Example Computer Science Essays (Page 6)
Applications and Challenges of Low Latency Networks
Example essay. Last modified: 8th Feb 2020
Introduction:
ABSTRACT
Networking development and research have historically focused on increasing network throughput and path resource utilization. And that have particularly helped bulk applications...
Evaluation of Amazon's Cloud Computing
Example essay. Last modified: 8th Feb 2020
Introduction:
Table of Contents
Summary
Introduction
Category 1: Compute
a. Amazon Elastic Compute Cloud (Amazon EC2)
b. Amazon Elastic Load B...
GPU Accelerated Parallel Heuristic for the 2D Knapsack Problem
Example essay. Last modified: 8th Feb 2020
Introduction:
A GPU accelerated parallel heuristic for
the 2D knapsack problem with rectangular pieces
Abstract: The 2D Knapsack Problem is one of the typical NP-hard problems in combinatori...
Deep Residual Learning for Image Recognition
Example essay. Last modified: 8th Feb 2020
Introduction:
Abstract
Deeper neural networks are harder to prepare. We present a residual learning structure to facilitate the preparation of networks that are significantly deeper t...
Malware Attacks And Their Impacts
Example essay. Last modified: 8th Feb 2020
Introduction:
Abstract—With always evolving technologies many devices are emerging which has the ability to connect to other devices across the world using internet, it ...
WiFi Eavesdropping: Attack Overview and Challenegs
Example essay. Last modified: 8th Feb 2020
Introduction:
Wifi Eavesdropping
Abstract – Below report describes about Wi-Fi eavesdropping, then an explanation on how it works and then further tells about its latest and most famous ...
Description of Trojan Attacks
Example essay. Last modified: 8th Feb 2020
Introduction:
Trojan
Abstract—The amount of electronic devices associated with the internet is constantly on the rise, with increasing number of devices there is also an expansion in the ...
The Melissa Virus: Origins and Impact
Example essay. Last modified: 8th Feb 2020
Introduction:
Abstract
With the creation of ARPANET and its evolution into the internet we know today, malware has become a prevalent force affecting users globally. A simple, non-replicating and beni...
Cisco Systems Architecture: ERP and Web-enabled IT
Example essay. Last modified: 8th Feb 2020
Introduction:
Background
Cisco System was founded in 1984 by two Stanford computer scientists, Sandy Lerner and Leonard Bosack1,2. The company was built on the vision of a “New World Network1....
Review of A Health Care Data Breach – Anthem 2015
Example essay. Last modified: 8th Feb 2020
Introduction:
Abstract
The Anthem Data Breach was the largest of its kind at the time and was one of the first times that a cybersecurity incident was actively covered in mainstream media. This ...
CI and CD in AWS Code Pipeline
Example essay. Last modified: 8th Feb 2020
Introduction:
Abstract
Software firms are increasingly using and contributing to DevOps software. Many companies now use pipelines for better efficiency. To do this they need to unders...
Fifth Generation Mobile Networks: Challenges and Future Research
Example essay. Last modified: 8th Feb 2020
Introduction:
FIFTH GENERATION (5G) Mobile Networks
ABSTRACT
Fifth generation (5G) mobile network is not only the successor of its previous mobile networks (4G,3G,2G) but also the beginning ...
Ways of Improper Access Control
Example essay. Last modified: 8th Feb 2020
Introduction:
Abstract—This paper defines about the different ways of improper accessing of web servers, application servers and databases and the various ways of avoiding the...
Multicast Protocols: Challenges and Future Research
Example essay. Last modified: 8th Feb 2020
Introduction:
ABSTRACT
Multicast in terms of IP is a method of transferring Internet Protocol datagrams to a group of involved receivers in a single broadcast. The IP specific for...
Anti -Reverse Engineering Techniques employed by Malware
Example essay. Last modified: 8th Feb 2020
Introduction:
Abstract— In Modern days, analyzing the malware samples through reverse engineering methodologies became more difficult because the malware authors are using Anti-reverse engineerin...
Standard Operating Procedure for Pen Testing
Example essay. Last modified: 8th Feb 2020
Introduction:
1.0 Introduction
The pen testing methodologies it is a very important thing for the organization because they test of the operational security of physical loc...
Cloud Computing: Security and Infrastructure
Example essay. Last modified: 8th Feb 2020
Introduction:
Table of Contents
Introduction
Cloud security and infrastructure
Application and impact of the research area
Large Businesses
Small Businesses
...
Managing Virtual Environments: Server Comparison
Example essay. Last modified: 8th Feb 2020
Introduction:
Table of Contents
Physical Server and Specifications
Vendor Selection
Hypervisor Comparison
VMware 6.5
Hyper-V 2016
VCenter deployment
...
Applying User-centred Design to Modern Software Products
Example essay. Last modified: 8th Feb 2020
Introduction:
Introduction
The following report evaluates “Applying user-centred design to modern software products” based on ISO 9241-210 standard. “ISO 9241-210 provides a set of requirements ...
Prediction of Coronary Heart Disease using Supervised Machine Learning Algorithms
Example essay. Last modified: 8th Feb 2020
Introduction:
Abstract — The field of medical analysis is often referred to be an invaluable source of rich data yet with poor insights and medical outcomes. Coronary Heart Disease (CHD) is one of the major ...
Supervised Machine Learning Algorithms: Classification Techniques
Example essay. Last modified: 8th Feb 2020
Introduction:
Abstract: Supervised machine learning is a function for algorithms that has purpose to visibly provided instances to produce general hypotheses, which formerly make predictions a...
Hardware Techniques to Mitigate Fault Attacks
Example essay. Last modified: 8th Feb 2020
Introduction:
Abstract— An act which is to a deliberate control of the incorporated circuit or its state, with an aim to incite a mistake inside the coordinated circuit with the end goal to move the gadget i...
Overview of Object Oriented Programming
Example essay. Last modified: 8th Feb 2020
Introduction:
Object-oriented programming is a new way of approaching the job of programming. Programming over the years has evolved to accommodate the increased complexity of programs, it has been become a wi...
Will Quantum Computing be a Threat to our Cybersecurity?
Example essay. Last modified: 8th Feb 2020
Introduction:
The smaller computers get, the more powerful they become. Today’s smartphones are more powerful than military computers created 50 years ago. Regardless of this, there are still many problems o...
Text-based Age and Gender Prediction for Cyberbullying Detection and Online Safety Monitoring
Example essay. Last modified: 8th Feb 2020
Introduction: ...
Our Essay Services
At UKEssays.ae we provide a range of essay writing services to help you with your studies: