Computer Science Essays

Search to find a specific computer science essay:

Back to Essays Index

Various Layers Of Wsn Stack Computer Science Essay

Wireless sensor network build with large number of small sized, low- cost and computable sensors, which are having limited battery power, memory and computation power. The large numbers of small sensors are deployed to monitor any physical phenomena (i.e. temperature), to collect and process the sensed data and to send...

Introduction of e-business

Organizations in the electronic age: We are living in a world of business in which almost all the companies are nowadays doing business electronically, such as banks, insurance companies etc. In 2005 UK decided to put all the suitable public services online. Simply e-Business is now a common stream part of...

The Types Of Malicious Software Computer Science Essay

It is software which hands over full or partial control of your computer system to any user who have created the malware or malicious software or who have developed it. If it penetrates into the computer system then its creator can do anything which he wants and can get full...

Basic Types Of Smart Antennas Computer Science Essay

There are two basic types of smart antennas. As shown in Fig. 6.1, the first type is the phased array or multibeam antenna, which consists of either a number of fixed beams with one beam turned on towards the desired signal or a single beam (formed by phase adjustment only)...

Look At What Is Web Accessibility Computer Science Essay

Web accessibility is one of the key elements to the web sites that provide multi electronic services and ease the access for users on the web such as providing news, education and entertainment that can be an interesting target for users and might express their views for what service are...

The Overview Experiencing Windows 8 Computer Science Essay

Windows 8 is the newest member of the Windows family designed to replace its very successful sibling, Windows 7. If you've used Windows XP, Vista and 7 for the last 10 years, it will definitely take time to get used to keyboard-and-mouse Windows 8 - but it will grow on you...

Performance simulation of WiMAX in HD video streaming

INTRODUCTION: In last couple of years, wireless communications has grown from an obscure, unknown service to a ubiquitous technology that serves almost half of the people in Earth. As the technological development is leaping into the next generation, demand for high speed internet services is growing exponentially. Traditional solutions for broadband...

Microprocessors Overview Evolution And Future Computer Science Essay

A microprocessor includes almost all of the functions of a computer's central processing unit (CPU) on a single integrated circuit (IC).The basic steps include The key element of all computers, providing the mathematical and decision making ability Current state-of-the-art uPs (Pentium, Athlon, SPARC, PowerPC) contain complex circuits consisting of tens of millions...

The Security Of Web Applications Computer Science Essay

The "Web" or World Wide Web is today used very often in everybody's life. Since its creation in the 1990s, the Web never ceased to grow and counted more and more web sites and web applications. Web application domain is currently in big expansion. We can see more and more...

Estimation Of Foot Kinematics Computer Science Essay

Estimating human foot kinematics relative to earth as reference frame, plays an exclusively role in development of Inertial Navigation Systems. A novel filtering algorithm that estimates foot kinematics, such as position, velocity, and orientation is proposed. Inertial Measurement Unit (IMU), which comprises of 3 axis accelerometers, magnetometers, and angular rate...

Authentication Protocol Security Measures Computer Science Essay

Abstract: The security measure in today's networking world has been reached to a peak state where for every new networking update or invention the threat to it is also coming into picture at the same time which challenges the computing world to develop highly secure mechanisms. In earlier days this...

The Development Of An Operating System Computer Science Essay

An Operating System is a software program that runs on a computer and enables the computer hardware to communicate and operate with the computer software. An Operating System is the first thing that is loaded onto a computer without which a computer would be useless. Operating Systems provide a software...

The Process Of Computer Security Computer Science Essay

Computer security is the process of preventing and detecting unauthorized use of our computer. Prevention measures help us to stop unauthorized users from accessing any part of your computer system. Detection helps us to determine whether or not someone attempted to break into the system, if they were successful, and...

Differences Between MIPV4 And MIPV6 Computer Science Essay

With the fast growth in the numbers of the mobile and handheld devices that are connected to the internet, the current IPv4 protocol is not able to cover all theses growth number of IP addresses. This is why the Internet Protocol IPv6 has been developed. Mobile IPv6 is an essential mandatory...

An Overview Of Social Networking Computer Science Essay

Social networking - more specifically Facebook - has changed the way mostpeople - who are connected to the internet - communicate. It has enablednew avenues of personal connection, collaboration and information sharing thatwas only conceived a few years ago and because of the raw nature of theinternet, it has exploded...

Malware And Exploit Protection Computer Science Essay

In today's modern world of information technology, malware and malware protection is becoming a large part of computer security. To analyse this problem various Internet and academic articles have been studied in order to grasp the main concepts of malware and its impacts on information technology as well as current...

The Handover Between Wifi And Wimax Computer Science Essay

3.1 Introduction: Mobility is one of the most important features of a wireless communication system. Usually, continuous service is achieved by supporting handoff (or handover) from one cell to another. Handover is defined as a process, in which a MN shifts from the air interface provided by another BS. It is...

