1856 reviews

Computer Science Essays

The essays below were written by students to help you with your own studies. If you are looking for help with your essay then we offer a comprehensive writing service, provided by fully qualified academics in your field of study.

Essay Writing Service

Example Computer Science Essays (Page 7)

Challenges and Countermeasures in Authenticating User in Voice Biometrics
Example essay. Last modified: 8th Feb 2020
Introduction: Is That Your Voice? Abstract— Biometric authentication [1] is a security process thatreliesontheuniquebiologicaltraitsofanindividualtoverify the person. There are many biometric authe...

Spatial ¬Mapping for Microsoft’s HoloLens
Example essay. Last modified: 8th Feb 2020
Introduction: ABSTRACT Mixed reality (MR) is a growing technology that is expected to provide major advancements to the future of how people and businesses interact. Mixed reality is a division of vir...

Evaluation of MIMD Vs SIMD Architecture
Example essay. Last modified: 8th Feb 2020
Introduction: Abstract      In this paper, I will discuss the advantages and disadvantages of a SIMD and MIMD architecture. Single Instruction, Multiple Data (SIMD) and Multiple In...

Informatics Research Review: A Review of Neural Network Based Image Captioning
Example essay. Last modified: 8th Feb 2020
Introduction: Abstract This paper provides a survey of image captioning techniques, with a specific focus on encoder-decoder frameworks. We show promising directions of research, such as the use of se...

Training Simulation for Cyber Security Novice Analysts
Example essay. Last modified: 8th Feb 2020
Introduction: Training Simulation for Cyber Security Novice Analysts based on Cognitive Analysis of Cyber Security Experts Abstract In the world of digitization cyber security is becoming a great...

An Examination of the Continued Relevance of C++
Example essay. Last modified: 8th Feb 2020
Introduction: C++ is arguably among the most impactful creations in computer science history, with origins reaching back further than 1979, when development first began.  Despite the development of popula...

RSA SecurID Breach Overview and Prevention Strategies
Example essay. Last modified: 8th Feb 2020
Introduction: Summary of the Attack: This attack was on RSA Security, an American computer and network security operation under EMC Corp. The attacker’s target was acquiring data of RSA’s Secu...

Is True Artificial Intelligence Possible with Current Technology and Programming Methods?
Example essay. Last modified: 8th Feb 2020
Introduction: INTRODUCTION Why we do research Conducting research on a specific topic assists a researcher to gain knowledge over areas of value and interest, researches then have options to ...

Research Development: Automated Web Application Testing
Example essay. Last modified: 8th Feb 2020
Introduction: Abstract:  A software development process is incomplete without testing and that’s the reason why every organization spends considerable time and effort on testing. New verticals are comin...

Biometrics for Human Computer Interaction
Example essay. Last modified: 8th Feb 2020
Introduction: ABSTRACT This paper will cover how biometrics are being implemented into modern technology to improve Human Computer Interaction, as well as explore the history of biometrics. I...

Development of Antipattern Reference Model
Example essay. Last modified: 8th Feb 2020
Introduction: Abstract  In this modern word, pattern reliability is a huge challenge to the software engineering industry. Hence, antipattern becomes a determination as being the effective and ob...

Image Analysis and Classification Using Deep Learning
Example essay. Last modified: 8th Feb 2020
Introduction: Table of Contents Gradient-based Optimisation (Partial) Derivatives The Gradient Mini-batch Stochastic Gradient Descent (Mini-batch SGD) Backpropagati...

What a Digital Forensics Investigator should know about Steganalysis of Digital Content
Example essay. Last modified: 8th Feb 2020
Introduction: Table of Contents Introduction Background Aim, Objectives and Research questions Literature Review Digital Steganography What a digital foren...

Cryptocurrency Forecasting with Deep Learning Chaotic Neural Networks
Example essay. Last modified: 8th Feb 2020
Introduction:     Background  In 2008 Satoshi Nakamoto (whose real identity is still very much debated), answered a very challenging question which offers an...

A Comparison of CPU Scheduling
Example essay. Last modified: 8th Feb 2020
Introduction: Abstract:   A CPU is one primary of a computer resource and a process is a core part of CPU scheduling. It becomes significantly important to accomplish the operating desi...

Machine Learning Application using Pose Estimation to Detect and Moderate Violence in Live Videos
Example essay. Last modified: 8th Feb 2020
Introduction: Abstract Recordings of public violence have never been as readily available as today. Livefeeds of shootings and attacks have become an ever increasing problem with gruesome images o...

Analysis of Convolution Neural Network-Based Algorithm for Annotation Cost Estimation
Example essay. Last modified: 8th Feb 2020
Introduction: Analysis of Convolution Neural Network-Based Algorithm for Annotation Cost Estimation in the Field of Supervised Machine Learning Abstract Active learning is an important machin...

Review of OpenSSL Software Specifications
Example essay. Last modified: 8th Feb 2020
Introduction: Introduction This document specifies the evaluation of the specifications for OpenSSL. OpenSSL is a powerful commercial-level full-featured toolkit for Transport Layer Security (TLS) and...

Benchmarking 4x ARM Cortex-A7 CPU and
Example essay. Last modified: 8th Feb 2020
Introduction: Benchmarking 4x ARM Cortex-A7 CPU and 4x ARM Cortex-A53 for Multimedia Systems using JPEG Compression Introduction: Now a days more and more research has been carried out on the...

A Survey on the Variations of Plane Sweep Algorithms
Example essay. Last modified: 8th Feb 2020
Introduction: INTRODUCE Plane Sweeping is one of the most important approach to solve computational geometry problems. The common form of plane sweep is using a conceptual straight line or curve ...

Networking Standards (OSI Layers): Advantages and Disadvantages
Example essay. Last modified: 8th Feb 2020
Introduction: Introduction  Nowadays civilization can’t imagine its life without technology: any business won’t survive without an external storage and a proper software; any person won’t b...

Network Slicing in 5G Networks
Example essay. Last modified: 8th Feb 2020
Introduction: Abstract— In today’s the era of IoTs, large companies are producing both big and small new hand-held machines at an incredible rate. These new technologies offer great opportunities when con...

Security Challenges for Next Generation WiFi
Example essay. Last modified: 8th Feb 2020
Introduction: Abstract Wireless networks are ubiquitous in today’s world and are gaining popularity at a tremendous pace, as they provide greater flexibility, portability, and mobility than thei...

An Empirical Machine Learning Approach in Forecasting Customer Lifetime Value
Example essay. Last modified: 8th Feb 2020
Introduction: Abstract With the rapid advancement over the technical infrastructure and exponential growth of data, machine learning is widely accepted into many business especially in predictive anal...

Get Academic Help Today!

Encrypted with a 256-bit secure payment provider