1858 reviews

Computer Science Essays

The essays below were written by students to help you with your own studies. If you are looking for help with your essay then we offer a comprehensive writing service, provided by fully qualified academics in your field of study.

Essay Writing Service

Example Computer Science Essays (Page 4)

Introduction To Microsoft Excel Computer Science Essay
Example essay. Last modified: 1st Jan 2015
Introduction: INTRODUCTION MS-Excel is made of grid of rows and columns, which know as spreadsheet or electrician sheet or worksheet. In a Worksheet the intersection of row and column is called cell. In it columns...

Introduction To Microsoft Office Computer Science Essay
Example essay. Last modified: 1st Jan 2015
Introduction: PowerPoint uses a graphical approach to presentations in the form of slide shows that accompany the oral delivery of the topic. This program is widely used in business and classroomsand is an eff...

Introduction To Microsoft Word Computer Science Essay
Example essay. Last modified: 1st Jan 2015
Introduction: Microsoft Word is a non-free commercial word processor designed by Microsoft. It was first released in 1983 under the name Multi-Tool Word for Xenix systems. Subsequent versions were later written for...

Introduction to MS Excel
Example essay. Last modified: 6th Jul 2017
Introduction: Microsoft Word is a powerful word-processing program that will take your documents far beyond what you can produce with a typewriter. Whether you want to create a simple letter to a friend, produce a ...

Introduction To Operating System Security In Chromium Os Computer Science Essay
Example essay. Last modified: 1st Jan 2015
Introduction: Operating system is the field in computer science which sees major changes as it has to keep up with the user demands and the advancements in technology. Cloud computing is one such aspect which chang...

Introduction To Rubber Tree Computer Science Essay
Example essay. Last modified: 1st Jan 2015
Introduction: Rubber tree is a tree that is used by the world community to collect the product. The product from rubber trees not only wood but also sap. However, the main product is rubber latex itself. Rubber tre...

Introduction Why Use OPNET Modeler Computer Science Essay
Example essay. Last modified: 1st Jan 2015
Introduction: OPNET Modeler is a very good tool for network designing and simulation. OPNET Modeler was selected because most of the wired and wireless network components are available in the OPNET 15.0 Modeler. In...

Intrusion Detection System Case Study
Example essay. Last modified: 18th Aug 2017
Introduction: Abstract Intrusion Detection system (IDS) has become powerful to provide security against the attack. It will help us to identify the deterring and deflecting malicious attacks over the network [1]....

Inverse Matrix Condition Number
Example essay. Last modified: 22nd Jun 2018
Introduction: Inverse Matrix and Condition No. Saswati Rakshit Contents (Jump to) Aim Scope/Applications Introduction/Basics Objective System Flow Mathematics Figure/Descriptions Future Works References Aim: Con...

IoT Traffic Prediction Using Multi-step Ahead Prediction with Neural Network
Example essay. Last modified: 18th May 2020
Introduction: IoT traffic prediction using multi-step ahead prediction with neural network Abstract-The Internet of Things (IoT) is basically a network of interconnected devices, like sensors and sma...

Ipad Is The Best Tablet Computer Science Essay
Example essay. Last modified: 1st Jan 2015
Introduction: IPad a computer that is a type of a tablet, and it was developed by the Apple Company. Apple designed and marketed the IPad especially for the media which include books, periodicals, movies, music, an...

Ipv4 Internet Protocol Security Features Computer Science Essay
Example essay. Last modified: 1st Jan 2015
Introduction: There are many articles about IP v 4 and IP v 6 internet protocol and mostly of articles describes IPv6 more secure internet protocol, but I came across with one article from Cisco and my work I’...

Is True Artificial Intelligence Possible with Current Technology and Programming Methods?
Example essay. Last modified: 8th Feb 2020
Introduction: INTRODUCTION Why we do research Conducting research on a specific topic assists a researcher to gain knowledge over areas of value and interest, researches then have options to ...

ISO 27001 Standard Summary
Example essay. Last modified: 18th Aug 2017
Introduction: A blueprint of ISO 27001 There are no less than two forms of ISO/IEC 27001. The 2005 form and the 2013 adaptation. Both renditions are very comparative with some minor contrasts, in light of changin...

Issues with Cameras and Privacy in Modern Day Technology
Example essay. Last modified: 26th Mar 2018
Introduction: Scam Cams Nick Doran   Introduction and Significance of Issue As a citizen, governmental laws have always played a major role in the way we conduct ourselves. Whether it’s when we vote or when we ...

Java Multithreaded Genetic Algorithm In Solving Computer Science Essay
Example essay. Last modified: 1st Jan 2015
Introduction: Time table problem is a kind of scheduling problems with many variations. It defines a class of hard-to-solve constrained optimization problems of combinatorial nature (Bhaduri, 2009, p.289). Constrai...

K Means Clustering With Decision Tree Computer Science Essay
Example essay. Last modified: 1st Jan 2015
Introduction: The K-means clustering data mining algorithm is commonly used to find the clusters due to its simplicity of implementation and fast execution. After applying the K-means clustering algorithm on a data...

Kafka V/s RabbitMQ Queuing Systems
Example essay. Last modified: 10th Aug 2017
Introduction: Queuing systems are asynchronous in nature which are built to transfer the data from producer to consumer (mainly known as PUB-SUB model). This whole architecture is known as Message Oriented Middle...

Land As Defined By Ollennu Computer Science Essay
Example essay. Last modified: 1st Jan 2015
Introduction: It includes things on the soil which are enjoyed with it as being part of the land by nature, as for example rivers, streams,…growing trees or affixed to it like houses, buildings and other stru...

Leaky Bucket Algorithm to Control Transmission Rates
Example essay. Last modified: 7th Jun 2021
Introduction: In this paper, the Leaky Bucket Algorithm is used to control transmission rate in a system. It tends to be used to monitor data transmissions and packets(data) to define limits on bandwidth....

Legion; commercial pedestrian simulation
Example essay. Last modified: 1st Jan 2015
Introduction: Chapter 4. Multi-Threaded and Distributed Framework for Pedestrian Simulation Analysis Legion is the company behind the commercial pedestrian simulation software, Legion Studio and its accompanying 3D...

Library Management System
Example essay. Last modified: 1st Jan 2015
Introduction: Development and connection to multiple online /www database using jsp Introduction: There are many web based application running with only single database. It has some problems such as performance iss...

Lifecycle and Problems of Ransomware Attacks
Example essay. Last modified: 23rd Sep 2019
Introduction: INTRODUCTION The internet is a very powerful and amazing tool for communication that is very important in our everyday lives. The fact that it is used in all spheres of our daily lives ...

Lightspeed: An Adaptive Bilateral Negotiation Strategy
Example essay. Last modified: 23rd Sep 2019
Introduction: Lightspeed: An Adaptive Bilateral Negotiation Strategy   ABSTRACT Automated negotiation deals with multiple autonomous agents, where the agents adapt their be...

