Example Computer Science Essays (Page 6)
Deep Residual Learning for Image Recognition
Example essay. Last modified: 8th Feb 2020
Introduction:
Abstract
Deeper neural networks are harder to prepare. We present a residual learning structure to facilitate the preparation of networks that are significantly deeper t...
Vulnerability Impact of SQL Injection
Example essay. Last modified: 8th Feb 2020
Introduction:
SQL INJECTION
INTRODUCTION
Due to more advancements and use of languages like ASP.NET, Javascripts and many more, all data and content of site are being stored into the cl...
Strategies for Improving Failure Protection of 5G Networks
Example essay. Last modified: 8th Feb 2020
Introduction:
Abstract
This paper researches about reducing the complexity and improving the failure protection of 5G networks by using segment routing in IP infrastructure. Two Scenarios are simulate...
Planning, Development and Testing Internetwork Design
Example essay. Last modified: 8th Feb 2020
Introduction:
Table of Contents
Contents
Table of Contents
Aims of the Project
Problem Analysis
Requirements & Solutions
WAN requirements:
Gen...
Applications of BI Analytics and Data Mining
Example essay. Last modified: 8th Feb 2020
Introduction:
INTRODUCTION
The world of information and technology changes within a blink of eyes. There are no business organizations that are unaware of this rapid changing autonomous technology. Th...
Online Learning Algorithms in Varied Bandit Scenarios
Example essay. Last modified: 8th Feb 2020
Introduction:
1. ABSTRACT
In this paper, we present a discussion on the performance of non-stochastic/adversarial-setting algorithms in 2 special scenarios:
W...
Handover Problems and Solutions for 5G Communication Technology
Example essay. Last modified: 8th Feb 2020
Introduction:
Introduction
The continuously increasing demand of wireless communications impels the fast development of the next generation wireless communication technology. The 5G communication tec...
Computer Networks – OS Theory and Concepts
Example essay. Last modified: 8th Feb 2020
Introduction:
1.OS Abstraction and process management
(a) Hardware Abstraction Layer
Hardware Abstraction Layer (HAL) is a programming layer that allows operating systems (referred to as OS h...
Time-Series Data Mining of Minimum Design Height for River Bridge Deck Using Seasonal Trend Decomposition
Example essay. Last modified: 8th Feb 2020
Introduction:
Abstract. Using the traditional calculation of minimum design height (MDH) could not provide the effective decision support for engineers under complex situations. This research proposes a time-s...
Routing in Mobile Ad- Hoc Networks
Example essay. Last modified: 8th Feb 2020
Introduction:
Abstract -The purpose of this research is to describe what mobile ad-hoc networks do and when did they showed up, its effectiveness in technology, types of mobile ad-hoc network protocols ...
Lingo Learning Final Report
Example essay. Last modified: 8th Feb 2020
Introduction:
1.1 Abstract
Young bilingual children are supported in the early periods of their education by EAL teaching assistants...
An Empirical Machine Learning Approach in Forecasting Customer Lifetime Value
Example essay. Last modified: 8th Feb 2020
Introduction:
Abstract
With the rapid advancement over the technical infrastructure and exponential growth of data, machine learning is widely accepted into many business especially in predictive anal...
Security Challenges for Next Generation WiFi
Example essay. Last modified: 8th Feb 2020
Introduction:
Abstract
Wireless networks are ubiquitous in today’s world and are gaining popularity at a tremendous pace, as they provide greater flexibility, portability, and mobility than thei...
Network Slicing in 5G Networks
Example essay. Last modified: 8th Feb 2020
Introduction:
Abstract— In today’s the era of IoTs, large companies are producing both big and small new hand-held machines at an incredible rate. These new technologies offer great opportunities when con...
Networking Standards (OSI Layers): Advantages and Disadvantages
Example essay. Last modified: 8th Feb 2020
Introduction:
Introduction
Nowadays civilization can’t imagine its life without technology: any business won’t survive without an external storage and a proper software; any person won’t b...
A Survey on the Variations of Plane Sweep Algorithms
Example essay. Last modified: 8th Feb 2020
Introduction:
INTRODUCE
Plane Sweeping is one of the most important approach to solve computational geometry problems. The common form of plane sweep is using a conceptual straight line or curve ...
Benchmarking 4x ARM Cortex-A7 CPU and
Example essay. Last modified: 8th Feb 2020
Introduction:
Benchmarking 4x ARM Cortex-A7 CPU and
4x ARM Cortex-A53 for Multimedia Systems using JPEG Compression
Introduction: Now a days more and more research has been carried out on the...
Review of OpenSSL Software Specifications
Example essay. Last modified: 8th Feb 2020
Introduction:
Introduction
This document specifies the evaluation of the specifications for OpenSSL. OpenSSL is a powerful commercial-level full-featured toolkit for Transport Layer Security (TLS) and...
Analysis of Convolution Neural Network-Based Algorithm for Annotation Cost Estimation
Example essay. Last modified: 8th Feb 2020
Introduction:
Analysis of Convolution Neural Network-Based Algorithm for Annotation Cost Estimation in the Field of Supervised Machine Learning
Abstract
Active learning is an important machin...
Machine Learning Application using Pose Estimation to Detect and Moderate Violence in Live Videos
Example essay. Last modified: 8th Feb 2020
Introduction:
Abstract
Recordings of public violence have never been as readily available as today. Livefeeds of shootings and attacks have become an ever increasing problem with gruesome images o...
A Comparison of CPU Scheduling
Example essay. Last modified: 8th Feb 2020
Introduction:
Abstract:
A CPU is one primary of a computer resource and a process is a core part of CPU scheduling. It becomes significantly important to accomplish the operating desi...
Cryptocurrency Forecasting with Deep Learning Chaotic Neural Networks
Example essay. Last modified: 8th Feb 2020
Introduction:
Background
In 2008 Satoshi Nakamoto (whose real identity is still very much debated), answered a very challenging question which offers an...
Applying User-centred Design to Modern Software Products
Example essay. Last modified: 8th Feb 2020
Introduction:
Introduction
The following report evaluates “Applying user-centred design to modern software products” based on ISO 9241-210 standard. “ISO 9241-210 provides a set of requirements ...
Malware Attacks And Their Impacts
Example essay. Last modified: 8th Feb 2020
Introduction:
Abstract—With always evolving technologies many devices are emerging which has the ability to connect to other devices across the world using internet, it ...
WiFi Eavesdropping: Attack Overview and Challenegs
Example essay. Last modified: 8th Feb 2020
Introduction:
Wifi Eavesdropping
Abstract – Below report describes about Wi-Fi eavesdropping, then an explanation on how it works and then further tells about its latest and most famous ...
Our Essay Services
At UKEssays.ae we provide a range of essay writing services to help you with your studies: