Computer Science Essays
The essays below were written by students to help you with your own studies. If you are looking for help with your essay then we offer a comprehensive writing service, provided by fully qualified academics in your field of study.
Computer Science Essays & Related Services
Ant Colony Optimization Algorithm
Example essay. Published: 9 April 2018
To solve the planning problem, we proposed an ACO algorithm with further designed. ACO builds solutions in a step-by-step manner and enables the use of problem-based heuristics to guide the ants to s…
Improving Effectiveness and Efficiency of Sentiment Analysis
Example essay. Published: 9 April 2018
Modha Jalaj S. Chapter – 1 1. Introduction: Big Data has been created lot of buzz in Information Technology word. Big Data contain large amount of data from various sources like Social Media, News …
GDI Security Policy Document
Example essay. Published: 9 April 2018
1.0 Introduction This security policy document offers a sufficient summary of the state of security concerns with the herein mention corporation and no alteration of the information contained here…
How to Write a Research Dissertation/Thesis
Example essay. Published: 9 April 2018
How Research is to be written and presented Research writing Research writing is a major factor of success for any student, scholar or anyone interested in the pursuit of knowledge as a research pape…
Survey on Spatial Database Systems
Example essay. Published: 9 April 2018
ï›ï€ ï Abstract—In this survey, the term of “spatial database”, its data models, its data types with implementations, and its management techniques are described with providing a…
Reducing Communication and Processing Overhead
Example essay. Published: 9 April 2018
RACE: Reducing Communication And Processing Overhead And Ensuring Security Milu Sayed Liyamol Aliyar Abstract— RACE, Report based payment scheme for multi-hop wireless network. Race is a secur…
OpenMP Based Fast Data Searching with Multithreading
Example essay. Published: 9 April 2018
V.Karthikeyan, Dr. S.Ravi and S.Flora Magdalene Abstract The multiprocessor cores with multithreaded capability are continuing to gain a significant share and offer high performance. The use of O…
Email Protocol: SMTP, POP, and MIME
Example essay. Published: 5 April 2018
Email protocol governs the interactions between email clients and servers. An Email protocol is a standard method which is used at each end of a communication channel either server side or client sid…
Analysis of Tools for Data Cleaning and Quality Management
Example essay. Published: 5 April 2018
Data cleaning is needed in process of combining heterogeneous data sources with relation or tables in databases. Data cleaning or data cleansing or data scrubbing is defined as removing and detecting…
Improving Resource Allocation for Data Center Overbooking
Example essay. Published: 5 April 2018
Overbooking becomes feasible because user applications tend to overestimate their resources and requirements, that tends to utilize only a fraction of the allocated resources. Overbooking has to be carefully planned in order not to impact application performance. Resource utilization and Data centres utilization can be used in this overbooking scheduler. Data send can send from sources to destination via node….
System to Filter Unwanted Messages from OSN User Walls
Example essay. Published: 5 April 2018
M.Renuga Devi, G.Seetha lakshmi, M.Sarmila Abstract—One fundamental issue in today’s Online Social Networks (OSNs) is to give users the ability to control the messages posted on their own priva…
Acoustic Cryptanalysis of RSA and Its Counter Measure
Example essay. Published: 5 April 2018
Prof. J P Agrawal Saurabh Sharma Siddharth Gupta ABSTRACT Acoustics has come up as a new vulnerability in the field of information security. The RSA encryption algorithm, although h very hard to br…
Smart Prepaid Energy Meter Using GSM Module
Example essay. Published: 5 April 2018
KISHORE KUMAR K GAYATHRI N RAJESH KUMAR V T Abstract This paper aims at proposing a system that reduces the power loss and power theft due to illegal activities. This frame…
Techniques for Understanding Human Walking Motion
Example essay. Published: 5 April 2018
Introduction Multimedia is a term that collectively describes a variety of media content available in various forms of text, speech, audio, still images, video, animation, graphics, 3D models and …
Vulnerability Assessment and Penetration Testing Comparison
Example essay. Published: 5 April 2018
Jignesh C Doshi Bhushan Trivedi ABSTRACT Business using internet has grown drastically in past decade. Attacks on web application have increased. Web application security is a big challenge for any …
Smartphone Operating Systems: Evaluation & Enhancements
Example essay. Published: 5 April 2018
Muneer Ahmad Dar Javed Parvez Abstract—The increasing number of mobile operating systems that operates the small hand held devices called the Smartphone, has become integral part of our lives. Th…
Concepts and Research into Green Networking
Example essay. Published: 5 April 2018
Green Networking Abstract: Saving of excessive energy consumption is becoming a key concern in networking, because of theprobable economical benefits. These concerns, usually argued to as “green ne…
Load Balancing as an Optimization Problem: GSO Solution
Example essay. Published: 5 April 2018
METHODOLOGY INTRODUCTION In this chapter, we presented a novel methodology which considers load balancing as an optimization problem. A stochastic approach, Glowworm swarm optimization (GSO) is em…
Automatic Metadata Harvesting From Digital Content
Example essay. Published: 5 April 2018
MR. RUSHABH D. DOSHI, MR. GIRISH H MULCHANDANI Abstract: Metadata Extraction is one of the predominant research fields in information retrieval. Metadata is used to references information resource…
Proficient Key Tree Structure for Secure Dynamic Groups
Example essay. Published: 5 April 2018
Secure Group Communication ensures forward secrecy and backward secrecy of the data. It is the responsibility of the Group Center (GC) to disallow new members to have access to previous data called b…
Tip: If you can’t find what you are looking for, try shortening your search phrase. E.g. “CSR”