Limitations And Advantages Of A Directional Antenna
Example essay. Last modified: 18th May 2017
Introduction: Abstract – A discussion of directional antennas and performance, the limitations or drawbacks and advantages of using directional antennas compare to omnidirectional antennas. INTRODUCTION The d...

Lingo Learning Final Report
Example essay. Last modified: 8th Feb 2020
Introduction: 1.1             Abstract Young bilingual children are supported in the early periods of their education by EAL teaching assistants...

Lip Reading Using Neural Networks Computer Science Essay
Example essay. Last modified: 1st Jan 2015
Introduction: Neural networks, with their remarkable ability to derive meaning from complicated or imprecise data, can be used to extract patterns and detect trends that are too complex to be noticed by either huma...

Literature Review About Cryptography And Steganography Computer Science Essay
Example essay. Last modified: 1st Jan 2015
Introduction: The initial forms of data hiding can truly be considered to be extremely simple forms of private key cryptography, the “key” in this case being the information of the scheme being implemen...

Literature review about data warehouse
Example essay. Last modified: 23rd Mar 2021
Introduction: A literature review about data warehouse, OLAP MDDB and data mining concept. We reviewed concept, characteristics, design and implementation approach of each above mentioned technology to identify a suitable data warehouse framework....

Literature Review About IPS And IDS Computer Science Essay
Example essay. Last modified: 1st Jan 2015
Introduction: In this chapter is to provide the study and review about Intrusion Detection System and Intrusion Prevention System which have done by expert and professor. According to (Tony Bradley, 2004), intrusio...

Literature Review About Meter Reading Techniques Computer Science Essay
Example essay. Last modified: 1st Jan 2015
Introduction: In this chapter we will explore more about how meter reading is done, the different type of techniques that exist to read meters, and automatic meter reading; specially the use of Bluetooth technology...

Literature Review About Types Of Operating System Computer Science Essay
Example essay. Last modified: 1st Jan 2015
Introduction: The Windows 98 is the upgrade from Windows 95 and is Graphical operating system is designed for the workstations at home or business. When during the development Windows 98 was code named as “Me...

Literature Review Of Load Shedding Methods
Example essay. Last modified: 2nd May 2017
Introduction: In chapter 1, a brief discussion about active distribution networks was presented. The importance of operation of islanded distribution networks was discussed. This chapter is intended to give the rea...

Literature Review of the Industrial Wireless
Example essay. Last modified: 4th Apr 2018
Introduction: Industrial wireless infrastructure goes beyond a hand full of WSN in the field sending back information to a localised host system, the broader picture of a truly industrial wireless infrastructure e...

Literature Review on Big Data Concept
Example essay. Last modified: 7th Aug 2017
Introduction: Quiz-3: Summarize the article in one paragraph. In this paragraph author try to explain about the big data concept and data mining like the characteristics of the big data, demonstrate and example...

Literature Review on Online Gaming
Example essay. Last modified: 27th Sep 2017
Introduction: The purpose of this study is to map out and see the relationship between MMORPG game player personalities and style based on player type theory and game players’ thinking preferences in order to in...

Literature Review On Point Of Sales System
Example essay. Last modified: 1st Jan 2015
Introduction: Switch is a brand name wholly owned by CG Computers Sdn Bhd. CG Computers Sdn Bhd was founded on 1995 by Mr. Li Chau Ging. The main business of the company is selling Apple Products under the brand na...

Literature Review on the Capabilities of the GSM based Control System
Example essay. Last modified: 3rd Nov 2020
Introduction: Using GSM networks, a control system has been proposed that will act as an embedded system which can monitor and control appliances and other devices locally using built-in input and output peripherals...

Literature Review On The Research On Games Computer Science Essay
Example essay. Last modified: 1st Jan 2015
Introduction: This section discusses the literature review on the research on games. The main research in this chapter includes the definition of games, game genres, description of word game and adventure game, for...

Literature Review On Web Usage Mining Computer Science Essay
Example essay. Last modified: 1st Jan 2015
Introduction: The Internet has become the largest database ever existed. During the early times of this decade it has been estimated that the internet is having more than 350 million pages [11]. But through a resea...

Literature Review: Methods Of Virus Protection
Example essay. Last modified: 8th May 2017
Introduction: Computer viruses are most critical area in computer science. All computer users in the world are suffering from this threat. Viruses reproduce themselves and spread through computer to computer as wel...

Literature Survey On Steganography
Example essay. Last modified: 3rd May 2017
Introduction: In this chapter, the literature survey on the steganography and various network security mechanisms are described. Many existing algorithms for steganography since 1991 to 2009 are studied and present...

Load Balancing as an Optimization Problem: GSO Solution
Example essay. Last modified: 5th Apr 2018
Introduction: METHODOLOGY INTRODUCTION In this chapter, we presented a novel methodology which considers load balancing as an optimization problem. A stochastic approach, Glowworm swarm optimization (GSO) is em...

Location Based Services and Crime Detection Alert
Example essay. Last modified: 12th Mar 2018
Introduction: CHAPTER 1 INTRODUCTION Nowadays, many issues and trend of crimes such as robbery, drug addicts, rape, murder or snatch had arisen via the whole world. These arise of crimes was happening shows that t...

Logical and physical network design
Example essay. Last modified: 1st Jan 2015
Introduction: Introduction In the world today, information communication and technology has become one of the most relied upon pillars for economic development. It is through technology that the entire universe has...

Logical Database Design for HR management System
Example essay. Last modified: 18th Aug 2017
Introduction: Task 1.1 The background information of the organization and operation that would support. In an organization a HR department is responsible for record each employee. Where the employees have an iden...

LoRaWAN Fog Computing Based Architecture for IoT Enabled Smart Campus Applications
Example essay. Last modified: 18th May 2020
Introduction: LoRaWAN Fog Computing Based Architecture for IoT Enabled Smart Campus Applications   Abstract: — It is estimated that one trillion IoT devices will be deployed b...

Low Level Programming Language Computer Science Essay
Example essay. Last modified: 1st Jan 2015
Introduction: Low-level programming language is a programming language that provides little or no abstraction from a computers instruction set architecture. The word low refers to the small or nonexistent amount of...

Low-Power Folded Tree Architecture for DSP Applications
Example essay. Last modified: 27th Sep 2017
Introduction: Low-Power Folded Tree Architecture for DSP applications Abstract— Wireless communication exhibits the highest energy consumption in wireless sensor network (WSN) nodes. Due to their limited energy ...

Machine Learning Application using Pose Estimation to Detect and Moderate Violence in Live Videos
Example essay. Last modified: 8th Feb 2020
Introduction: Abstract Recordings of public violence have never been as readily available as today. Livefeeds of shootings and attacks have become an ever increasing problem with gruesome images o...

