Computer Science Essays
The essays below were written by students to help you with your own studies. If you are looking for help with your essay then we offer a comprehensive writing service, provided by fully qualified academics in your field of study.
Computer Science Essays & Related Services
Simulation of Fog Computing for Internet of Things (IoT) Networking
Example essay. Published: 23 September 2019
Simulation of Fog Computing for Internet of Things (IoT) Networking ABSTRACT: Regardless of the expanding utilization of cloud computing, there are still issues unsolved becaus…
Prevention of Cross Site Scripting Attacks
Example essay. Published: 23 September 2019
CROSS – SITE SCRIPTING (XSS) Abstract Millions of people use many web applications every day, it has made our life better and easier. From social networking to online sho…
Design Principals of Gamification
Example essay. Published: 23 September 2019
PHILOSOPHY OF RESEARCH Abstract: Gamification is a term used to describe the concept of non-game type tasks being altered, making for a more amusing and engaging experience for…
Simulation of Extrusion Replacement with Wire+arc Based Additive Manufacturing
Example essay. Published: 23 September 2019
A LITERATURE REVIEW ON Simulation of extrusion replacement with wire+arc based additive manufacturing. Table of Contents 1. INTRODUCTI…
CFD Simulations of a Fluidized Bed Crystallizer
Example essay. Published: 23 September 2019
The CFD Simulations of a Fluidized Bed Crystallizer Abstract Fluidized-bed crystallizer(FBC) is a kind of widely-used reactors across many industry branches, which has been use…
Nanopore Sequencing: Structure, Principles and Applications
Example essay. Published: 23 September 2019
Nanopore Sequencing The underlying force behind the rapid advancements in genomics is due to the development of novel genome sequencing. It is said notably that the invention of second …
Infrastructure of Cloud Networks
Example essay. Published: 23 September 2019
Cloud Networks ABSTRACT Networking Technology is evolving at fast pace from simple internet connections to present day ubiquitous computing. Today, networks have developed t…
Parallel Data Sorting and Deduplication in Distributed File Systems
Example essay. Published: 23 September 2019
PARALLEL DATA SORTING AND DEDUPLICATION IN DISTRIBUTED FILE SYSTEMS TABLE OF CONTENTS SL. NO. TITLE …
Measuring the Concentration of Ozone in Solution, with Time
Example essay. Published: 23 September 2019
Table Contents Abstract 1.0 Aims and objectives of the experiment 2.1 Theoretical and experimental basis: 2.2 Experimental Procedure…
Hand Tracking Piano App for Windows
Example essay. Published: 23 September 2019
Contents 1 Introduction……………………………………………………1 1.1&#x…
Reconfigurable Hybrid Cache Hierarchy in 3D Chip-Multi Processors
Example essay. Published: 23 September 2019
Reconfigurable Hybrid Cache Hierarchy in 3D Chip-Multi Processors Based on a Convex Optimization Method Abstract—Chip-Multi Processor (CMP) design process has been con…
Improving the Software Development Process Using Testability Tactics
Example essay. Published: 23 September 2019
Improving the Software Development Process Using Testability Tactics Abstract: Need and building stable software application is becoming more and more important considering th…
Analysis of Stuxnet Computer Virus
Example essay. Published: 23 September 2019
Analysis of Stuxnet Computer Virus [Document subtitle] Table of Contents Executive Summary: 1. Introduction/Background: 2. St…
Reverse Engineering the Behaviour of NotPetya Ransomware
Example essay. Published: 23 September 2019
Reverse Engineering the Behaviour of NotPetya Ransomware warna Pujitha kolli 1 , Dr.K.V.D.Kiran 4 &#x…
Data Flow testing using Genetic Algorithms
Example essay. Published: 23 September 2019
Data Flow testing using Genetic Algorithms Abstract Testing a software plays a very key role in software development life cycle. There are two types of testi…
Research Report on Cryptographic Hash Functions
Example essay. Published: 23 September 2019
RESEARCH REPORT ON CRYPTOGRAPHIC HASH FUNCTIONS This report presents various cryptographic hash functio…
Case Study on Network Management Protocols
Example essay. Published: 23 September 2019
Table of Contents Introduction Task 1 Task 2 Task 3 Task 4 Bibliography Introduction AUT i…
A Systematic Study of Asset Management using Hybrid Cyber Security Maturity Model
Example essay. Published: 23 September 2019
A Systematic Study of Asset Management using Hybrid Cyber Security Maturity Model ABSTRACT There are persistent cyber security attacks which leads unauthorized access to int…
Monitoring and Analysing Anomaly Activities in a Network Using Packetbeat
Example essay. Published: 23 September 2019
Monitoring and Analysing anomaly activities in a network using Packetbeat Abstract: The primary intention of any organization is to provide security for their i…
Cybersecurity and the Black Market
Example essay. Published: 23 September 2019
Cybersecurity and the Black Market Abstract— The emergence of the dark web has led to a huge increase in malicious activities conducted on the Internet such as mone…
Tip: If you can’t find what you are looking for, try shortening your search phrase. E.g. “CSR”