Computer Sciences Dissertations

Search to find a specific computer sciences dissertation.

Back to Dissertations Index

The Grid Computing

Computational Grids combine heterogeneous, distributed resources across geographical and organisational boundaries. ...

Click here to read more

The Role Of Technological Revolution

The role of technological revolution has touched every aspect of people's lives from shopping to banking. ...

Click here to read more

Human Resource Management System

The main aim of is HUMAN RESOURCE MANAGEMENT SYSTEM is automating the resume processing for organization that is applied by the candidates. ...

Click here to read more

Modes Of Enquiry

The following discussions will cover the means on which information is retrieved, construed and consequently interpreted in the modern organisation. ...

Click here to read more

Effective Learning Tool For Education

The aim of this project is to implement an effective discussion tool by using six thinking hats model as the mechanism. ...

Click here to read more

Private Branch Exchange System

Private branch exchange system (PBXs) operates as a connection within private organizations usually a business. ...

Click here to read more

Evolution Of Smart Homes

Smart homes, the next gigantic leap in the field of home automation, have become an emerging research field in last few decades ...

Click here to read more

Optical Character Recognition

Optical Character Recognition (OCR) is the mechanical or electronic interpretation, reading of images of handwritten, typewritten or printed text (usually captured by a scanner or tablet) into machine-editable text ...

Click here to read more

Evolution Of Wimax Internet And Downlink

For the past few years, demands for high-speed internet access and multimedia service for residential and business customers has increased greatly ...

Click here to read more

Encodedecode Demo

Encodedecode demo code dissertation for advanced users. Texas Instruments Inc 2005. ...

Click here to read more

Internet Security

During the last few decades, we have seen the dramatically rise of the Internet and its applications to the point which they have become a critical part of our lives. ...

Click here to read more

Angle Of Vision

The research question of my study is Does the change in the angle of vision (from straight to peripheral) effect the time taken to detect motion and color in humans? ...

Click here to read more

American Productivity And Quality Center

The accumulation and use of knowledge is the foundation of human evolution and growth since its very beginning; ...

Click here to read more

Mobile Ad Hoc Network

Mobile Ad Hoc Network (MANET) is a wireless network capable of autonomous operation. ...

Click here to read more

Mobile Messaging System Betters Management Student Interaction

Mobiles are one of the most versatileelectronicsin the present scenario. ...

Click here to read more

Incident Handling With Cloud Computing Security

Cloud computing provides people the way to share distributed resources and services that belong to different organizations or sites. ...

Click here to read more

International Diploma In Computer Studies

This is an assignment for Networking Assignment that is an elective subject in international diploma in computer studies (IDCS). ...

Click here to read more

The Form Of Choice

This form of expression can be performed through the ballot, or by any other electoral schemes. ...

Click here to read more

Video Streaming System

The adoption of technological products like digital television and video conferencing has made video streaming an active research area. ...

Click here to read more

Capacities Of Memories And Advance Engineering Techniques

The improvement in capabilities of computation of processors, capacities of memories and advance engineering techniques are facilitating a new generation of low cost sensor and actuator nodes ...

Click here to read more

The Security Management

Security management is the combination of hardware, software, and services that normalizes, aggregates, correlates, and visualizes data from disparate security products. ...

Click here to read more

The Modern Assembler

Typically a modern assembler creates object code by translating assembly instruction mnemonics into opcodes, and by resolving symbolic names for memory locations and other entities. ...

Click here to read more

According To The Web Dictionary

Marketing is the most important of the hub disciplines of booming management today. ...

Click here to read more

Computer Forensic Investigation

Computer forensics involves obtaining and analyzing digital information for figuring out what happened, when it happened, how it happened and who was involved. ...

Click here to read more

Aim Of Our Project

The ultimate aim of our project is to provide the design and development for an reliable internet service application which workable on the WAP enabled wireless handheld devices like mobile phone ,PDA(personal digital assistant) but mobile phone will focused mainly on this ...

Click here to read more

Atm

Firstly is to provide an objective analysis of available biometric technologies, to identify their strengths and weaknesses and to investigate a broad range of application scenario in where biometric techniques are better than traditional recognition and verification method. ...

Click here to read more

Reutilizados Em Diferentes Contextos

Objetos de Aprendizagem (OAs) sao recursos educacionais que podem ser reutilizados em diferentes contextos, promovendo economia de tempo e de custo na producao de cursos. ...

Click here to read more

A Requirements Engineering Analysis Framework

This chapter describes a requirements engineering analysis framework which focuses on two aspects of requirements engineering: the product and the process. ...

Click here to read more

Password Management Security System

Passwords management is an important aspect of computer security, it’s the front line of protection for user terminals and it is by far the most common user authentication method within the largest multinational organizations. ...

Click here to read more

Clustering Methods

The data mining has emerged as a powerful tool to extract knowledge from huge databases. ...

Click here to read more

Visual Cryptography Provides

Visual cryptography provides secured digital transmission which is used only for one time. ...

Click here to read more

Todays Advertising World

In today's advertising world , web sites owned the most significant part and so many business transactions are done with internet and without the direct contact of two parties. ...

Click here to read more

Social Networking And Its Effects

Today, the most popular and common topic of many discussions are social networking websites. ...

Click here to read more

Basic Html And Javascript Tutorial

A full summary of basic html and javascript dissertation ...

Click here to read more

The Success From Various Architectures

This research has been carried out in order to identify, to what extent the implementation of a data warehouse will impact on an organization and which will be the success from various architectures ...

Click here to read more

Note: All of the dissertations in this section were written by students and then submitted to us to publish and help others. They are not the work of our own expert dissertation writers; we never publish the work that we produce for our customers. Thanks to all of the students who have submitted their dissertations to us. You should not hand in these dissertations as your own. We do not condone plagiarism!