Machine Learning in Malware Detection
Example essay. Last modified: 18th Aug 2017
Introduction: 1.0 Background Research Malware was first created in 1949 by John von Neumann. Ever since then, more and more malwares are created. Antivirus company are constantly looking for a method that is the ...

Machine Learning Techniques for Software Defined Network Security
Example essay. Last modified: 2nd Nov 2021
Introduction: This paper presents some of the most used methods for network security in a SDN environment using ML techniques, and some approaches organized by network attacks, in contrast to other papers of ML methods used in the SDN....

Macro Management Scheme in NEMO Environment
Example essay. Last modified: 29th Mar 2018
Introduction: An enhanced Macro Management Scheme in NEMO Environment to Achieve Seamless Handoff Qoutibah AlAssi   1. Abstract In NEMO(NETWORK MOBILITY) and when they are connected to the Internet through mobi...

Making Renewable Energy SMART using Internet of Things (IOT)
Example essay. Last modified: 18th Apr 2018
Introduction: Manuj Darbar, Kripa Shankar Pathak, Rajesh Goel   Abstract: The paper highlights the cooperative behaviour of Multi agent systems by combining various renewal energy sources and then feeding the p...

Malware And Exploit Protection
Example essay. Last modified: 27th Apr 2017
Introduction: In today’s modern world of information technology, malware and malware protection is becoming a large part of computer security. To analyse this problem various Internet and academic articles ha...

Malware Attacks And Their Impacts
Example essay. Last modified: 8th Feb 2020
Introduction:   Abstract—With always evolving technologies many devices are emerging which has the ability to connect to other devices across the world using internet, it ...

Managing Virtual Environments: Server Comparison
Example essay. Last modified: 8th Feb 2020
Introduction: Table of Contents Physical Server and Specifications Vendor Selection Hypervisor Comparison VMware 6.5 Hyper-V 2016 VCenter deployment ...

Managing Web Application Security Computer Science Essay
Example essay. Last modified: 1st Jan 2015
Introduction: Changes in business environments and the advances in web technologies have made the services of corporate, public and private firms to be more widespread over the web by making use of web applications...

Manuscript Management System (MMS) Integration with Social Media
Example essay. Last modified: 19th Apr 2021
Introduction: Manuscript Management system (MMS) – developed by J-Technologies India Limited, made it simple for the authors to share their research papers to their social network and professional network in a jiffy....

Matalan Architecture and Infrastructural Investigation
Example essay. Last modified: 29th Aug 2017
Introduction:   Introduction to my Organisation BLAG I chose Matalan as my organisation to undertake my report on as it was the most convenient option since I work there part time and have worked with a lot o...

Mathematical and Physics Concepts in Computer Games
Example essay. Last modified: 29th Aug 2017
Introduction: Introduction A two part assignment was distributed and part one was run a simulation of a given differential equation using numerical integration techniques i.e. Euler and 4th order Runge-Kutta me...

McWill SCDMA Wireless Access Technology Computer Science Essay
Example essay. Last modified: 1st Jan 2015
Introduction: McWiLL is the most advanced broadband wireless solution provided by Beijing Xinwei Telecommunications Technology. The technology is based on SCDMA, and is known as Multicarrier Wireless information Lo...

Measuring Processes of Pipelining
Example essay. Last modified: 12th Mar 2018
Introduction: Sakshi Dua Abstract Discuss the method to measure the performance of pipelining. Give a space-time diagram for visualizing the pipeline behavior for a four-stage pipeline. Also discuss some way to ...

Measuring the Concentration of Ozone in Solution, with Time
Example essay. Last modified: 23rd Sep 2019
Introduction:   Table Contents Abstract 1.0 Aims and objectives of the experiment 2.1 Theoretical and experimental basis: 2.2 Experimental Procedure...

Memory Management In Unix Operating System Computer Science Essay
Example essay. Last modified: 1st Jan 2015
Introduction: Introduction to UNIX According to Leon, 2007, UNIX is an operating system (OS) is software that manages hardware and software resources of a computer. UNIX was first developed in the 1960s and has bee...

Memory Or Random Access Memory Ram Computer Science Essay
Example essay. Last modified: 1st Jan 2015
Introduction: Modern digital systems require the capability of storing and retrieving large amounts of information at high speeds. Memories are circuits or systems that store digital information in large quantity. ...

Memory Organisation And Random Access Memory Computer Science Essay
Example essay. Last modified: 1st Jan 2015
Introduction: Memory stores, instructions and data. Memory is of two types, primary memory and secondary memory. Instruction or data given by input devices is first getting stored in the primary memory. Further use...

Memory Units And Memory Hierarchy
Example essay. Last modified: 1st May 2017
Introduction: Memory organisation is combination of several memory devices efficiently. Memory devices are combined and organised based on their characteristic such as access time, speed, storage capacity, physical...

Mesos and Kubernetes : A Comparative Analysis
Example essay. Last modified: 18th Aug 2017
Introduction: Abstract – Containers and application containerization have fast gained traction as the most promising aspects of Cloud Computing. A massive increase in the number and variety of applications ...

Messaging System for Hand Held Devices using Wi-Fi/Bluetooth
Example essay. Last modified: 12th Mar 2018
Introduction: Multidisciplinary Journal of Research in Engineering and Technology, Volume _, Issue _ () Pg. Messaging System for hand held devices using Wi-Fi/Bluetooth Network Ajita Arvind Mahapadi,Prof.Soumitra...

Methods for Routing Improvement in WSNs
Example essay. Last modified: 26th Jul 2018
Introduction: As was concluded on the first chapter of the work, one of the best routing protocols, which is less energy-intensive and in the same time have other good conditions, like mobility, multipath usabilit...

Methods of Analyzing Data in Data Warehouse
Example essay. Last modified: 29th Aug 2017
Introduction: Data Mining methods for Customer Relationaship Management Abstract-Data warehousing and data mining, applied to Customer Relationship Management (CRM), are a relatively fresh sector for organizati...

Micro Operations Microinstruction Micro Program Micro Code
Example essay. Last modified: 16th May 2017
Introduction: Each microinstruction in a microprogram provides the bits which control the functional elements that internally compose a CPU. The advantage over a hard-wired CPU is that internal CPU control becomes ...

Microcontrollers In Wireless Sensor Networks
Example essay. Last modified: 17th May 2017
Introduction: ABSTRACT: Now a day’s wireless sensor networks have been gaining interact with physical in world. Whereas these can be used in different applications in medical, military, roadside, industrial e...

Microprocessor Without Interlocked Pipeline Stages Computer Science Essay
Example essay. Last modified: 1st Jan 2015
Introduction: MIPS is originally an acronym for Microprocessor without Interlocked Pipeline Stages, a reduced instruction set computing (RISC) architecture developed by MIPS Technologies. In the mid to late 1990s, ...

