Computer Fraud
9th Dec 2020
Introduction: Task 1
(6.c)Importance and Effectiveness of Legal Regulation in Computer Fraud
Introduction
In today’s world due to the advancement in the modern technology there has been always problem arising...
Computer Science Essays
The essays below were written by students to help you with your own studies. If you are looking for help with your essay then we offer a comprehensive writing service provided by fully qualified academics in your field of study.
Essay Writing ServiceSearch for more Computer Science Essays
Tip: If you can't find what you are looking for, try shortening your search phrase. E.g. "CSR"
Computer Science Essays Page 1
An Authentication Mechanism That Cannot Be Bypassed or Tampered
3rd Nov 2020
Introduction: In this report, we review one of the significant design flaws through which security violations occurred, which is using an authentication mechanism that cannot be bypassed or tampered with...
Benefits of Heterogenous Computing
3rd Nov 2020
Introduction: This paper presents some of the primary software and hardware challenges faced in heterogeneous computing systems. This paper also presents some of the key reasons why heterogeneous computing is the future...
Robust Training of Deep Neural Networks with Extremely Noisy Labels
3rd Nov 2020
Introduction: This paper introduces and investigates a co-teaching machine learning strategy to increase the robustness of a deep neural network to training datasets with noisy labels. The motivation for this investigation stems from the fact that...
Strategies for Netflix's Distribution
3rd Nov 2020
Introduction: This essay explores the strategies that Netflix use for distribution, considering other media platforms including YouTube and KanKan....
Literature Review on the Capabilities of the GSM based Control System
3rd Nov 2020
Introduction: Using GSM networks, a control system has been proposed that will act as an embedded system which can monitor and control appliances and other devices locally using built-in input and output peripherals...
Cellular Networks and Wireless Data Applications
1st Jun 2020
Introduction: Introduction
Computers and computer networks have changed the way in which we live, run our lives, communicate with each other and the way we work and produce what makes every commercial organisation ...
Applications of Self-Defending Networks
18th May 2020
Introduction:
SELF-DEFENDING NETWORKS
Self-Defending network approach is used to reduce or minimize the attacks on the system, improve the reliability and moreover creates autonomous systems which act...
Convolution Neural Network to Construct Model of Text Recognition
18th May 2020
Introduction:
Abstract
Recognizing handwritten character is still problematic. So that is the reason neural network has ended up as essential technique for recognizing character now days. The purpose ...
Assessing the Risk of a Data Situation and Recommending Appropriate Mitigations
18th May 2020
Introduction:
ASSESSING THE RISK OF A DATA SITUATION AND RECOMMENDING APPROPRIATE MITIGATIONS
CASE STUDY: TROUBLED FAMILIES PROGRAMME DATASET
EXECUTIVE SUMMARY
This r...
Analysis Undergraduate Student Performance using Feature Selection Techniques on Classification Algorithms
18th May 2020
Introduction:
Analysis Undergraduate Student Performance using Feature Selection Techniques on Classification Algorithms
Abstract— Educational Data Mining employed in various field which include va...
Using Data Mining Techniques in Weather Forecasting
18th May 2020
Introduction:
Abstract
It cannot be denied that weather forecasting, i.e. predicting weather behaviour, is a very challenging task, even with the rapid growth in science. Weather is known to be in the...
Development of Machine Learning Algorithms to handle Big Data
18th May 2020
Introduction:
The History of Data
At the beginning of the digital revolution in the 1950’s and 60’s, as technology transformed from analog and mechanical to digital, computational power was ...
E-learning Management System : Analysis, Design, Implementation and Evaluation
18th May 2020
Introduction:
1.0 INTRODUCTION
This project is concerned with the analysis, design, development, implementation and evaluation of an e-learning management system to provide a user friendly envir...
Dataset Migration to AWS Cloud using Opensource Tools
18th May 2020
Introduction:
Contents
Who did what?
Team Member(s)
Responsibilities
1.Introduction
1.1 Data Migration Overview
1.2 Scope of Research
1.3 Res...
Improvement of 32X32 Playfair Cipher using Random Number Generator
18th May 2020
Introduction:
ABSTRACT
This paper deals with the modification of Playfair cipher.
The existing strategies of Playfair cipher are studied like those enforced on ...
Visual Interpretation of Stock Prediction Using Sentiment Analysis
18th May 2020
Introduction:
VISUAL INTERPRETATION OF STOCK PREDICTION USING SENTIMENT ANALYSIS
Abstract
Stock trading is an activity of buying and selling stocks of an organization and the its market plays...
Stages of Software Engineering Concept and Implementation
18th May 2020
Introduction:
Contents
Task 1: Explain and Describe
1.1 The software engineering concept and how it differs from programming
1.2 The concept of the s...
Spark and Machine Learning
18th May 2020
Introduction:
Spark And Machine Leanring
ABSTRACT
In today’s world there is a large amount data is created from various sources like Web Application, Social Media...
Safety, Process and Design of Building a PC
18th May 2020
Introduction:
Purpose
The purpose of this manual is to assist an entry level technician in the safety requirements, process, and design of building a PC. Initially this first section will cover ...
Classification of Liver lesions by Using CNN in CT Images
18th May 2020
Introduction:
Abstract—
Deep learning is a general term for dealing with a complicated neural network with multiple layers. Convolutional Neural Networks (CNN) is a type of d...
Approaches, Significance, Pros and Cons of Securing Data
18th May 2020
Introduction:
Introduction
Cryptography is used in all the places where security is considered as the concern to the application. Initially cryptography is used majorly by military and intelligence or...
Big Data Frameworks for Weather Prediction Analysis
18th May 2020
Introduction:
Abstract— Everyone is affected adversely by natural calamities such as storms, cyclones, etc. In this modern era, where the weather is continuously changing due to many factors...
Exploring Dow Index Variance using Data Mining Technology
18th May 2020
Introduction:
Exploring Dow Index Variance using Data Mining Technology
Abstract. Trends in the Dow Jones Industrial Average (DJIA) are often used as an indicator of future economic tendency.The DJIA ...
Case Study – OpenStack Networking
18th May 2020
Introduction:
Contents1. Introduction
1.1 Introduction to OpenStack Networking
1.2. Objective of case study
1.3. Infrastructure used for case study
1.4. VXLAN Tunnel
...