A Report On Java Web Application Framework Computer Science Essay

Nowadays, due to the importance of internet, web pages play very important role in every places, to everyone, and anytime. This research is talking about different Java Web Application Framework that commonly use on creating dynamic websites. Because of the requirement of web users are getting higher, they requires better interfaces,...

Development Of A British Sign Language Dictionary Computer Science Essay

The literature review on this dissertation is reviewed on the various key areas related to the development of an extensible British Sign Language dictionary and Finger Spelling tool. This includes on detailed study on the topic of deafness and hearing impairment, Sign Language and its elements, various types of Sign...

The Update Software In Windows Computer Science Essay

The first time the Windows Update software made an appearance was with the release of Windows 95. This is the first time Microsoft Windows 95 was released in August of 1995 and would become the most successful of the Windows operating systems. A major issue with this system has been...

Customer relationship management and business intelligence

CRM(Customer Relationship Management) and BI(Business Intelligence) are supportive applications to run any Telco operations. Generally these applications collaborate with each other to complete an operation. Accuracy, efficiency and flexible integration are the key features for these applications to run in a highly collaborative mode. Low cost, flexibility, and collaboration are...

Aodv Protocol And Its Solution Computer Science Essay

Security is an essential requirement in mobile ad hoc networks to provide protected communication between mobile nodes. MANETs are vulnerable to various attacks; black hole is one of the possible attacks. Black hole is a type of routing attack where a malicious node advertise itself as having the shortest path...

ICT based distance education

Information and Communication Technology (ICT), as a medium for teaching is playing an important role to support learning as a different classroom activities, group work, team work projects, individalisation, interaction and student motivation etc. ICTs have the potential to enhance information distribution, learning, teaching and managing of educational services...

The wireless sensor networks

Abstract Advances in wireless communications during the last decade made the development of services based on wireless sensor networks easier and cheaper. Such a system is implemented where environmental and liquid flow data are sensed and relayed to the central computer via an ad hoc network based on the IEEE-802.15.4 standard....

Disk Enabled Index Using R Trees Computer Science Essay

Spatial data objects often cover areas in multidimensional spaces and are not well represented by point locations. For example, map objects like countries, census tracts etc occupy regions of non-zero size in two dimensions A common operation on spatial data 1s a search for all objects in an area, for...

E Commerce And The Importance Of Encryption Computer Science Essay

Web-commerce has grown into one of the fastest-growing area of industry in the past two years. Billions of dollars have passed hands in the process and each entrepreneur wants a slice of the dough. To make this possible, data encryption plays a very central role in ensuring customers that paying...

The Usability Of Mobile Websites Computer Science Essay

This literature review discusses two papers that evaluate the usability of mobile websites from two different perspectives - one considers the impact of the prevailing environmental conditions of use on the usability of a mobile website while the other considers the impact of mobile device constraints (such as the smaller...

TCO And Ale For The Required Company Computer Science Essay

Introduction: In this task I have been asked to calculate the TCO and ALE for the required company. By using the provided data in this task which includes the current system way of performing the risk assessments and total expenditures for a certain period of time allocated. a) The calculation for...

The Common Examples Of Wireless Equipments Computer Science Essay

Chapter 1 Wireless communication is used to transfer information between two or more points that have no physical connection. The distance between communicating points can be short, such as a few meters for AC remote control, or even millions of kilometers for deep space radio communications. It encompasses various types of...

Three Main Operating Systems Computer Science Essay

Carry out a critical analysis on three main operating systems (Linux OS, Windows Vista and Symbiam OS). Compare and contrast the history, overview, system structure, processes and threads, memory management, application and security issue of each operating system. Comment on the strength and weakness of each OS considered. Based on your...

4G Is A Fourth Generation Computer Science Essay

This project is a research on a network that does not exist on to the market yet. It is a research of promising future to the global society. The main objective is to find out how will it be different from the current network onto human lives when it is...

History Background And Nature Of Business Computer Science Essay

Halo Box Karaoke is a new karaoke which established in 2007 at Penang, Malaysia. Halo Box Karaoke is establish with the mission of creating a new healthy karaoke entertainment culture in Malaysia. It has infused itself as one of the most preferred singing, leisure and gathering place for family and...

Study About Tls And Ssh Security Standards Computer Science Essay

This report will detail the TLS and SSH security standards how they work and where they are used. Comparing both standards to assess similarities and main differences between them by looking at where each is used we can gain an understanding of why the standards are used so widely within...

Evaluation Of Web Search Engines Computer Science Essay

Nowadays, Web becomes vital collection of huge information sources and also influences our daily lives and business transactions. As a result of having massive information on the Web, how we find the information we targeted? The major tools for searching and retrieving the information on the Web are search engines....

Method Against Non Control Data Attacks Computer Science Essay

Non-control-data attack is a new attack method which does not alter the target program's control data. Attackers corrupt a variety of application data including user identity data, configuration data, user input data, and decision-making data. Existing defense methods are mostly based on static analysis which need source code. This paper...