Computer Science Essays
The essays below were written by students to help you with your own studies. If you are looking for help with your essay then we offer a comprehensive writing service, provided by fully qualified academics in your field of study.
Computer Science Essays & Related Services
Assessing the Risk of a Data Situation and Recommending Appropriate Mitigations
Example essay. Published: 18 May 2020
ASSESSING THE RISK OF A DATA SITUATION AND RECOMMENDING APPROPRIATE MITIGATIONS CASE STUDY: TROUBLED FAMILIES PROGRAMME DATASET EXECUTIVE SUMMARY This r…
Convolution Neural Network to Construct Model of Text Recognition
Example essay. Published: 18 May 2020
Abstract Recognizing handwritten character is still problematic. So that is the reason neural network has ended up as essential technique for recognizing character now days. The purpose …
Applications of Self-Defending Networks
Example essay. Published: 18 May 2020
SELF-DEFENDING NETWORKS Self-Defending network approach is used to reduce or minimize the attacks on the system, improve the reliability and moreover creates autonomous systems which act…
Car Evaluation Using Machine Learning
Example essay. Published: 8 February 2020
Abstract. Cars are essentially part of our regular day to day life. There are various kind of cars produced by different manufacturers; subsequently the buyers has a decision to make…
Software Defined Networking: Contrasts with Conventional Networking
Example essay. Published: 8 February 2020
Table of Contents Assignment Cover Sheet Abstract Introduction Purpose Description Pros and Cons of SDN Product 1: Open Network Oper…
Passive Reconnaissance on Website
Example essay. Published: 8 February 2020
Table of Contents INTRODUCTION What is Passive Reconnaissance? ABOUT THE ORGANIZATION: “THE NAIT” Why NAIT TARGETED ASSETS FOR ATT…
Use of CGI Renderer “Renderman” in Disney-Pixar Films
Example essay. Published: 8 February 2020
Making a Disney-Pixar movie has been made easier thanks to Renderman and the CGI animation capabilities it allows when animator artists can use this renderer technology to create 3D characters that come to life and movies full of detail….
Comparison of Triple DES and RC4
Example essay. Published: 8 February 2020
Triple DES, aka “3DES” is a cryptography method based on the Data Encryption Standard (DES). DES is a block cipher designed to encrypt and decrypt data blocks that contain 64 bits by utilizing a 64-bit key. …
Vulnerability Impact of SQL Injection
Example essay. Published: 8 February 2020
SQL INJECTION INTRODUCTION Due to more advancements and use of languages like ASP.NET, Javascripts and many more, all data and content of site are being stored into the cl…
Strategies for Improving Failure Protection of 5G Networks
Example essay. Published: 8 February 2020
Abstract This paper researches about reducing the complexity and improving the failure protection of 5G networks by using segment routing in IP infrastructure. Two Scenarios are simulate…
Planning, Development and Testing Internetwork Design
Example essay. Published: 8 February 2020
Table of Contents Contents Table of Contents Aims of the Project Problem Analysis Requirements & Solutions WAN requirements: Gen…
Applications of BI Analytics and Data Mining
Example essay. Published: 8 February 2020
INTRODUCTION The world of information and technology changes within a blink of eyes. There are no business organizations that are unaware of this rapid changing autonomous technology. Th…
Online Learning Algorithms in Varied Bandit Scenarios
Example essay. Published: 8 February 2020
1. ABSTRACT In this paper, we present a discussion on the performance of non-stochastic/adversarial-setting algorithms in 2 special scenarios: W…
Handover Problems and Solutions for 5G Communication Technology
Example essay. Published: 8 February 2020
Introduction The continuously increasing demand of wireless communications impels the fast development of the next generation wireless communication technology. The 5G communication tec…
Computer Networks – OS Theory and Concepts
Example essay. Published: 8 February 2020
1.OS Abstraction and process management (a) Hardware Abstraction Layer Hardware Abstraction Layer (HAL) is a programming layer that allows operating systems (referred to as OS h…
Time-Series Data Mining of Minimum Design Height for River Bridge Deck Using Seasonal Trend Decomposition
Example essay. Published: 8 February 2020
Abstract. Using the traditional calculation of minimum design height (MDH) could not provide the effective decision support for engineers under complex situations. This research proposes a time-s…
Routing in Mobile Ad- Hoc Networks
Example essay. Published: 8 February 2020
Abstract -The purpose of this research is to describe what mobile ad-hoc networks do and when did they showed up, its effectiveness in technology, types of mobile ad-hoc network protocols …
Lingo Learning Final Report
Example essay. Published: 8 February 2020
1.1 Abstract Young bilingual children are supported in the early periods of their education by EAL teaching assistants…
Forecasting Customer Lifetime Value With Machine Learning
Example essay. Published: 8 February 2020
A UKessays.com sample study using An Empirical Machine Learning Approach in Forecasting Customer Lifetime Value….
Security Challenges for Next Generation WiFi
Example essay. Published: 8 February 2020
Abstract Wireless networks are ubiquitous in today’s world and are gaining popularity at a tremendous pace, as they provide greater flexibility, portability, and mobility than thei…
Tip: If you can’t find what you are looking for, try shortening your search phrase. E.g. “CSR”