SQL injection detection techniques

Background and Literature Survey In this chapter, a background is given for understanding SQL Injection, how it works and its results. Furthermore, a literature review is presented, the literature review covers various techniques for detection of SQL Injection. 2.1. SQL Injection SQL Injection is a technique that exploits security vulnerability occurring in the database layer … Read more

Digital forensics investigations: challenges of techniques, processes & standards

Introduction Digital forensics investigations play a vital role in uncovering digital crimes –this includes both crimes targeting computer systems and those that use computer systems to facilitate an offence. Due to its importance in the cyberspace, significant advancements have been made to enhance its techniques, processes and standards. Today, digital forensics investigations can be applied … Read more

Secret Secret Sharing and Cloud Security: An Overview

Secret sharing is a powerful cryptographic primitive that can ensure data integrity, privacy, and availability with a variety of applications. This primitive involves a cryptographic situation in which a secret piece of information is divided among multiple parties. In this situation, each participant has a share of the secret. Reconstructing the full secret requires some … Read more

Overview of Machine learning and its impact on different sectors

ABSTRACT: Machine learning (ML) is the ability of a system to learn new information rather than having that information preprogrammed into it. It refers to a system’s ability to acquire and integrate knowledge through extensive observation. It takes data as input, analyzes data, and then finds a pattern. After that make a prediction and store … Read more

Apache Groovy

1. INTRODUCTION Apache Groovy is built to work closely and seamlessly with the Java platform, it even shares a majority of syntax with Java to provide an easier learning curve. One of its more notable features includes its ability to do both dynamic and static type binding. In addition, it can be used to write … Read more

Visual cryptography using Rubik’s cube principle

1. Abstract: In the previous couple of years, a few encryption methods dependent on different algorithms have been proposed intended to secure digital pictures against cryptographic attacks. Chaos-based image encryption algorithms are generally used more often than others but require high computational cost. Moreover, this system is defined on real numbers where as the cryptosystems … Read more

Search engine based on semantic web

Keywords: Semantic Search Engine, SPARQL, Search Engine, DBpedia, Ontology, LUIS. Introduction The idea of a search engine and information retrieval from the search engine is not a new concept. The interesting thing about the traditional search engine is that different search engine will provide a different result for the same query. While the information was … Read more

Stock return predictors and social media sentiment

Project Definition My thesis has two main objectives. First, I will use machine learning methods to identify the most important stock return predictors . I distinguish between two types of features. The first type reflects conventional predictors, such as, but not limited to, stock performance, valuation ratio and stock liquidity . A large number of … Read more

Illegal parking system

Driving can be a stressful event even for the best of drivers. This in itself is felt can be made worse in busy areas like cities and large towns. In Belfast for example, the sheer number of motorists that pass through the city on a daily basis can lead to many issues arising from the … Read more


In hacking, a shellcode is a small piece of code used as the payload in the exploitation of a software vulnerability. It is called “shellcode” because it typically starts a shell from which the attacker can control the compromised machine, but any piece of code that performs a similar task can be called shellcode. Because … Read more

Pathfinding procedures

Pathfinding Algorithm tends to the issue of finding the most brief way from source to goal and keeping away from impediments. Probably the best challenge in the plan of reasonable Artificial Intelligence (AI) in PC games is operator development. Pathfinding procedures are typically utilized as the center of any AI development framework. In this work, … Read more

Natural evolution strategies as a proxy to variational bayesian inference

Natural evolution strategies as a proxy to variational bayesian inference for deep policy networks, with applications to session-based recommendation. ABSTRACT This work aims to develop innovative preference learning methodologies and related policies for recommendation, suitable for data with uncertainty. This will be achieved by a new approach to the Variational Bayesian Inference for GRU networks, … Read more

Writing Computer Science Essays

Here are some important themes, points, and topics to consider when writing essays on computer science in 2023:

Artificial Intelligence and Machine Learning: One of the most significant areas in computer science today is the development of artificial intelligence and machine learning technologies. Consider exploring the latest research and innovations in these fields, including ethical considerations and potential future applications.

Cybersecurity and Privacy: With the ever-increasing threat of cyberattacks and data breaches, cybersecurity and privacy are critical topics in computer science. Consider exploring the latest technologies and best practices for safeguarding sensitive information and protecting against cyber threats.

Cloud Computing and Big Data: Cloud computing and big data are two areas that are rapidly transforming the technology landscape. Consider exploring the latest trends and innovations in these areas, as well as the challenges and opportunities they present.

Human-Computer Interaction: Human-computer interaction is a field that focuses on the design and evaluation of user interfaces and user experiences. Consider exploring the latest research and trends in this field, as well as the impact of human-computer interaction on society.

Internet of Things: The Internet of Things (IoT) is a network of physical devices that are embedded with sensors, software, and connectivity, enabling them to collect and exchange data. Consider exploring the latest trends and innovations in IoT, as well as the ethical considerations and potential future applications.

Programming Languages and Software Development: Programming languages and software development are the foundation of computer science. Consider exploring the latest trends and innovations in programming languages and software development, as well as the impact of these technologies on society.

Quantum Computing: Quantum computing is a field that explores the use of quantum-mechanical phenomena to perform calculations. Consider exploring the latest research and innovations in this field, as well as the potential future applications and impact on society.

Ethics and Social Implications of Computer Science: Computer science has a profound impact on society, and it is important to consider the ethical implications and social impact of the technologies being developed. Consider exploring the ethical considerations and social implications of computer science, and the role of computer scientists in addressing these issues.

Computer science essay titles

Stuck for an idea for your next essay? Here are some example titles to inspire you:

  • The future of artificial intelligence and its potential impact on society
  • Cybersecurity and privacy in the age of big data: challenges and solutions
  • The role of blockchain technology in secure data sharing and management
  • The development of quantum computing: current state and potential future applications
  • The use of virtual and augmented reality in education and training
  • The ethics of AI and machine learning: accountability, transparency, and bias
  • The impact of automation on the future of work: opportunities and challenges
  • The role of computer science in healthcare: telemedicine, medical imaging, and personalized medicine
  • The use of machine learning algorithms in social media and its impact on privacy and information sharing
  • The development of autonomous systems: self-driving cars, drones, and robots.

Remember, these are just a few examples of essay topics. It’s important to choose a topic that aligns with your interests and career goals, and to stay up-to-date with the latest research and trends in the field. Good luck with your essay!