Computer Science Essays
The essays below were written by students to help you with your own studies. If you are looking for help with your essay then we offer a comprehensive writing service, provided by fully qualified academics in your field of study.
Computer Science Essays & Related Services
Performance Evaluation and Enhancement of Mobile Node: MIH
Example essay. Published: 27 September 2017
PERFORMANCE EVALUATION AND ENHANCEMENT OF MOBILE NODE USING MIH CHAPTER 4 NETWORK SIMULATOR 4.1 Introduction NS2 is associate open-source simulation tool that runs on Linux, it’s a discreet eve…
Analysis of Types of Operating Systems
Example essay. Published: 27 September 2017
Task 1 1.0 Introduction An Operating System (OS) is software that manages computer hardware and software resources, and to provide public services for computer programs. The operating system is an im…
Low-Power Folded Tree Architecture for DSP Applications
Example essay. Published: 27 September 2017
Low-Power Folded Tree Architecture for DSP applications Abstract— Wireless communication exhibits the highest energy consumption in wireless sensor network (WSN) nodes. Due to their limited energy …
Literature Review on Online Gaming
Example essay. Published: 27 September 2017
The purpose of this study is to map out and see the relationship between MMORPG game player personalities and style based on player type theory and game players’ thinking preferences in order to in…
Development of Computer Technology
Example essay. Published: 27 September 2017
Nowadays we can hardly see people live without either a desktop computer, a laptop or even a tablet. As we are moving towards a technology free-world era, our lives are literally revolve around techn…
Characteristics of Real Time Systems
Example essay. Published: 27 September 2017
In this paper we describe the distinguished characteristics of real time systems which can be expressed as a function of time….
Are People Becoming Too Reliant on Technology?
Example essay. Published: 27 September 2017
Smart phones, Facebook, Netflix, YouTube…. The world is living in an era of constant dynamic technological revolutions. Information Technology has become inextricable from everyday life. Informatio…
Development of E-Recruitment Software
Example essay. Published: 27 September 2017
3.7 Advantages & Disadvantages of E-Recruitment There are many benefits both to the employers and the job seekers but the not also free from a few shortcomings. Some of the advantages and the di…
3 Dimensional Modelling in Architectural Design
Example essay. Published: 20 September 2017
Computer software technology is an important part of computer technology, because computer is made up of computer software, computer software technology is one of the most concerned area in the compu…
Methods of Analyzing Data in Data Warehouse
Example essay. Published: 29 August 2017
Data Mining methods for Customer Relationaship Management Abstract-Data warehousing and data mining, applied to Customer Relationship Management (CRM), are a relatively fresh sector for organizati…
Comparing and Contrast Jean Bartik and Margaret Hamilton
Example essay. Published: 29 August 2017
Software engineering; hearing this term brings to mind words corresponding to innovating, analyzing complex problems, designing software, and maintenance of programs. People picture a stubborn n…
Perceived User Experience of Interactive Animated Transition
Example essay. Published: 29 August 2017
Perceived User Experience of Interactive Animated Transitions in Mobile User Interfaces and Visualisation Animated transitions hold an important part of graphical user interface design practice. …
Programming Languages for Data Analysis
Example essay. Published: 29 August 2017
R and Python for Data Analysis Abstract This paper discusses the comparison between the popular programming languages for Data analysis. Although there are plenty of choices in programming languag…
Data Vault in Data Warehouse: Advantages and Disadvantages
Example essay. Published: 29 August 2017
Applications, Implementation, Merits and Limitations of Data vault in Data warehouse Abstract– Business companies face many challenges in exploiting and analyzing data held in diverse source…
The User Experience in Mobile Computing
Example essay. Published: 29 August 2017
ABSTRACT Mobile phones have become a necessity for almost every person throughout the world. Cell phones have become almost a status symbol in addition to the convenience and security that comes fro…
Increasing Visual Comfort with Blue Light in Video
Example essay. Published: 29 August 2017
Adjusting the blue light of the video to increase the visual comfort belong to the changed of light environment Abstract: This paper is an approached method adjusting the blue light of the video to…
Implementing a Client-to-client Communication System
Example essay. Published: 29 August 2017
Abstract Due to people, behaviour over the social networking and peer-peer needs for the online chatting and sharing the information, file etc…, Chat Applications had acquired great importance…
Data Mining Analysis in Health Department
Example essay. Published: 29 August 2017
Data mining has been used intensively and appreciably in lots of fields of life. Likewise in healthcare, data mining is becoming more and more popular each day. Its extensive applications can greatl…
Body Sensor Network: A Modern Survey & Performance Study
Example essay. Published: 29 August 2017
ABSTRACT As because of modern emerging technologies, low power integrated circuits and wireless communication has enabled a new generation of sensors network. The incorporation of these sensors netw…
Risk-based Access Control Model for the Internet of Things
Example essay. Published: 29 August 2017
this paper proposes a risk-based access control model for IoT technology that takes into account real-time data information request for IoT devices and gives dynamic feedback. The proposed model uses IoT environment features to estimate the security risk associated with each access request using user context, resource sensitivity, action severity and risk history as inputs for security risk estimation algorithm that is responsible for access decision. …
Tip: If you can’t find what you are looking for, try shortening your search phrase. E.g. “CSR”