Computer Science Essays
The essays below were written by students to help you with your own studies. If you are looking for help with your essay then we offer a comprehensive writing service, provided by fully qualified academics in your field of study.
Computer Science Essays & Related Services
Principles of Information Security
Example essay. Published: 18 August 2017
Purpose:In order to protect against accidental or intentional damage or loss of data, interruption of College business, or the compromise of confidential information we must classify data and establ…
Development of a Perception System for Indoor Environments
Example essay. Published: 18 August 2017
Autonomous navigation is a well-known task in robotic research. It is associated to get the environmental information such as visual images or distance or proximity measurements from external sensor…
Cyber Security Case Study: Pure Land Wastewater Treatment
Example essay. Published: 18 August 2017
Introduction Every organization should use the industrial control system to ensure the success of their departments and ensure the ultimate success of critical operations within the premise. Since s…
Packet-Hiding Method for Preventing Selective Jamming Attack
Example essay. Published: 18 August 2017
Abstract The open nature of the wireless medium leaves it vulnerable to intentional interference attacks, typically referred to as jamming. This intentional interference with wireless transmissions…
History and Impact of the Smart Phone
Example essay. Published: 18 August 2017
INTRODUCTION This report is regarding the smartphone which is used nowadays worldwide. In this modern world, almost every person is using a smartphone, even kids know how to use a smartphone. With t…
Smart Music Player Integrating Facial Emotion Recognition
Example essay. Published: 18 August 2017
Smart Music Player Integrating Facial Emotion Recognition and Music Mood Classification 1Shlok Gilda, 2Husain Zafar, 3Chintan Soni, 4Kshitija Waghurdekar Department of Computer Engineering, Pune Ins…
Passive Reconnaissance Website Analysis
Example essay. Published: 18 August 2017
Assignment: – Reconnaissance Paper Student Name: – Soumil Deshpande Executive Summary In this assignment, passive reconnaissance was performed on The Weather Channel’s website i….
Curvelet-based Bayesian Estimator for Speckle Suppression
Example essay. Published: 18 August 2017
Curvelet-based Bayesian Estimator for Speckle Suppression in Ultrasound Imaging Abstract. Ultrasound images are inherently affected by speckle noise, and thus the reduction of this noise is…
Bag of Visual Words Model
Example essay. Published: 18 August 2017
Abstract Automatic interpretation of Remote sensing images is a very important task in several practical fields. There are several approaches to accomplish this task, one of the most powerful and ef…
Capital Shape Alphabet Encoding Based Text Steganography
Example essay. Published: 18 August 2017
A Capital Shape Alphabet Encoding (CASE) Based Text Steganography Approach Abstract Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender…
Data Mining Analysis in the Telecommunications Industry
Example essay. Published: 18 August 2017
Abstract The broadcast communications industry was one of the first to receive information mining innovation. This is in all probability since media transmission organizations routinely produce what…
Evolution of Mobile Device Technology
Example essay. Published: 18 August 2017
Introduction Since the revolution of the smartphone in 2005 the development progress in this field grows rapidly. It became a part of our life and played a big role to change the attitude of our lif…
How Big Data is Used in Retail Industry: Etsy
Example essay. Published: 18 August 2017
Big Data can be defined as the inability of traditional data architectures to efficiently handle the new datasets. Characteristics of Big Data that force new architectures are: 1. Volume: Size of da…
Effect of Bring your own Device (BYOD) on Cybersecurity
Example essay. Published: 18 August 2017
Effect of Bring your own Device (BYOD) on Cybersecurity at workplace Introduction Several new trends in information access are impacting organizations’ ability to control and secure sensitive …
SQL to Firebase – A Metamorphosis
Example essay. Published: 18 August 2017
Abstract– Firebase is being extensively used in cross-platform apps for various functionalities, one of them being Realtime Databases. This paper highlights how an RDBMS based database such as…
Resolving Problems with a Local Area Network
Example essay. Published: 18 August 2017
Network user problems: Explain different problems that a user of a local area network may faces while accessing the network. Poor or bad cable issue: –Poor or bad cable issue is problem of…
Technology to Reduce Employee Stress
Example essay. Published: 18 August 2017
STRESS BREAKER METHODOLOGY AND SYSTEM ANALYSIS & DESIGN DOCUMENT INTRODUCTION Computers are extremely proficient devices in that they help us with accomplishing more work in less time yet tak…
Fading Light Experiment on Arduino Kit
Example essay. Published: 18 August 2017
Introduction Arduino is an open source prototyping platform enabling users to create interactive electronic objects. [1] Here, we performed “Fading Light” one of the basic activities on …
Computer Dynamics Network Proposal
Example essay. Published: 18 August 2017
Computer Dynamics is a company with 300 computers in three adjacent five-story building with 100 computers in each building. The LAN’s are similar in each building with a data center is locate…
RBG Colour Model Experiment
Example essay. Published: 18 August 2017
Introduction Color is a visual attribute of objects that results from the light they emit, transmit or reflect. [1] These colors give us the ability to appreciate things around us. With this, we can…
Tip: If you can’t find what you are looking for, try shortening your search phrase. E.g. “CSR”