Microsoft Sharepoint Literature Review Computer Science Essay
Example essay. Last modified: 1st Jan 2015
Introduction: In this chapter, the author will do research on the literature review on Microsoft SharePoint Service 3.0, Microsoft Forefront Threat Management Gateway, and Microsoft Forefront Security for Document ...

Microsoft Versus Apple Compare And Contrast Computer Science Essay
Example essay. Last modified: 1st Jan 2015
Introduction: Business strategy is a direction, vision and objectives in terms of projects, in order to configure the total recourses that invest into the projects base on the markets needs and challenging of other...

Microsoft Visual Basic Programming Language Computer Science Essay
Example essay. Last modified: 1st Jan 2015
Introduction: Microsoft Visual Basic is a programming language is which is easier and simpler to use than other programming languages for example Java, Programming in C, programming in C++. Visual basic is an ideal...

Migration Plan from UNIX to Microsoft Server
Example essay. Last modified: 26th Mar 2018
Introduction: Data Migration is the process of transferring data between different storage types, servers or formats. It’s not just about copying data, but also about validating the data according to constraints...

Mmap Creation of New Mapping
Example essay. Last modified: 18th Aug 2017
Introduction:   The goal of this experiment is too understand how mmap creates a new mapping on a process virtual memory address space. Figure 1 The outcome of the program is shown (figure 1). The page size of...

Mobile Computing with WirelessLAN and its Modes
Example essay. Last modified: 4th Apr 2018
Introduction: Mobile computing with WirelessLAN And its modes Ad hoc network with challenges Pallavi D. Dudhe, Prof. P. L. Ramteke   Abstract – In this paper, we summarized Mobile computing with WirelessL...

Mobile Robotic Arm Motivation Computer Science Essay
Example essay. Last modified: 1st Jan 2015
Introduction: Robotics is technology that deals with the design, construction and operation of robots that are used in numerous applications is called robotics. It has become an unstoppable force in the developme...

Model Driven Development Vs Test Driven Development Computer Science Essay
Example essay. Last modified: 1st Jan 2015
Introduction: Model driven development is a top-down, traditional approach that has been around for a long time. Test Driven Development (TDD) is a bottom-up, new approach in the sense that it has picked up its v...

Modelling Tool for Photonic Crystal Device Issues
Example essay. Last modified: 12th Mar 2018
Introduction: Chapter – 4 SIMULATION DETAILS OF THE PROJECT In the past 10 years, photonic crystals (PCs) have attracted much scientific and commercial interest. The research and design work for PCs starts f...

Modern Programming Tools And Techniques Computer Science Essay
Example essay. Last modified: 1st Jan 2015
Introduction: Q:1 Define abstraction, encapsulation, modularity and hierarchy in your own terms. Ans:-Abstraction”Abstraction denotes the essential characteristics of an Object that differ it from other objec...

Modification of Power Series Expansion
Example essay. Last modified: 18th Jul 2018
Introduction: The available methods to compute the logarithm of a number using digital circuits can be divided in two main groups. On the one hand, we have the look-up table based algorithms and, on the other, ite...

Modulation Systems used in Satellite Communications
Example essay. Last modified: 22nd Sep 2021
Introduction: The objective of this paper is to describe different types of modulations systems using for satellite communications. In this report, first I am trying to give some basic information related to the modulation systems and then bring all possible modulation schemes used in satellite communications....

Modulation Systems Used In Satellite Communications Computer Science Essay
Example essay. Last modified: 1st Jan 2015
Introduction: Satellite is the one of the greatest means of communication carrying a large chuck of voice and data stream from one part of the horizon to the other as compared to other medium. In this modern age, c...

Monitoring and Analysing Anomaly Activities in a Network Using Packetbeat
Example essay. Last modified: 23rd Sep 2019
Introduction: Monitoring and Analysing anomaly activities in a network using Packetbeat   Abstract: The primary intention of any organization is to provide security for their i...

Mosquito Species Detection using Smart Phone
Example essay. Last modified: 18th Aug 2017
Introduction: Abstract-According to WHO(World Health Organization) re-ports, among all disease transmitting insects mosquito is the most hazardous insect. In 2015 alone, 214 million cases of malaria were register...

Most Important Cybersecurity Vulnerability Facing It Managers Computer Science Essay
Example essay. Last modified: 1st Jan 2015
Introduction: Vulnerabilities to exploitation in modern computers are varied. They range from web server vulnerabilities that allow attackers to take over the web server to very sophisticated side channel exploits...

Moving Object Detection Video Images Using Matlab Computer Science Essay
Example essay. Last modified: 1st Jan 2015
Introduction: Moving object detection is an important research topic of computer vision and video processing areas. Detection of moving objects In video streams is the first relevant step of information extraction ...

MPLS-Traffic Engineering
Example essay. Last modified: 12th Mar 2018
Introduction: I. Webserver We will be using apache web server in our project. The Apache HTTP Server Project is a synergistic programming improvement exertion went for making a hearty, business grade, featureful, ...

Multi User Chat System In Java Computer Science Essay
Example essay. Last modified: 1st Jan 2015
Introduction: The aim of this project is to develop an multi-user chat system to facilitate communicate between users with in the corporate or scientific organization. Chat application is to allow user for private...

Multi-Class Sentiment Analysis using LSTM-CNN Network
Example essay. Last modified: 18th May 2020
Introduction: Multi-Class Sentiment Analysis Using LSTM-CNN network Abstract—In the Data driven era, understanding the feedback of the customer plays a vital role in improving the performance and e...

Multi-keyword Ranked Search Over Encrypted Cloud Data
Example essay. Last modified: 18th Aug 2017
Introduction: Now a days cloud computing has become more popular, so more information possessors are actuated to their information to cloud servers for great convenience and less monetary value in data manage...

Multicast Protocols: Challenges and Future Research
Example essay. Last modified: 8th Feb 2020
Introduction: ABSTRACT Multicast in terms of IP is a method of transferring Internet Protocol datagrams to a group of involved receivers in a single broadcast. The IP specific for...

Multimedia In Future Generation Systems Computer Science Essay
Example essay. Last modified: 1st Jan 2015
Introduction: This paper discusses about the mobile multimedia used in various generation of mobile system. It focuses on all the generations that are up to the current trend and also about the future generation wh...

Multimedia Systems And Applications Computer Science Essay
Example essay. Last modified: 1st Jan 2015
Introduction: This report gives the details of multimedia computing. Multimedia computing is one of the major research topics in recent years, this field is widely using in different industries like web, gaming, te...

Multimedia Using Adobe After Effects Computer Science Essay
Example essay. Last modified: 1st Jan 2015
Introduction: Increase in technology making wider use of multimedia and its applications. For a good presentation multimedia is used to present in very effective and innovative way. Every internet technology makes ...

