1842 reviews

Computer Science Essays

The essays below were written by students to help you with your own studies. If you are looking for help with your essay then we offer a comprehensive writing service, provided by fully qualified academics in your field of study.

Essay Writing Service

Example Computer Science Essays (Page 3)

Improving Resource Allocation for Data Center Overbooking
Example essay. Last modified: 26th Jul 2021
Introduction: Overbooking becomes feasible because user applications tend to overestimate their resources and requirements, that tends to utilize only a fraction of the allocated resources. Overbooking has to be carefully planned in order not to impact application performance. Resource utilization and Data centres utilization can be used in this overbooking scheduler. Data send can send from sources to destination via node....

Reversible Data Hiding on Color Images
Example essay. Last modified: 23rd Jul 2021
Introduction: Data embedding is done by processing these selected coefficients of the modified subband histograms. We present a high capacity reversible watermarking scheme using the technique of difference & average value coefficients of image blocks by using the tool Matlab. This scheme takes advantage of difference & average value coefficients, which permits low distortion between the watermarked image and the original one caused by the LSB bit replacement operations of the watermarking technique specifically in the embedding process....

The Types and Techniques of Steganography
Example essay. Last modified: 21st Jul 2021
Introduction: This document covers various concepts in Steganography, A brief history of Steganography and introducing few types of techniques available today in Steganography. ...

Characteristics and Advantages of Database Approach
Example essay. Last modified: 20th Jul 2021
Introduction: Describe the main characteristics of the database approach and contrast it with the file-based approach. Analyze the key issues and application of databases within organizational environments....

Study on Different Types of Software
Example essay. Last modified: 20th Jul 2021
Introduction: Software can be divided into three major categories according to popularity: application software, system software, and web applications. Within each category there are dozens, if not hundreds, of specialized software types, but for the purpose of this study, we will concentrate on the most popular software type of each category....

Steganography: Uses, Methods, Tools and Examples
Example essay. Last modified: 19th Jul 2021
Introduction: This paper talks about steganography, steganography is the art or hiding data within a medium without letting others to know about that data is existing. I will go through an introduction about it , then explaining the background of it and more information about the uses of this technique , and how organization use it in their own good....

Use of CGI Renderer “Renderman” in Disney-Pixar Films
Example essay. Last modified: 9th Jul 2021
Introduction: Making a Disney-Pixar movie has been made easier thanks to Renderman and the CGI animation capabilities it allows when animator artists can use this renderer technology to create 3D characters that come to life and movies full of detail....

Non-linear Generalized Companding Scheme to Reduce PAPR
Example essay. Last modified: 9th Jul 2021
Introduction: In this paper a novel non-linear generalized companding scheme called “Quadrilateral Companding Transform (QCT)” has been proposed to reduce the PAPR of OFDM signal....

Delay Aware Multipath Switching Zone Traversal (MSZT)
Example essay. Last modified: 9th Jul 2021
Introduction: In this paper Multipath Switching Zone Traversal (MSZT) routing approach has been proposed in order to reduce average delay....

Authentication Mechanism for Fast Handover Proxy Mobile IPv6 Networks
Example essay. Last modified: 9th Jul 2021
Introduction: This paper performs a Bicasting scheme to reduce packet loss, use the piggyback technique to reduce the signalling overhead, also provides Authentication mechanism for protecting valid user from attacks in PMIPv6 networks....

Qualitative And Quantitative Research Methods
Example essay. Last modified: 24th Jun 2021
Introduction: This paper is to review and discuss the methods of qualitative research with the aim of identifying their suitability for research in Information Systems. Based on the limitations and benefits of the individual research methods, a framework for applying such methods will be presented to be considered as a vantage point in applying such methods scientifically....

Leaky Bucket Algorithm to Control Transmission Rates
Example essay. Last modified: 7th Jun 2021
Introduction: In this paper, the Leaky Bucket Algorithm is used to control transmission rate in a system. It tends to be used to monitor data transmissions and packets(data) to define limits on bandwidth....

Evaluation of Server Virtualization Infrastructure
Example essay. Last modified: 7th Jun 2021
Introduction: The main objective of this report is to present the current server infrastructure and show that how to implement application and server virtualization platform for ICA.COM domain. Also it will present the suitable type of hypervisor for ICA.COM....

Principles of System Development Life Cycle (SDLC)
Example essay. Last modified: 11th May 2021
Introduction: The software development life cycle (SDLC) is a methodology used to determine the steps involved in producing software. It involves the preparation of the phases involved in developing software from scratch....

Network Issues and how they affect gameplay and interactivity
Example essay. Last modified: 19th Apr 2021
Introduction: Networks allow user’s clients to communicate by sending bits of data through the internet of the form of packets, these will then build on top of the internet protocol, and this in terms means that if a packet sent using UDP or TCP a specific IP address then receives the packet. ...

Manuscript Management System (MMS) Integration with Social Media
Example essay. Last modified: 19th Apr 2021
Introduction: Manuscript Management system (MMS) – developed by J-Technologies India Limited, made it simple for the authors to share their research papers to their social network and professional network in a jiffy....

Reachability Queries and Data Mining
Example essay. Last modified: 13th Apr 2021
Introduction: EVALUATING PATH QUERIES OVER FREQUENTLY UPDATED ROUTE COLLECTION...

Literature review about data warehouse
Example essay. Last modified: 23rd Mar 2021
Introduction: A literature review about data warehouse, OLAP MDDB and data mining concept. We reviewed concept, characteristics, design and implementation approach of each above mentioned technology to identify a suitable data warehouse framework....

Computer Fraud
Example essay. Last modified: 9th Dec 2020
Introduction: Task 1 (6.c)Importance and Effectiveness of Legal Regulation in Computer Fraud Introduction In today’s world due to the advancement in the modern technology there has been always problem arising...

An Authentication Mechanism That Cannot Be Bypassed or Tampered
Example essay. Last modified: 3rd Nov 2020
Introduction: In this report, we review one of the significant design flaws through which security violations occurred, which is using an authentication mechanism that cannot be bypassed or tampered with...

Benefits of Heterogenous Computing
Example essay. Last modified: 3rd Nov 2020
Introduction: This paper presents some of the primary software and hardware challenges faced in heterogeneous computing systems. This paper also presents some of the key reasons why heterogeneous computing is the future...

Robust Training of Deep Neural Networks with Extremely Noisy Labels
Example essay. Last modified: 3rd Nov 2020
Introduction: This paper introduces and investigates a co-teaching machine learning strategy to increase the robustness of a deep neural network to training datasets with noisy labels. The motivation for this investigation stems from the fact that...

Strategies for Netflix's Distribution
Example essay. Last modified: 3rd Nov 2020
Introduction: This essay explores the strategies that Netflix use for distribution, considering other media platforms including YouTube and KanKan....

Literature Review on the Capabilities of the GSM based Control System
Example essay. Last modified: 3rd Nov 2020
Introduction: Using GSM networks, a control system has been proposed that will act as an embedded system which can monitor and control appliances and other devices locally using built-in input and output peripherals...

Cellular Networks and Wireless Data Applications
Example essay. Last modified: 1st Jun 2020
Introduction: Introduction Computers and computer networks have changed the way in which we live, run our lives, communicate with each other and the way we work and produce what makes every commercial organisation ...

Get Academic Help Today!

Encrypted with a 256-bit secure payment provider