Search for an essay or resource:

Data Analytics analysis example

Q1. Explore the data. Plot and produce summary statistics to identify the key characteristics of the data and produce a report of your findings. Ideally, I would expect between 5 and 10 tables or figures accompanied by a description of your main findings. Among the topics that you might choose to discuss: identification of possible … Read more

Analysis of vulnerabilities applicable to websites and Microsoft Windows operating systems

Abstract— In order to be able to make an analysis related to vulnerabilities applicable to websites and Microsoft Windows operating systems it was needed to install Kali Linux on a virtual machine to be able to use Metasploit Framework and Burp Suite to start penetesting websites using vulnerabilities that are the most common.Vulnerabilities that are … Read more

Randomized Optimization: Analyzing Popular Techniques

Introduction Randomized Optimization involves a collection of optimization techniques allowing the computation of global minima in otherwise non-straightforward functions. Making these algorithms unique are tweaks which invoke randomness to expand the search space, preventing their halting when finding local minima. In this paper, we will discuss four common randomized optimization algorithms: randomized hill climbing, simulated … Read more

Artificial Intelligence: Friend or Foe?

Ever since the invention of the computer, mankind has always been determined to strive forward and innovate with gadgets, technology and lifestyle, including the creation of artificial intelligence (or colloquially, AI). Our renowned scientists all around the world specialising in software engineering have been improving AI and making it user friendly for the public or … Read more

AI and its positive effect on society

The idea of new technologies such as AI, Deep and machine learning, sensing cities, artificial embryos, and more might sound scary to a lot of people. Many fears the rise of the machines like in “Terminator” and believe that this new wave of technology is the beginning of the end for the human-race, but that’s … Read more

Will AI surpass human intelligence?

The controversy over whether artificial intelligence surpasses human intelligence will perpetually be a topic of debate that splits evenly down the middle. This feud led all the way back to the 1950’s when Alan Turing, an english computer scientist, coined the “Turing Test” which was a primitive way of determining if a computer could be … Read more

Industrial Control Systems

1: General Context Industrial control systems which are also known as ICS are generally used for controlling the various Industrial processes. These systems include many complex connections and the architecture for running the production in the Industry. These generally include Programmable Logic Controllers (PLC), Supervisory Control and Data Acquisition (SCADA) along with distributed control systems … Read more

Project Plan for Creation of App

This introduction will prepare and inform, once read, there should be a better understanding of the project. It will also include the aims and objectives of the project, which will be discussed to provide clarity. The aim of this project was to create an app that locates coffee shops for a user that are in … Read more

MSM Messenger

Initially known as MSN Messenger since its inception in 1999 and Windows Live Messenger from 2005, which was the king of instant messaging services closed its meeting on 31 October 2014. Year and a half later and the wisdom they have Mondays when you see the results of the pools, one wonders why. MSN Messenger … Read more

MANET

ABSTRACT MANETs are deployed in adversarial environment it is important to provide a security based on onion routing mechanism a security is provide by authenticating the route request packet to satisfy unidentifiability and unlinkability, maximizing the throughput. In order to reduce the delay and to evaluate energy consumption the AASR protocol is combined with trust … Read more

Find edges of grayscale images effectively with less computational complexity / reduce the thickness of the image edges

ABSTRACT: The main objective of my project is to find the edges of the grayscale image effectively with less computational complexity and also to reduce the thickness of the image edges. Edge of the image is one of the most fundamental and significant features. The classical studying of computer vision and image processing field is … Read more

Design new Framework for MIMO to minimize packet error probability, energy consumption and packet delays

I. Summary of Proposed project Multi Input Multi Output (MIMO) strategies accomplish the similar Bit Error Rate i.e., higher throughput (point-point communication) by permitting nodes to sending and receiving information combined with lower power (individually, for the same power) . Multi input multi output (MIMO) frameworks are studied very thoroughly in recent years because of … Read more

Onion routing

3. OVERVIEW AND EXPLANATION 3.1 ONION ROUTING It is a mechanism to provide private communications over a public network in which the sender and the receiver nodes communicate with each other anonymously by means of some intermediate nodes called onion routers. It relies on public key cryptography. The source node sets up the core of … Read more

Interface Design and Development

MVC MVC is an architectural pattern that separates an application into three main logical components: the model, the view and the controller. Model component correspond to all the data-related logic that the user works with. It also represents the data that is being transferred between the View and Controller components. View component is used for … Read more

Securing MANETs by a system of intrusion detection organizations

Abstract: Communication in Mobile Ad hoc (MANETS) networks happens without specific infrastructure. This prototype assumes that an arbitrary node will forward traffic flow originating from other nodes readily. Contrariwise, in aggressive surroundings where we discover most uses of ad hoc systems, an always obliging and obedient behavior on behalf of the other nodes of the … Read more

SQL Injection

Abstract This paper investigates Structured Query Language (SQL) Injection from a web security stand point. SQL Injection consists of attackers injecting malicious SQL commands into an application to alter how it interacts with the database. This consists of any statement that creates, reads, updates or deletes data from a database. SQL injection is dangerous because … Read more

AI’s fundamental drives

The human brain is a complex system, or network, in which mental states emerge from the interaction between multiple physical and functional levels. What happens when you try to integrate the complexity of the human thought process into technology? The result is artificial intelligence— a popular friend or foe in science fiction media. With the … Read more

LIGHTWEIGHT CRYPTOGRAPHY

INTRODUCTION The advancement in technology leads to the reduction in size and power consumed by the devices used to perform real world operations including of which are like sensor networks, RFID Tags, controllers, smart cards and deployment of embedded system etc. The functionality of all these systems consists of storage, manipulation and transmission of some … Read more

Our computer science essays and dissertations cover popular topics including Artificial Intelligence (AI), Computer Engineering, Computer Networks, The Internet, Data Structure, Discrete Mathematics, File Sharing, Hacking and Security, Programming, Robotics and Software Engineering.