Multipath Fading Channels And Transmitted Signals Computer Science Essay
Example essay. Last modified: 1st Jan 2015
Introduction: Multipath fading is a phenomenon of fading of transmitted signals due to refraction, reflection and diffraction from objects or obstacles present in the line or way of transmission. In this article, w...

Multiple Churn Prediction Techniques And Algorithms Computer Science Essay
Example essay. Last modified: 1st Jan 2015
Introduction: Abstract-Customer churn is the business term that is used to describe loss of clients or customers. Banks, Telecom companies, ISPs, Insurance firms, etc. use customer churn analysis and customer churn...

Multiple Objects Tracking Via Collaborative Background Subtraction Computer Science Essay
Example essay. Last modified: 1st Jan 2015
Introduction: Multiple Objects Tracking Via Collaborative Background Subtraction. Object tracking system is a group of integrated modern technology working together to achieve certain of purpose like monitoring, tr...

Multitouch Gesture Generation and Recognition Techniques
Example essay. Last modified: 18th Aug 2017
Introduction: Abstract: –A huge number of users are using smart phones to communicate with each other. A smart phone user is exposed to various threats when they use their phone for communication. These thr...

Multitrait Multimethod Matrix Analysis of Creative Problem Saving and Working Memory Measures
Example essay. Last modified: 18th May 2020
Introduction: Background and Introduction In a world where the Internet provides us with instant access to the sum of all human knowledge, traditional fact-based teaching is no longer the most effecti...

Mutation Testing by Using Formal Method
Example essay. Last modified: 4th Apr 2018
Introduction: Jaspreet Singh Abstract Mutation testing was introduced in 1970’s in the field of software testing as a process of testing the test suites by intentionally seeding errors i.e. mutation operators,...

Nanopore Sequencing: Structure, Principles and Applications
Example essay. Last modified: 23rd Sep 2019
Introduction: Nanopore Sequencing The underlying force behind the rapid advancements in genomics is due to the development of novel genome sequencing. It is said notably that the invention of second ...

Needs Assessment of Public Sector Organisation
Example essay. Last modified: 16th Aug 2017
Introduction: Table of Contents Page 1. Introduction. 1 2. The needs assessment to be carried out. 1 3. The Context. 1 4. Why a needs assessment would be useful. 1 5. The...

Nessus report
Example essay. Last modified: 23rd Sep 2019
Introduction: Nessus report In the realistic world, some people might go online and never think or have any concern about protection issues. To the contrary, which just a dream, as unluckily some are...

Network Attacks in Real Time Scenario Over Campus Network
Example essay. Last modified: 12th Mar 2018
Introduction: Amit Mahajan* Vibhakar Mansotra** ABSTRACT This paper presents study of attacks in real time scenario over the campus network. The attacks were monitored over a time and analyses were made. The paper...

Network Issues and how they affect gameplay and interactivity
Example essay. Last modified: 19th Apr 2021
Introduction: Networks allow user’s clients to communicate by sending bits of data through the internet of the form of packets, these will then build on top of the internet protocol, and this in terms means that if a packet sent using UDP or TCP a specific IP address then receives the packet. ...

Network Management Justification for Handmade Furniture Ltd
Example essay. Last modified: 18th Aug 2017
Introduction:   Based on the initial inspections carried out recently, Handmade Furniture Ltd has experienced difficulties managing the IT infrastructure as well as providing IT support for staff. The existing n...

Network Management System: Light Weight SNMP Implementation
Example essay. Last modified: 3rd Apr 2018
Introduction: Chapter 6 Implementation Initially the Java (JDK 1.6) and Netbeans IDE 5.4 should be installed in a system. Then the SNMP4J API should be added to the Netbeans library. The Mysql-JDBC sever sh...

Network Security and Vulnerability Threat Table
Example essay. Last modified: 18th Aug 2017
Introduction: LAN Security Is the local area network that access control using the private VLANs and it’s a networking device within a small geographical area. They are not safe and secure compared to other...

Network Slicing in 5G Networks
Example essay. Last modified: 8th Feb 2020
Introduction: Abstract— In today’s the era of IoTs, large companies are producing both big and small new hand-held machines at an incredible rate. These new technologies offer great opportunities when con...

Network Troubleshooting Symptoms And Solutions
Example essay. Last modified: 3rd May 2017
Introduction: Data transfer from one point to another is the most important aspect of computers. Networks should be safe, reliable and secure for data movement. Any problem which occurs with computer networks cause...

Networking And Routing Protocols
Example essay. Last modified: 19th May 2017
Introduction: At present, internet plays a vital role in many of our daily life. It made a dramatic revolution on communication which we enjoy today. The revolution offered web appliances, e-commerce, video confere...

Networking Standards (OSI Layers): Advantages and Disadvantages
Example essay. Last modified: 8th Feb 2020
Introduction: Introduction  Nowadays civilization can’t imagine its life without technology: any business won’t survive without an external storage and a proper software; any person won’t b...

New Era Of Science And Technology
Example essay. Last modified: 1st May 2017
Introduction: In this new era of science and technology, it is very difficult to imagine people working without assistance of computers. Our dependency on computers has led to the rapid development of faster, small...

NMAP Scan: Features and Applications
Example essay. Last modified: 23rd Sep 2019
Introduction: NMAP Scan Introduction: Before we tend to start with the technical intricacies of mastering Nmap, it is a sensible idea to know however Nmap itself began and evolved a...

Non-linear Generalized Companding Scheme to Reduce PAPR
Example essay. Last modified: 9th Jul 2021
Introduction: In this paper a novel non-linear generalized companding scheme called “Quadrilateral Companding Transform (QCT)” has been proposed to reduce the PAPR of OFDM signal....

Nonfunctional Requirements with Data Mining
Example essay. Last modified: 11th Dec 2017
Introduction: INTRODUCTION      The use of software has invaded our daily lives as it enable us to accomplish many tasks especially those which are associated in doing various business processes and in dealing...

NoSQL Databases | Research Paper
Example essay. Last modified: 8th May 2017
Introduction: In the world of enterprise computing, we have seen many changes in platforms, languages, processes, and architectures. But throughout the entire time one thing has remained unchanged – relationa...

Novel Approaches to DoS Impact Measurement
Example essay. Last modified: 29th Mar 2018
Introduction: J.Anto Sylverster Jeyaraj, C.Suriya, R.Sudha Abstract Over the past few years Denial of service (DoS) Attacks have emerged as serious vulnerability for almost every internet Services. Existing appro...

Novel Elliptic-function Low-pass Filter (LPF)
Example essay. Last modified: 7th Aug 2018
Introduction: Performance of microstrip low pass filter with stub loaded Electromagnetic Band Gap ground plane Mariselvam V, Raju S   Abstract A novel elliptic-function low-pass filter (LPF) is Presented...

