Computer Science Essays
The essays below were written by students to help you with your own studies. If you are looking for help with your essay then we offer a comprehensive writing service, provided by fully qualified academics in your field of study.
Computer Science Essays & Related Services
Computer Fraud
Example essay. Published: 9 December 2020
Task 1 (6.c)Importance and Effectiveness of Legal Regulation in Computer Fraud Introduction In today’s world due to the advancement in the modern technology there has been always problem arising…
Strategies for Netflix’s Distribution
Example essay. Published: 3 November 2020
This essay explores the strategies that Netflix use for distribution, considering other media platforms including YouTube and KanKan….
Evaluation of Server Virtualization Infrastructure
Example essay. Published: 3 November 2020
The main objective of this report is to present the current server infrastructure and show that how to implement application and server virtualization platform for ICA.COM domain. Also it will present the suitable type of hypervisor for ICA.COM….
Literature Review on the Capabilities of the GSM based Control System
Example essay. Published: 3 November 2020
Using GSM networks, a control system has been proposed that will act as an embedded system which can monitor and control appliances and other devices locally using built-in input and output peripherals…
Time-Sensitive Networking for Real-Time Ethernet Communication
Example essay. Published: 3 November 2020
This paper introduces the Time Sensitive Networking (TSN) and explains how TSN provides deterministic communication for Ethernet networks….
An Authentication Mechanism That Cannot Be Bypassed or Tampered
Example essay. Published: 3 November 2020
In this report, we review one of the significant design flaws through which security violations occurred, which is using an authentication mechanism that cannot be bypassed or tampered with…
Benefits of Heterogenous Computing
Example essay. Published: 3 November 2020
This paper presents some of the primary software and hardware challenges faced in heterogeneous computing systems. This paper also presents some of the key reasons why heterogeneous computing is the future…
Leaky Bucket Algorithm to Control Transmission Rates
Example essay. Published: 3 November 2020
In this paper, the Leaky Bucket Algorithm is used to control transmission rate in a system. It tends to be used to monitor data transmissions and packets(data) to define limits on bandwidth….
Robust Training of Deep Neural Networks with Extremely Noisy Labels
Example essay. Published: 3 November 2020
This paper introduces and investigates a co-teaching machine learning strategy to increase the robustness of a deep neural network to training datasets with noisy labels. The motivation for this investigation stems from the fact that…
A Comparison of Mesh and Star Networks
Example essay. Published: 3 November 2020
A comparison of Mesh and Star networks, looking at the advantages and disadvantages of both including redundancy and costs….
Applications of Metamorphic Testing
Example essay. Published: 3 November 2020
In this paper, the concepts of metamorphic testing (MT) and its effectiveness in solving the challenges in software testing are presented….
Agile Software Development
Example essay. Published: 3 November 2020
Agile development is a powerful approach to software development that was adopted in the 1990s to improve the process. Agile improves many aspects of software development, including costs, scope, and schedule….
LoRaWAN Fog Computing Based Architecture for IoT Enabled Smart Campus Applications
Example essay. Published: 18 May 2020
LoRaWAN Fog Computing Based Architecture for IoT Enabled Smart Campus Applications Abstract: — It is estimated that one trillion IoT devices will be deployed b…
Emotion Detection using Deep Learning
Example essay. Published: 18 May 2020
Emotion Detection using Deep Learning Project Description Face expression recognition has become an interesting area of research in computer vision and one of the most successfu…
IoT Traffic Prediction Using Multi-step Ahead Prediction with Neural Network
Example essay. Published: 18 May 2020
IoT traffic prediction using multi-step ahead prediction with neural network Abstract-The Internet of Things (IoT) is basically a network of interconnected devices, like sensors and sma…
Spear Phishing: Statistics, Past Incidences and Defense Mechanisms
Example essay. Published: 18 May 2020
Spear Phishing Abstract—Spear phishing is an attack which is very useful for an attacker to gain access in an organization .There are numerous reasons why spear phishing is so effective. F…
Brain Tumor Segmentation Using Convolution Neural Networks
Example essay. Published: 18 May 2020
Abstract/Project Description Brain tumors treatment requires to know how extent the tumor was expanded. Without ionizing radiation magnetic resonance imaging(MRI) technique is one of the…
Response for Smurf DDOS Attack
Example essay. Published: 18 May 2020
Part 3A: Immediate steps to be taken: In case of a Smurf DDoS attack in the database of the company, the immediate response will be to detach all the devices which are connected…
Deep Convolutional Neural Models for Image Quality Prediction
Example essay. Published: 18 May 2020
Deep Convolutional Neural Models for Image Quality Prediction Introduction: The vital role played by images in human life is manifested by the proverb “A picture is worth thousand …
Detection of Hate Speech in Social Media
Example essay. Published: 18 May 2020
Detection of Hate Speech on Social Media Abstract The objective our research to detect hate speech on social media. Every day huge amount of data…
Tip: If you can’t find what you are looking for, try shortening your search phrase. E.g. “CSR”