications on mensuration are numerically illustrated with approximated values....

Review of Intercultural Communication and Computer-Assisted Language Learning
Example essay. Last modified: 29th Jul 2021
Introduction: This literature review was conducted to synthesize and uncover evolving topics associated with intercultural communication and Computer-Assisted Language Learning (CALL)....

Web Services for Information Systems Interoperability
Example essay. Last modified: 28th Jul 2021
Introduction: The simplicity of Web services ensures the universal acceptance of this solution as a way of communicating between applications....

Time-Sensitive Networking for Real-Time Ethernet Communication
Example essay. Last modified: 28th Jul 2021
Introduction: This paper introduces the Time Sensitive Networking (TSN) and explains how TSN provides deterministic communication for Ethernet networks....

Automated Catalogue Mechanism for Integrating Products
Example essay. Last modified: 28th Jul 2021
Introduction: In this paper we discuss an automated catalogue mechanism for integrating products from various providers....

Traffic Pattern Discovery in Mobile Ad hoc Networks
Example essay. Last modified: 28th Jul 2021
Introduction: The objective of this paper is to show that passive attackers can perform traffic analysis without the knowledge of the adversaries. ...

Posture Recognition Based Fall Detection System
Example essay. Last modified: 28th Jul 2021
Introduction: In this paper, we designed an application with the ability of automatic fall detection, by using the mobile sensors, warning signal by pressing a button in cases of emergency, detection and automatic notification to supervisors as well as visual display to passers-by....

P2 Cycle in WDM Networks
Example essay. Last modified: 28th Jul 2021
Introduction: In this paper new p cycle protection is done in mesh based protection networks....

A Multi OBS: Framework for Cloud Brokerage Services
Example essay. Last modified: 28th Jul 2021
Introduction: This paper proposed an idea of introducing a Multi Objective Optimization technique in selecting a best provider for the cloud consumers....

Pattern Mining for Information Retrieval from Large Databases
Example essay. Last modified: 28th Jul 2021
Introduction: To find the knowledge effectively without the problem of low frequency and misinterpretation a pattern based approach (Pattern classification method) is discovered in this paper....

Data Processing in Big Data Centres Cost Reduction Approach
Example essay. Last modified: 28th Jul 2021
Introduction: This paper considers the cost reduction problem involved with the cloud data processing in the data centers by the joint optimization of data positioning, task allocation and routing....

Compensation techniques for 50 Gbps Duobinary System
Example essay. Last modified: 28th Jul 2021
Introduction: In this paper, the performance of duobinary system is analysed by using different dispersion compensation techniques....

Security Measures for Wearable Devices
Example essay. Last modified: 27th Jul 2021
Introduction: I have been researching the security measures that have been set in place for wearable devices such as fit-bits, apple watches, etc. My research investigates what types of attacks can be performed through these devices, what the companies are doing to protect users against threats, and how we can protect ourselves and our privacy....

Security Issues of Social Networking Sites
Example essay. Last modified: 27th Jul 2021
Introduction: This paper focuses on the impacts of these social networking sites. Social Networking Sites are a platform to build social relationship or social networks among people. It is web-based service which allows people to create public profiles; it is similar to online community. The only difference is social network service is individual centred whereas online community is group centred....

Risk-based Access Control Model for the Internet of Things
Example essay. Last modified: 27th Jul 2021
Introduction: this paper proposes a risk-based access control model for IoT technology that takes into account real-time data information request for IoT devices and gives dynamic feedback. The proposed model uses IoT environment features to estimate the security risk associated with each access request using user context, resource sensitivity, action severity and risk history as inputs for security risk estimation algorithm that is responsible for access decision. ...

Classifications and Functions of Operating Systems (OS)
Example essay. Last modified: 26th Jul 2021
Introduction: First operating system was developed by IBM with a young man named Bill Gates, this could run on different computers from different manufacturers, it was called DOS (Disk Operating System), but differences between the parties did not set off a pitch....

Get Academic Help Today!

Encrypted with a 256-bit secure payment provider