Ntroduction To Big Data Technologies Computer Science Essay
Example essay. Last modified: 1st Jan 2015
Introduction: Research and development in the area of database technology during the past decade is characterized by the striving need for better application support beyond the traditional world, where primarily hi...

Numa And Uma And Shared Memory Multiprocessors Computer Science Essay
Example essay. Last modified: 1st Jan 2015
Introduction: The main difference between the NUMA and UMA memory architecture is the location of the Memory. The UMA architecture nodes have first and second cache memory levels joint with the processor, next leve...

Obfuscated Data Storage For Cloud Environment
Example essay. Last modified: 27th Mar 2018
Introduction: Ravi Pandey, and Kamlesh Chandra Purohit   Abstract. Data storage service is one of the most attractive services provided by the cloud service provider. Despite the benefits of cloud computing thr...

Object oriented programming with subclasses
Example essay. Last modified: 1st Jan 2015
Introduction: Inheritance & Polymorphism Given Person class definition below: class Person { private String name; Person(String name) { this.name = name; } public String getName() { return name; } } Design tw...

ODS & TS Forecast
Example essay. Last modified: 18th Aug 2017
Introduction: Abstract: Cloud computing share resources and then provide services to end users over host based demand services. Scheduling tasks based on different job allocation with different services is the com...

Ofdm Techniques In Satellite Communications
Example essay. Last modified: 1st May 2017
Introduction: The concept of Orthogonal Frequency Division Multiplexing was first proposed in 1960 and developed in the 70s .All bandpass modulation schemes use single carrier by adjusting frequency, phase or ampl...

Online Airline Reservation System Computer Science Essay
Example essay. Last modified: 1st Jan 2015
Introduction: Background This project deals with the development of a Software Requirements Specification (SRS) document that specifies what an airline reservation system should and should not do. The SRS document ...

Online Cinema Reservation System
Example essay. Last modified: 18th May 2017
Introduction: This assignment title for Introduction to Software Engineering assignment is to do a research and analysis of a software project. The topic chosen for this assignment is Online Cinema Ticket Reservati...

Online Course Registration And Management System
Example essay. Last modified: 6th Jun 2017
Introduction: Currently the Microsoft IT Academy in Multimedia University Melaka using the website that hosted in MMU server to provide information regarding the course offered as well as the registration method to...

Online Learning Algorithms in Varied Bandit Scenarios
Example essay. Last modified: 8th Feb 2020
Introduction: 1.      ABSTRACT In this paper, we present a discussion on the performance of non-stochastic/adversarial-setting algorithms in 2 special scenarios: W...

Online Web Application For Selling Computer Products
Example essay. Last modified: 11th Dec 2017
Introduction: This project report represents the idea of the Online Shopping Website application for Computer products. In this project we are having primary goal of to increase the sale of the Computer product in ...

Ontology Development Through Concept Maps Using Text Indices
Example essay. Last modified: 26th Mar 2018
Introduction:       Abstract- Ontology acts as a platform for knowledge sharing and description to represent a particular domain in the form of customized web information gathering. While developing those onto...

Open Source Software: Advantages and Methods
Example essay. Last modified: 22nd Jun 2018
Introduction: Background Open source software is treated as the software which is freely accessed by anyone. The source code of the software is publically accessible by anyone so that anyone can use it in his own ...

OpenMP Based Fast Data Searching with Multithreading
Example essay. Last modified: 9th Apr 2018
Introduction: V.Karthikeyan, Dr. S.Ravi and S.Flora Magdalene   Abstract The multiprocessor cores with multithreaded capability are continuing to gain a significant share and offer high performance. The use of O...

OpenStack Introduction and Uses
Example essay. Last modified: 26th Jul 2017
Introduction: OpenStack: It is an open-source programming stage for distributed computing, generally sent as a framework and as an administration. The product stage comprises of interrelated segments that control...

Operating System Questions and Answers Example
Example essay. Last modified: 18th Aug 2017
Introduction: Questions: What are the relationships between operating systems and the hardware? Answer: Operating system is the mediator between computer hardware and application programs .It also makes all...

Operating System Used In Portable Devices Computer Science Essay
Example essay. Last modified: 1st Jan 2015
Introduction: This report is about Operating system used in portable devices like PDA and laptops etc. As the passage of time consumer needs are becoming more and more demanding and life is becoming compact so as d...

Operating Systems Tasks and Programming Lab
Example essay. Last modified: 16th Aug 2017
Introduction:   Lab Activity 1 – Operating Systems Tasks and Programming a) Future of operating systems. [Report on the future of operating systems here] b) Programming activity C++ #include using namesp...

OPM System Potential Threats and Vulnerabilities
Example essay. Last modified: 18th Aug 2017
Introduction: Risk Assessment Report Purpose The purpose of conducting this risk assessment was to identify potential threats and vulnerabilities related to OPM System. The risk assessment will be used to identi...

Optimization of Benchmark Functions using VTS-ABC Algorithm
Example essay. Last modified: 4th Apr 2018
Introduction: Performance Optimization of Benchmark Functions using VTS-ABC Algorithm Twinkle Gupta and Dharmender Kumar Abstract– A new variant based on tournament selection called VTS-ABC algorithm is p...

Optimizing Cloud Resources Implementation of IPTV Service
Example essay. Last modified: 26th Jul 2021
Introduction: The Internet Protocol Television is a system over which Internet television services are delivered using the networking and architecture methods of the Internet Protocol Suite through a packet-switched network infrastructure, e.g., the Internet and broadband Internet access networks, rather of being delivered over traditional radio frequency broadcast, satellite signal, and cable television (CATV) formats. ...

Overcoming The Limitations Of Ipv4 Computer Science Essay
Example essay. Last modified: 1st Jan 2015
Introduction: Today internet and Internet base technologies has become part of our daily life. The Internet operates using set of rules called Internet protocol as it foundation. The Internet Protocol is used to in...

Overview of Crawlers and Search Optimization Methods
Example essay. Last modified: 9th Apr 2018
Introduction: With the explosive growth of knowledge sources out there on the planet Wide internet, it’s become progressively necessary for users to utilize automatic tools in the notice the specified data...

Overview of Cryptographic Techniques
Example essay. Last modified: 29th Mar 2018
Introduction: Gunasekaran, Priya Dharshini   Cryptographic Techniques The backbone of many organization is the electronic communications. Most of the information are communicated online. Hence the important infor...

Overview of Cryptography and Encryption Techniques
Example essay. Last modified: 9th Apr 2018
Introduction: What is cryptography Cryptography is the discipline of cryptography and cryptanalysis and of their interaction. The word “cryptography” is derived from the Greek words “Kryptos” means conceal...

