Computer Science Essays
The essays below were written by students to help you with your own studies. If you are looking for help with your essay then we offer a comprehensive writing service, provided by fully qualified academics in your field of study.
Computer Science Essays & Related Services
GPU Accelerated Parallel Heuristic for the 2D Knapsack Problem
Example essay. Published: 8 February 2020
A GPU accelerated parallel heuristic for the 2D knapsack problem with rectangular pieces Abstract: The 2D Knapsack Problem is one of the typical NP-hard problems in combinatori…
Deep Residual Learning for Image Recognition
Example essay. Published: 8 February 2020
Abstract Deeper neural networks are harder to prepare. We present a residual learning structure to facilitate the preparation of networks that are significantly deeper t…
Malware Attacks And Their Impacts
Example essay. Published: 8 February 2020
Abstract—With always evolving technologies many devices are emerging which has the ability to connect to other devices across the world using internet, it …
WiFi Eavesdropping: Attack Overview and Challenegs
Example essay. Published: 8 February 2020
Wifi Eavesdropping Abstract – Below report describes about Wi-Fi eavesdropping, then an explanation on how it works and then further tells about its latest and most famous …
Description of Trojan Attacks
Example essay. Published: 8 February 2020
Trojan Abstract—The amount of electronic devices associated with the internet is constantly on the rise, with increasing number of devices there is also an expansion in the …
The Melissa Virus: Origins and Impact
Example essay. Published: 8 February 2020
Abstract With the creation of ARPANET and its evolution into the internet we know today, malware has become a prevalent force affecting users globally. A simple, non-replicating and beni…
Cisco Systems Architecture: ERP and Web-enabled IT
Example essay. Published: 8 February 2020
Background Cisco System was founded in 1984 by two Stanford computer scientists, Sandy Lerner and Leonard Bosack1,2. The company was built on the vision of a “New World Network1….
Review of A Health Care Data Breach – Anthem 2015
Example essay. Published: 8 February 2020
Abstract The Anthem Data Breach was the largest of its kind at the time and was one of the first times that a cybersecurity incident was actively covered in mainstream media. This …
CI and CD in AWS Code Pipeline
Example essay. Published: 8 February 2020
Abstract Software firms are increasingly using and contributing to DevOps software. Many companies now use pipelines for better efficiency. To do this they need to unders…
Fifth Generation Mobile Networks: Challenges and Future Research
Example essay. Published: 8 February 2020
FIFTH GENERATION (5G) Mobile Networks ABSTRACT Fifth generation (5G) mobile network is not only the successor of its previous mobile networks (4G,3G,2G) but also the beginning …
Packet Capture and Intrusion Detection/Prevention Systems
Example essay. Published: 23 September 2019
Malicious Network Activity Report Event A client detected suspicious network activity, and feared a breach and this resulted in this cyber forensic investigation. In this malic…
AWS Solution for American Airlines
Example essay. Published: 23 September 2019
Executive Summary American Airlines are one of the famous airlines globally. Ever since a long time the airline is facing technical & maintenance issues. The airline adopted IBM cloud s…
Software Engineering & Software Process Models
Example essay. Published: 23 September 2019
Table of Contents INTRODUCTION CRITICAL REVIEW Traditional waterfall model Spiral model Rapid Application Development (RAD) model DISCUSSION…
Lifecycle and Problems of Ransomware Attacks
Example essay. Published: 23 September 2019
INTRODUCTION The internet is a very powerful and amazing tool for communication that is very important in our everyday lives. The fact that it is used in all spheres of our daily lives …
Classification of Food and Restaurant Images using CNNs
Example essay. Published: 23 September 2019
Classification of Food and Restaurant Images using CNNs Abstract Over the last decade, quantum leaps in deep learning and convolutional neural networks (CNNs) hav…
Proposal for a Smart Device that Determines the Duration of Kangaroo Care
Example essay. Published: 23 September 2019
Proposal for a Smart Device that Determines the Duration of Kangaroo Care Design of an alpha prototype kangaroo wrap incorporated with an automated device that fulfills a threefold obje…
Comparison Between ARM 7TDMI-S and Intel 80386DX Architecture
Example essay. Published: 23 September 2019
Table of Contents 1. ARM 7TDMI-S Architecture 1.1 Mapping from ARM 7TDMI-S to Von Neumann Architecture 2. Intel 80386DX Architecture 2.1 M…
Evaluation of Web Vulnerability Scanners Based on OWASP Benchmark
Example essay. Published: 23 September 2019
Evaluation of Web Vulnerability Scanners Based on OWASP Benchmark Abstract— The widespread adoption of web vulnerability scanners and their differences in effectiveness make it nec…
Principles and Applications of Laser Photogrammetry
Example essay. Published: 23 September 2019
Laser Photogrammetry Abstract This paper will be explaining the working principles and applications of Laser Photogrammetry. Photogrammetry is a Greek word, “pho” meaning l…
Advanced Routing Protocols for Ad-hoc Networks
Example essay. Published: 23 September 2019
Advanced routing protocols for Ad-hoc networks ABSTRACT Wireless mobile ad-hoc networks specially appointed systems are portrayed as systems with no p…
Tip: If you can’t find what you are looking for, try shortening your search phrase. E.g. “CSR”