Computer Science Essays
The essays below were written by students to help you with your own studies. If you are looking for help with your essay then we offer a comprehensive writing service, provided by fully qualified academics in your field of study.
Computer Science Essays & Related Services
Design of Automated Biomass Gasifier
Example essay. Published: 26 March 2018
ABSTRACT: Biomass gasifiers have found a promising place in renewable energy resource field. Even then, these gasifiers are facing lots of practical difficulties on operational effectiveness due to s…
Evolution of Storage Media Technology Within the Data Centre
Example essay. Published: 26 March 2018
AN INVESTIGATION INTO THE EVOLUTION OF STORAGE MEDIA TECHNOLOGY WITHIN THE DATA CENTRE TO SUPPORT THE I/O REQUIREMENTS OF MODERN APPLICATIONS. Chandan Chandapura Ramesh (x14111306) Abstract Technolo…
Developing a Brain Computer Interface
Example essay. Published: 26 March 2018
A Seminar Report On “Brain Computer Interface” Submitted by: Name: Sachin Kumar Roll No: 1214310301 ABSTRACT Brain Computer Interface allows users to communicate with each others by using only …
Securing MANET From Routing Attacks
Example essay. Published: 26 March 2018
CHAPTER 3 RESEARCH METHODOLOGY 3.1 RESEARCH PROBLEM The increasing demand and utilization of wireless technology is making the need for more secure wireless networks. From the security viewpoint MANE…
Zero-Day Vulnerability Attack
Example essay. Published: 26 March 2018
As Forensics Expert discuss the process involve in investigating Zero-Day Vulnerability attack Introduction The Internet became essential in this 21st generation and people can’t live without Inter…
Analysis of Data Leakage Prevention Solution
Example essay. Published: 26 March 2018
Anuja Vasant Kale, Vishwajeet Bajpayee, Shyam P Dubey ABSTRACT: In any organization or institution we have to deal with lots of data. Those data may contain confidential information about the cust…
Efficient Prediction System Using Artificial Neural Networks
Example essay. Published: 26 March 2018
Jay Patel Abstract- Predicting is making claims about something that will happen, often based on information from past and from current state. Neural networks can be used for prediction with var…
Cryptography: Types, Methods and Uses
Example essay. Published: 26 March 2018
CHAPTER-1 INTRODUCTION 1.1 Introduction to Cryptography Cryptography is art of writing and reading the secret information. It is used to send the information between the various participants. It can…
Static Code Analysis
Example essay. Published: 26 March 2018
Jim Kielt Table of Contents (Jump to) 1.0 Analysis 1.1 Cross-Site Scripting: 239 vulnerabilities detected. 1.2 File Manipulation: 9 vulnerabilities detected. 1.3 SQL Injection: 4 vulnerabilities dete…
Performance Analysis for AD-HEED and N-HEED
Example essay. Published: 26 March 2018
4.1 Results and Discussion In this section, we exhibit and discuss the results of the simulation. This section shows the performance analysis for AD-HEED and N-HEED compared to the original HEED prot…
Steganography: Uses, Methods, Tools and Examples
Example essay. Published: 26 March 2018
This paper talks about steganography, steganography is the art or hiding data within a medium without letting others to know about that data is existing. I will go through an introduction about it , then explaining the background of it and more information about the uses of this technique , and how organization use it in their own good….
Web2py Layout Features
Example essay. Published: 26 March 2018
CHAPTER 5. DEVELOPMENT In the Web2py framework there are two objects that contribute in designing both static and dynamic web pages. The SQLFORM.factory object is used for developing static web pag…
Approaches to Data Cleaning
Example essay. Published: 26 March 2018
Data Cleaning approaches: generally, data cleaning contains several steps Data Analysis: A detailed analysis is required to check what type of inconsistencies and errors are to be resolved. An analys…
Case Study of DFA and NFA Implementation
Example essay. Published: 26 March 2018
Muhammad Danial Waseem Hania Farooq Table of Contents (Jump to) Digital Social Media Popular Social Media Tools and Platforms Blogs Face book WhatsApp Viber Twitter YouTube Flickr Instagram LinkedI…
Raspberry Pi Foundation DDoS Attack
Example essay. Published: 26 March 2018
E Crime The perfect ‘E Crime’ – The Raspberry Pi Foundation Assessment: The perfect ‘E Crime’ – The Raspberry Pi Foundation Table of Contents 1 Introduction 1.1 Aim 1.2 Methodology …
Issues with Cameras and Privacy in Modern Day Technology
Example essay. Published: 26 March 2018
Scam Cams Nick Doran Introduction and Significance of Issue As a citizen, governmental laws have always played a major role in the way we conduct ourselves. Whether it’s when we vote or when we …
History and Development of Programming Languages
Example essay. Published: 26 March 2018
Yash Ojha Introduction Programming languages play the most important role in the creation of various Software’s. Application, and Webpages etc. Just because of the existence of programming lang…
DDS Based Communication Middleware
Example essay. Published: 26 March 2018
CHAPTER 1 INTRODUCTION “Data Distribution Service based communication middleware” to addresses the communication needs of distributed applications. Middleware placed between a software applicatio…
Energy Efficient Firefly Scheduling in Green Networking
Example essay. Published: 26 March 2018
An energy Efficient Firefly Scheduling in Green Networking with Packet Processing Engines S.S.Saranya S.Srinivasan Abstract-The investigation of force sparing system gadgets has been situated as…
Comparison of Database and File Storage
Example essay. Published: 26 March 2018
Author: Noronjon Qalandarov CONTENTS (Jump to) ACKNOWLEDGEMENTS SUMMARY 1. INTRODUCTION 2. AIMS AND METHODOLOGIES 3. LITERATURE REVIEW 3.1 Technologies and definitions 3.1.1 RDBMS 3.1.2 Native XML DB…
Tip: If you can’t find what you are looking for, try shortening your search phrase. E.g. “CSR”