Overview Of Data Structures And Algorithms Computer Science Essay
Example essay. Last modified: 1st Jan 2015
Introduction: As Robert Lafore has stated, data structures are a collection of structures that are used to store data in a memory location. A Data structure is designed to organize data to fulfill ones purpose of a...

Overview of Ethernet Technology
Example essay. Last modified: 5th Aug 2021
Introduction: In this research, we shall discuss interface options for Ethernet and the optical transport network (OTN) beyond 100G. 100G Ethernet technologies give carriers the flexibility to phase in the implementation of these higher-speed rates to better align capacity increases with their specific growth and budget strategies...

Overview of Image-Based Shading Techniques
Example essay. Last modified: 26th Mar 2018
Introduction: Rishabh chand sharma Brahmdutt bhora   Abstract— Image processing input, such as a photo or video frame is an image for which any form of signal processing functions by using images using mathem...

Overview of Object Oriented Programming
Example essay. Last modified: 8th Feb 2020
Introduction: Object-oriented programming is a new way of approaching the job of programming. Programming over the years has evolved to accommodate the increased complexity of programs, it has been become a wi...

P2 Cycle in WDM Networks
Example essay. Last modified: 28th Jul 2021
Introduction: In this paper new p cycle protection is done in mesh based protection networks....

Packet Capture and Intrusion Detection/Prevention Systems
Example essay. Last modified: 23rd Sep 2019
Introduction: Malicious Network Activity Report Event A client detected suspicious network activity, and feared a breach and this resulted in this cyber forensic investigation. In this malic...

Packet Classification: Problem and Resolution
Example essay. Last modified: 26th Jul 2018
Introduction: INTRODUCTION This chapter covers the introduction to packet classification. Problems for packet classification, objectives to overcome the problem involved in packet classification, motivation to do ...

Packet-Hiding Method for Preventing Selective Jamming Attack
Example essay. Last modified: 18th Aug 2017
Introduction: Abstract The open nature of the wireless medium leaves it vulnerable to intentional interference attacks, typically referred to as jamming. This intentional interference with wireless transmissions...

Parallel Data Sorting and Deduplication in Distributed File Systems
Example essay. Last modified: 23rd Sep 2019
Introduction: PARALLEL DATA SORTING AND DEDUPLICATION IN DISTRIBUTED FILE SYSTEMS TABLE OF CONTENTS SL. NO. TITLE ...

Passive and Active Security Attacks
Example essay. Last modified: 11th Dec 2017
Introduction: Ans :- The difference between active and passive attacks in case of active attack involve the updating upon the data means the active attack access the data and then perform alteration upon the data a...

Passive Optical Networks (PON)
Example essay. Last modified: 26th Jul 2018
Introduction: With the popularity of broadband services of the terminal users the demands for bandwidth in the access network is rapidly increasing. Rapid increase of global data traffic and massive deployment of ...

Passive Reconnaissance on Website
Example essay. Last modified: 8th Feb 2020
Introduction:   Table of Contents INTRODUCTION What is Passive Reconnaissance? ABOUT THE ORGANIZATION: “THE NAIT” Why NAIT TARGETED ASSETS FOR ATT...

Passive Reconnaissance Website Analysis
Example essay. Last modified: 18th Aug 2017
Introduction: Assignment: – Reconnaissance Paper Student Name: – Soumil Deshpande Executive Summary In this assignment, passive reconnaissance was performed on The Weather Channel’s website i....

Path Planning Strategy For Line Follower Computer Science Essay
Example essay. Last modified: 1st Jan 2015
Introduction: This paper presents the development of a line follower wheeled mobile robot. In this project, ARM cortex-3 based microcontroller is chosen as the main controller to react towards the data received fro...

PatientOS installation guide
Example essay. Last modified: 1st Jan 2015
Introduction: 1. Overview 1.1 Process The basic steps to installing PatientOS are divided into the backend system and front end client a) Backend System Install the PatientOS software base version. Install the Pa...

Pattern Mining for Information Retrieval from Large Databases
Example essay. Last modified: 28th Jul 2021
Introduction: To find the knowledge effectively without the problem of low frequency and misinterpretation a pattern based approach (Pattern classification method) is discovered in this paper....

Pay Roll System Project Proposal Computer Science Essay
Example essay. Last modified: 1st Jan 2015
Introduction: Visual Basic was one of the first languages along with Paradox and Dbase designed to take advantage of GUI interfaces with visual programming in mind. We can build the menus, forms and reports of a pr...

Pentium Memory Management Unit Computer Science Essay
Example essay. Last modified: 1st Jan 2015
Introduction: The main aim of the research paper is to analyze Pentium Memory Management Unit. Here, certain key features associated with a memory management unit like segmentation, paging, their protection, cache ...

Perceived User Experience of Interactive Animated Transition
Example essay. Last modified: 29th Aug 2017
Introduction: Perceived User Experience of Interactive Animated Transitions in Mobile User Interfaces and Visualisation Animated transitions hold an important part of graphical user interface design practice. ...

Performance Analysis for AD-HEED and N-HEED
Example essay. Last modified: 26th Mar 2018
Introduction: 4.1 Results and Discussion In this section, we exhibit and discuss the results of the simulation. This section shows the performance analysis for AD-HEED and N-HEED compared to the original HEED prot...

Performance Analysis Of Election Algorithm Computer Science Essay
Example essay. Last modified: 1st Jan 2015
Introduction: Distributed systems are the systems consisting of multiple processors that connect through a network to communicate. To manage the communication between different nodes and the exchange of data betwee...

Performance Analysis of One Dimension FDTD Code
Example essay. Last modified: 7th Aug 2018
Introduction: Performance analysis of One dimension FDTD code using Parallel Processing Technique P. GUNAPANDIAN, M.R.SUBASREE, B. MANIMEGALAI   Abstract The requirement of longer processing time and larger mem...

Performance Analysis of Reusable Software Systems
Example essay. Last modified: 4th Apr 2018
Introduction: Monika Kalotra Dr. Kuljit Kaur   Abstract: To improve the quality of software system, there is a need to eliminate or reduce the rework. Software reuse is one of the solution proposed for it. Soft...

Performance Evaluation and Enhancement of Mobile Node: MIH
Example essay. Last modified: 27th Sep 2017
Introduction: PERFORMANCE EVALUATION AND ENHANCEMENT OF MOBILE NODE USING MIH CHAPTER 4 NETWORK SIMULATOR 4.1 Introduction NS2 is associate open-source simulation tool that runs on Linux, it’s a discreet eve...

Phase Interpolator Pll In Simulink Computer Science Essay
Example essay. Last modified: 1st Jan 2015
Introduction: Phase Locked Loops (PLLs) is a negative feedback system that matches the output frequency to the input frequency. Many applications utilize PLLs such as: frequency synthesizers, skew cancellation, ref...

