flare CF-RAY: 3df7fa9e4a4a8f69-DME Computer Science Essays | Free Essays on Computer Science

Computer Science Essays

Search to find a specific computer science essay:

Back to Essays Index

Simulation Of Inmarsat C Channels Using Matlab

This report is all about Inmarsat-c channels its standards and simulation of C channels using matlab. The use of satellites for control, command, communications and...

Client Server Network Architecture Essay

Abstract This report is about the client server network architecture in which each computer or process on the network is either a client which is low...

Different lan Technologies

1. AIM To learn about different lan technologies and to design a network based on these lan technologies and to simulate these networks by a simulation...

Web Database Based Inventory System

Web database based inventory system is for management of items, orders, customers and payment. This system helps in Stock management, payment, and orders. This system...

Probing Using Zenmap Gui

Hackers traditionally follow a 5-step approach to seek out and destroy targeted hosts. The first step in performing an attack is to plan the attack...

Autonomous Tennis Ball Picker Robot

The basic purpose of this project is to provide opportunity and benefit to the sports players. They can do more practice in less time with...

Developing High Quality Multimedia Products

Introduction: The increasing development of computer science including the web design in parallel to the huge revelation of media has resulted to an increase in multimedia...

Characteristics of System Modules

Identify and report the names , purpose and characteristics of system modules such as mother board, power supply, CPU, Memory modules, storage devices, display devices,...

Nonfunctional Requirements with Data Mining

INTRODUCTION      The use of software has invaded our daily lives as it enable us to accomplish many tasks especially those which are associated in doing various...

Technical Writing in Computer Hardware Electronics

What is Technical Writing? Technical writing is a style of formal writing used in various fields as diverse as computer hardware and software, chemistry, aerospace industry,...

Techniques of Spoofing Attacks

Spoofing is sending fake address of a transmission to gain entry which is illegal into a secure system. It is creates fake responses or signals...

Developing Joined Tables for Data

4. Pre-Joined tables Consider creating tables of pre-joined data when two or three tables should join on a normal format by an application although the disadvantage...

Sinhala Text To Speech System Development | Research

The system, which I am developing, called SINHALA TEXT TO SPEECH is a one kind of fully research project. This documentation briefly describes the functionality...

Comparative Study AHP TOPSIS, and PROMETHEE-II of E-Commerce

A Comparative Study by AHP, TOPSIS, and PROMETHEE-II for the E-Commerce Abstract- Now-a-Days the multi criteria decision making methods (MCDM) are gaining importance to solve...

Research Paper: CalREN Systems

Introduction: The Corporation for Education Network Initiatives in California (CENIC) projected that they the state of California can achieve greater heights if they give it...

Online Web Application For Selling Computer Products

This project report represents the idea of the Online Shopping Website application for Computer products. In this project we are having primary goal of to...

Analysis of Weinberger's Concepts of Cyberwarfare

In June 2010, analysts from the antivirus software company VirusBlokAda examined a computer in Iran due to suspicion of malware activity. Lurking inside the...

Direct Manipulation Principles

PART - 1 DIRECT MANIPULATION PRINCIPLES Three Major Principles of Direct Manipulation Process based on selection, interrupted and visible performance of object Process based on selection is immediately...

Attendance System Using Fingerprint

The project entitled "ATTENDANCE SYSTEM USING FINGERPRINT" is to provide an authentified attendance system for Roots Industries Limited. This software provides various information, which is...

Data Storage for Art Gallery

Executive Summary This assignment is based upon an Art Gallery. Being the system analyst and designer the art gallery is hopeful I demonstrate professionalism and propose...

Passive and Active Security Attacks

Ans :- The difference between active and passive attacks in case of active attack involve the updating upon the data means the active attack access...

Attack Tree Model Analysis of Security Breaches

THE SUCCESS MISUSES of computer systems security breaches increased slightly in 2005, according to the FBI and the Computer Security Institute (CSI). Many security issues...

Software to Manage the Olympic Games

The Olympic and Paralympic Games are the world's largest peace-time event. The modern Olympic Games were first held in Greece in 1896 and since 1960,...

Strategies for Literature Review Searches

Detail an appropriate search strategy using relevant databases to identify an article on evidenced based practice in the healthcare setting Literature search has been a vital...

Cryptography and Steganography For Secure Communication

Combination of Cryptography and Steganography for secure communication is a tool that combines both Cryptography methods and Steganography techniques for secure communication. The application is...

The Trojan Horse Virus: An Overview

Another type of malware that is not technically a virus because there is usually no auto-replication is a Trojan horse program, which seems to be...

Implementing an Electronic Health Record System

Implementing Electronic Health Record System Based on HL7 RIM -Reusing the RIM Model Archetypes Nancy Mittal Abstract: It is difficult to exchange healthcare information between different HealthCare...

Importance of Discrete Mathematics in Computer Science

Computer science is the study of problems, problem solving and the solutions that come out of the problem solving process, B. Miller and D....

The Benefits of Java

JAVA INCLUDES A LIBRARY OF CLASSES AND INTERFACES: The Java platform includes an extensive class library so that programmers can use already existing classes, as...

Technological Considerations in Interface Design

Technological Considerations in Interface Design Physical characteristics of the device and device internal software affects the screen interface design. Graphics compatibility for Screen design must...

System Development Lifecycle

1.1. Introduction According to Allerano and Taverz (2012), the system development lifecycle has dominated the information technology (IT) arena for numerous decades and remains one...

Support Vector Machine Based Model

Support Vector Machine based model for Host Overload Detection in Clouds Abstract. Recently increased demand in computational power resulted in establishing large-scale data centers. The...

Real Time Video Processing and Object Detection on Android

Real Time Video Processing and Object Detection on Android Smartphone Abstract – As Smartphone is getting more potent, can do more superior stuffs that previous...

Performance Evaluation and Enhancement of Mobile Node: MIH

PERFORMANCE EVALUATION AND ENHANCEMENT OF MOBILE NODE USING MIH CHAPTER 4 NETWORK SIMULATOR 4.1 Introduction NS2 is associate open-source simulation tool that runs on Linux, it's a discreet...

Analysis of Types of Operating Systems

Task 1 1.0 Introduction An Operating System (OS) is software that manages computer hardware and software resources, and to provide public services for computer programs. The...