Computer Science Essays
The essays below were written by students to help you with your own studies. If you are looking for help with your essay then we offer a comprehensive writing service, provided by fully qualified academics in your field of study.
Computer Science Essays & Related Services
Spatial Mapping for Microsoft’s HoloLens
Example essay. Published: 8 February 2020
How Microsoft’s HoloLens uses spatial mapping to allow developers to create a three-dimensional map of the surrounding environment that allows the HoloLens and the user to interact with the real world….
Challenges and Countermeasures in Authenticating User in Voice Biometrics
Example essay. Published: 8 February 2020
Is That Your Voice? Abstract— Biometric authentication [1] is a security process thatreliesontheuniquebiologicaltraitsofanindividualtoverify the person. There are many biometric authe…
Text-based Age and Gender Prediction for Cyberbullying Detection and Online Safety Monitoring
Example essay. Published: 8 February 2020
Sample essay submitted by a student titled Text-based Age and Gender Prediction for Cyberbullying Detection and Online Safety Monitoring. UKessays.com offers expert-led academic writing services….
Will Quantum Computing be a Threat to our Cybersecurity?
Example essay. Published: 8 February 2020
The smaller computers get, the more powerful they become. Today’s smartphones are more powerful than military computers created 50 years ago. Regardless of this, there are still many problems o…
Overview of Object Oriented Programming
Example essay. Published: 8 February 2020
Object-oriented programming is a new way of approaching the job of programming. Programming over the years has evolved to accommodate the increased complexity of programs, it has been become a wi…
Hardware Techniques to Mitigate Fault Attacks
Example essay. Published: 8 February 2020
Abstract— An act which is to a deliberate control of the incorporated circuit or its state, with an aim to incite a mistake inside the coordinated circuit with the end goal to move the gadget i…
Supervised Machine Learning Algorithms: Classification Techniques
Example essay. Published: 8 February 2020
Abstract: Supervised machine learning is a function for algorithms that has purpose to visibly provided instances to produce general hypotheses, which formerly make predictions a…
Prediction of Coronary Heart Disease using Supervised Machine Learning Algorithms
Example essay. Published: 8 February 2020
Abstract — The field of medical analysis is often referred to be an invaluable source of rich data yet with poor insights and medical outcomes. Coronary Heart Disease (CHD) is one of the major …
Applying User-centred Design to Modern Software Products
Example essay. Published: 8 February 2020
Introduction The following report evaluates “Applying user-centred design to modern software products” based on ISO 9241-210 standard. “ISO 9241-210 provides a set of requirements …
Managing Virtual Environments: Server Comparison
Example essay. Published: 8 February 2020
Table of Contents Physical Server and Specifications Vendor Selection Hypervisor Comparison VMware 6.5 Hyper-V 2016 VCenter deployment …
Cloud Computing: Security and Infrastructure
Example essay. Published: 8 February 2020
Table of Contents Introduction Cloud security and infrastructure Application and impact of the research area Large Businesses Small Businesses …
Standard Operating Procedure for Pen Testing
Example essay. Published: 8 February 2020
1.0 Introduction The pen testing methodologies it is a very important thing for the organization because they test of the operational security of physical loc…
Anti -Reverse Engineering Techniques employed by Malware
Example essay. Published: 8 February 2020
Abstract— In Modern days, analyzing the malware samples through reverse engineering methodologies became more difficult because the malware authors are using Anti-reverse engineerin…
Multicast Protocols: Challenges and Future Research
Example essay. Published: 8 February 2020
ABSTRACT Multicast in terms of IP is a method of transferring Internet Protocol datagrams to a group of involved receivers in a single broadcast. The IP specific for…
Ways of Improper Access Control
Example essay. Published: 8 February 2020
Abstract—This paper defines about the different ways of improper accessing of web servers, application servers and databases and the various ways of avoiding the…
Cyclic Redundancy Check (CRC) Error Detection Technique
Example essay. Published: 8 February 2020
Abstract – This paper presents a way to guarantee the data transmitted over the network applying Cyclic Redundancy Check (CRC) error detection technique which work on the approach of binary div…
Beyond Moore’s Law: Is Quantum Computing a Commercially Viable Replacement for Classical Computing?
Example essay. Published: 8 February 2020
Abstract Moore’s law states that the number of transistors on a microprocessor doubles approximately every 18 months. More transistors on a processor means more speed. But if this tren…
Applications and Challenges of Low Latency Networks
Example essay. Published: 8 February 2020
ABSTRACT Networking development and research have historically focused on increasing network throughput and path resource utilization. And that have particularly helped bulk applications…
Evaluation of Amazon’s Cloud Computing
Example essay. Published: 8 February 2020
Table of Contents Summary Introduction Category 1: Compute a. Amazon Elastic Compute Cloud (Amazon EC2) b. Amazon Elastic Load B…
Security Measures for Wearable Devices
Example essay. Published: 8 February 2020
I have been researching the security measures that have been set in place for wearable devices such as fit-bits, apple watches, etc. My research investigates what types of attacks can be performed through these devices, what the companies are doing to protect users against threats, and how we can protect ourselves and our privacy….
Tip: If you can’t find what you are looking for, try shortening your search phrase. E.g. “CSR”