PIQL: Success-Tolerant Query Processing in the Cloud
Example essay. Last modified: 18th Aug 2017
Introduction: Advanced Topics in Foundations of Databases PIQL: Success-Tolerant Query Processing in the Cloud Stavros Anastasios Iakovou Introduction In our days it is widely know that modern web application...

PL/SQL Code Restructure With Structural Resemblance Measure
Example essay. Last modified: 3rd Apr 2018
Introduction: Abstract Database design is a challenging and complex task due to its importance in the overall performance of the database system. Recently, various techniques have been under use across different s...

Planning And Analysing Wlan Using Opnet Computer Science Essay
Example essay. Last modified: 1st Jan 2015
Introduction: This is the second, more advanced laboratory exercise dealing with network simulation and more specifically, with wireless networks. The exercise is based on an OPNETWORKS tutorial (OPNETWWORKS is the...

Planning, Development and Testing Internetwork Design
Example essay. Last modified: 8th Feb 2020
Introduction: Table of Contents Contents Table of Contents Aims of the Project Problem Analysis Requirements & Solutions WAN requirements: Gen...

Plant Diseases Through Image Processing Techniques Computer Science Essay
Example essay. Last modified: 1st Jan 2015
Introduction: Damage of plant is an important issue in agriculture. There are lots of factors involving weather, fungi, artificial drying, and mechanical damage during harvest and storage which can cause damage. NI...

Posture Recognition Based Fall Detection System
Example essay. Last modified: 28th Jul 2021
Introduction: In this paper, we designed an application with the ability of automatic fall detection, by using the mobile sensors, warning signal by pressing a button in cases of emergency, detection and automatic notification to supervisors as well as visual display to passers-by....

Power Line Communication: a Green Computing
Example essay. Last modified: 19th Apr 2018
Introduction: Varsha Mohite Tejas Kandgaonkar ABSTRACT After evolution of wireless technology, classical Public Switched Telephone Network (PSTN) suffered through the drastic change. As a result of it, approxima...

Power System Analysis Software Tools Computer Science Essay
Example essay. Last modified: 1st Jan 2015
Introduction: This paper is a review of few Power System Analysis software tools available in electrical industry (ERACS, EDSA and PSCAD), that provides the study of proposed and actual systems under a variety of p...

Prediction of Coronary Heart Disease using Supervised Machine Learning Algorithms
Example essay. Last modified: 8th Feb 2020
Introduction: Abstract — The field of medical analysis is often referred to be an invaluable source of rich data yet with poor insights and medical outcomes. Coronary Heart Disease (CHD) is one of the major ...

Prediction of Heart Cancer Microarray Data Using Hybrid Particle Swarm Optimization
Example essay. Last modified: 18th May 2020
Introduction: Prediction of Heart Cancer Microarray Data Using Hybrid Particle Swarm Optimization with Grey Wolf Optimizer and Machine Learning Techniques. Abstract The traditional methods ...

Prevention of Cross Site Scripting Attacks
Example essay. Last modified: 23rd Sep 2019
Introduction: CROSS – SITE SCRIPTING (XSS) Abstract Millions of people use many web applications every day, it has made our life better and easier. From social networking to online sho...

Principal Component Analysis for Numerals
Example essay. Last modified: 6th Aug 2021
Introduction: In this paper we have proposed principal component analysis (PCA) for feature extraction and used Probabilistic Neural Network (PNN) based model for classification and recognition of off-line handwritten numerals of telugu script...

Principles and Applications of Laser Photogrammetry
Example essay. Last modified: 23rd Sep 2019
Introduction: Laser Photogrammetry Abstract This paper will be explaining the working principles and applications of Laser Photogrammetry. Photogrammetry is a Greek word, “pho” meaning l...

Principles of Information Security
Example essay. Last modified: 18th Aug 2017
Introduction: Purpose:In order to protect against accidental or intentional damage or loss of data, interruption of College business, or the compromise of confidential information we must classify data and establ...

Principles of Information Security
Example essay. Last modified: 18th Aug 2017
Introduction: Man in the Middle and Man in the Browser Attacks on Financial Institutions.   Abstract Four decades ago, what started as a US military research initiative to build network for linking US universit...

Principles Of Procedural Programming Computer Science Essay
Example essay. Last modified: 1st Jan 2015
Introduction: Procedural programming is the most natural way of telling a computer what to do as the computer processors own language and machine code is procedural. It is also referred as structured or modular pro...

Principles Of Programming Using Net Framework Computer Science Essay
Example essay. Last modified: 1st Jan 2015
Introduction: The .NET Framework Class library consists of a combination of instructional classes, interfaces, and also value types in which facilitate and boost the actual development practice and supply use of sy...

Principles of System Development Life Cycle (SDLC)
Example essay. Last modified: 11th May 2021
Introduction: The software development life cycle (SDLC) is a methodology used to determine the steps involved in producing software. It involves the preparation of the phases involved in developing software from scratch....

Principles, Characteristics and Features of Programming
Example essay. Last modified: 11th Aug 2017
Introduction: Discuss the principles, characteristics and features of programming using a .NET framework. The .NET Framework is created as an integrated environment for seamlessly developing and running applica...

Printers And Printer Types Computer Science Essay
Example essay. Last modified: 1st Jan 2015
Introduction: A printer is an output device that produces text and graphics on a physical medium such as paper. Laser Printers A laser printer is a high-speed, high-quality nonimpact printer. A laser printer is a...

Privacy Preserving Data Mining in Partitioned Databases
Example essay. Last modified: 26th Mar 2018
Introduction: A survey : Privacy preserving data mining in horizontally partitioned databases Komal Kapadia, Ms.Raksha Chauhan   ___________________________________________________________________________________...

Privacy-handling Techniques and Algorithms for Data Mining
Example essay. Last modified: 18th Apr 2018
Introduction: VIVEK UNIYAL ABSTRACT Data mining can extract a previously unknown patterns from vast collection of data. Nowadays networking, hardware and software technology are rapidly growing outstanding in co...

Proactive and Reactive Cyber Forensics Investigation Process
Example essay. Last modified: 12th Mar 2018
Introduction: PROACTIVE CYBER FORENSIC ANALYSIS Proactive And reactive cyber forensics investigation processes: A Systematic Literature Review(SLR) A multi-component framework of cyber forensics investigation   A...

Probing Using Zenmap Gui
Example essay. Last modified: 11th Dec 2017
Introduction: Hackers traditionally follow a 5-step approach to seek out and destroy targeted hosts. The first step in performing an attack is to plan the attack by identifying your target and learning as much as p...

Problem For Swinton Hotel Management
Example essay. Last modified: 3rd May 2017
Introduction: The aim of this project is to build a comprehensive tool E-reservation system for Swinton Hotel Management. “Swinton” Hotel provides all facilities like, advance booking room facilities, B...

Get Academic Help Today!

Encrypted with a 256-bit secure payment provider