Computer Science Essays
The essays below were written by students to help you with your own studies. If you are looking for help with your essay then we offer a comprehensive writing service, provided by fully qualified academics in your field of study.
Computer Science Essays & Related Services
Applications and Challenges of Low Latency Networks
Example essay. Last modified: 8th Feb 2020
ABSTRACT Networking development and research have historically focused on increasing network throughput and path resource utilization. And that have particularly helped bulk applications...
Evaluation of Amazon's Cloud Computing
Example essay. Last modified: 8th Feb 2020
Table of Contents Summary Introduction Category 1: Compute a. Amazon Elastic Compute Cloud (Amazon EC2) b. Amazon Elastic Load B...
GPU Accelerated Parallel Heuristic for the 2D Knapsack Problem
Example essay. Last modified: 8th Feb 2020
A GPU accelerated parallel heuristic for the 2D knapsack problem with rectangular pieces Abstract: The 2D Knapsack Problem is one of the typical NP-hard problems in combinatori...
Deep Residual Learning for Image Recognition
Example essay. Last modified: 8th Feb 2020
Abstract Deeper neural networks are harder to prepare. We present a residual learning structure to facilitate the preparation of networks that are significantly deeper t...
Malware Attacks And Their Impacts
Example essay. Last modified: 8th Feb 2020
Abstract—With always evolving technologies many devices are emerging which has the ability to connect to other devices across the world using internet, it ...
WiFi Eavesdropping: Attack Overview and Challenegs
Example essay. Last modified: 8th Feb 2020
Wifi Eavesdropping Abstract – Below report describes about Wi-Fi eavesdropping, then an explanation on how it works and then further tells about its latest and most famous ...
Description of Trojan Attacks
Example essay. Last modified: 8th Feb 2020
Trojan Abstract—The amount of electronic devices associated with the internet is constantly on the rise, with increasing number of devices there is also an expansion in the ...
The Melissa Virus: Origins and Impact
Example essay. Last modified: 8th Feb 2020
Abstract With the creation of ARPANET and its evolution into the internet we know today, malware has become a prevalent force affecting users globally. A simple, non-replicating and beni...
Cisco Systems Architecture: ERP and Web-enabled IT
Example essay. Last modified: 8th Feb 2020
Background Cisco System was founded in 1984 by two Stanford computer scientists, Sandy Lerner and Leonard Bosack1,2. The company was built on the vision of a “New World Network1....
Review of A Health Care Data Breach – Anthem 2015
Example essay. Last modified: 8th Feb 2020
Abstract The Anthem Data Breach was the largest of its kind at the time and was one of the first times that a cybersecurity incident was actively covered in mainstream media. This ...
CI and CD in AWS Code Pipeline
Example essay. Last modified: 8th Feb 2020
Abstract Software firms are increasingly using and contributing to DevOps software. Many companies now use pipelines for better efficiency. To do this they need to unders...
Fifth Generation Mobile Networks: Challenges and Future Research
Example essay. Last modified: 8th Feb 2020
FIFTH GENERATION (5G) Mobile Networks ABSTRACT Fifth generation (5G) mobile network is not only the successor of its previous mobile networks (4G,3G,2G) but also the beginning ...
Ways of Improper Access Control
Example essay. Last modified: 8th Feb 2020
Abstract—This paper defines about the different ways of improper accessing of web servers, application servers and databases and the various ways of avoiding the...
Multicast Protocols: Challenges and Future Research
Example essay. Last modified: 8th Feb 2020
ABSTRACT Multicast in terms of IP is a method of transferring Internet Protocol datagrams to a group of involved receivers in a single broadcast. The IP specific for...
Anti -Reverse Engineering Techniques employed by Malware
Example essay. Last modified: 8th Feb 2020
Abstract— In Modern days, analyzing the malware samples through reverse engineering methodologies became more difficult because the malware authors are using Anti-reverse engineerin...
Standard Operating Procedure for Pen Testing
Example essay. Last modified: 8th Feb 2020
1.0 Introduction The pen testing methodologies it is a very important thing for the organization because they test of the operational security of physical loc...
Cloud Computing: Security and Infrastructure
Example essay. Last modified: 8th Feb 2020
Table of Contents Introduction Cloud security and infrastructure Application and impact of the research area Large Businesses Small Businesses ...
Managing Virtual Environments: Server Comparison
Example essay. Last modified: 8th Feb 2020
Table of Contents Physical Server and Specifications Vendor Selection Hypervisor Comparison VMware 6.5 Hyper-V 2016 VCenter deployment ...
Applying User-centred Design to Modern Software Products
Example essay. Last modified: 8th Feb 2020
Introduction The following report evaluates “Applying user-centred design to modern software products” based on ISO 9241-210 standard. “ISO 9241-210 provides a set of requirements ...
Prediction of Coronary Heart Disease using Supervised Machine Learning Algorithms
Example essay. Last modified: 8th Feb 2020
Abstract — The field of medical analysis is often referred to be an invaluable source of rich data yet with poor insights and medical outcomes. Coronary Heart Disease (CHD) is one of the major ...
Supervised Machine Learning Algorithms: Classification Techniques
Example essay. Last modified: 8th Feb 2020
Abstract: Supervised machine learning is a function for algorithms that has purpose to visibly provided instances to produce general hypotheses, which formerly make predictions a...
Hardware Techniques to Mitigate Fault Attacks
Example essay. Last modified: 8th Feb 2020
Abstract— An act which is to a deliberate control of the incorporated circuit or its state, with an aim to incite a mistake inside the coordinated circuit with the end goal to move the gadget i...
Overview of Object Oriented Programming
Example essay. Last modified: 8th Feb 2020
Object-oriented programming is a new way of approaching the job of programming. Programming over the years has evolved to accommodate the increased complexity of programs, it has been become a wi...
Will Quantum Computing be a Threat to our Cybersecurity?
Example essay. Last modified: 8th Feb 2020
The smaller computers get, the more powerful they become. Today’s smartphones are more powerful than military computers created 50 years ago. Regardless of this, there are still many problems o...
Text-based Age and Gender Prediction for Cyberbullying Detection and Online Safety Monitoring
Example essay. Last modified: 8th Feb 2020
...
Tip: If you can't find what you are looking for, try shortening your search phrase. E.g. "CSR"