Computer Science Essays

Search to find a specific computer science essay:

Back to Essays Index

Implementing an Electronic Health Record System

Implementing Electronic Health Record System Based on HL7 RIM -Reusing the RIM Model Archetypes Nancy Mittal Abstract: It is difficult to exchange healthcare information between different HealthCare...

Importance of Discrete Mathematics in Computer Science

Computer science is the study of problems, problem solving and the solutions that come out of the problem solving process, B. Miller and D....

The Benefits of Java

JAVA INCLUDES A LIBRARY OF CLASSES AND INTERFACES: The Java platform includes an extensive class library so that programmers can use already existing classes, as...

Technological Considerations in Interface Design

Technological Considerations in Interface Design Physical characteristics of the device and device internal software affects the screen interface design. Graphics compatibility for Screen design must...

System Development Lifecycle

1.1. Introduction According to Allerano and Taverz (2012), the system development lifecycle has dominated the information technology (IT) arena for numerous decades and remains one...

Support Vector Machine Based Model

Support Vector Machine based model for Host Overload Detection in Clouds Abstract. Recently increased demand in computational power resulted in establishing large-scale data centers. The...

Real Time Video Processing and Object Detection on Android

Real Time Video Processing and Object Detection on Android Smartphone Abstract – As Smartphone is getting more potent, can do more superior stuffs that previous...

Performance Evaluation and Enhancement of Mobile Node: MIH

PERFORMANCE EVALUATION AND ENHANCEMENT OF MOBILE NODE USING MIH CHAPTER 4 NETWORK SIMULATOR 4.1 Introduction NS2 is associate open-source simulation tool that runs on Linux, it's a discreet...

Analysis of Types of Operating Systems

Task 1 1.0 Introduction An Operating System (OS) is software that manages computer hardware and software resources, and to provide public services for computer programs. The...

Low-Power Folded Tree Architecture for DSP Applications

Low-Power Folded Tree Architecture for DSP applications Abstract— Wireless communication exhibits the highest energy consumption in wireless sensor network (WSN) nodes. Due to their limited...

Literature Review on Online Gaming

The purpose of this study is to map out and see the relationship between MMORPG game player personalities and style based on player type...

Development of Computer Technology

Nowadays we can hardly see people live without either a desktop computer, a laptop or even a tablet. As we are moving towards a...

Characteristics of Real Time System

ABSTRACT Scheduling refers to the set of policies and mechanism to control the order of work to be performed by a computer system. process...

Are People Becoming Too Reliant on Technology?

Smart phones, Facebook, Netflix, YouTube…. The world is living in an era of constant dynamic technological revolutions. Information Technology has become inextricable from everyday...

Development of E-Recruitment Software

3.7 Advantages & Disadvantages of E-Recruitment There are many benefits both to the employers and the job seekers but the not also free from a...

3 Dimensional Modelling in Architectural Design

Computer software technology is an important part of computer technology, because computer is made up of computer software, computer software technology is one of...

Methods of Analyzing Data in Data Warehouse

Data Mining methods for Customer Relationaship Management Abstract-Data warehousing and data mining, applied to Customer Relationship Management (CRM), are a relatively fresh sector for organizations...

Comparing and Contrast Jean Bartik and Margaret Hamilton

Software engineering; hearing this term brings to mind words corresponding to innovating, analyzing complex problems, designing software, and maintenance of programs. People picture a ...

Replica Node Detection using Enhanced Single Hop Detection

REPLICA NODE DETECTION USING ENHANCED SINGLE HOP DETECTION WITH CLONAL SELECTION ALGORITHM IN MOBILE WIRELESS SENSOR NETWORKS 1. INTRODUCTION Sensor systems are being theme of...

Perceived User Experience of Interactive Animated Transition

Perceived User Experience of Interactive Animated Transitions in Mobile User Interfaces and Visualisation Animated transitions hold an important part of graphical user...

Programming Languages for Data Analysis

R and Python for Data Analysis Abstract This paper discusses the comparison between the popular programming languages for Data analysis. Although there are plenty of choices...

Data Vault in Data Warehouse: Advantages and Disadvantages

Applications, Implementation, Merits and Limitations of Data vault in Data warehouse Abstract- Business companies face many challenges in exploiting and analyzing data held in diverse...

The User Experience in Mobile Computing

ABSTRACT Mobile phones have become a necessity for almost every person throughout the world. Cell phones have become almost a status symbol in addition to...

Increasing Visual Comfort with Blue Light in Video

Adjusting the blue light of the video to increase the visual comfort belong to the changed of light environment Abstract: This paper...

Implementing a Client-to-client Communication System

Abstract Due to people, behaviour over the social networking and peer-peer needs for the online chatting and sharing the information, file etc..., Chat Applications had...

Data Mining Analysis in Health Department

Data mining has been used intensively and appreciably in lots of fields of life. Likewise in healthcare, data mining is becoming more and more...

Body Sensor Network: A Modern Survey & Performance Study

ABSTRACT As because of modern emerging technologies, low power integrated circuits and wireless communication has enabled a new generation of sensors network. The incorporation of...

Regression Test Case Optimization (RTCO) Techniques Analysis

Abstract: This research paper reviews different metaheuristic techniques used in Regression Test Case Optimization (RTCO) by various researchers. The research also emphases on the...

Impact of Computer Technology

Computer Technology I am using and how I'm using it? Computer technology starts from the time you wake in the morning, your alarm on your...

Web Application Design for School Organisation Optimization

Application and Knowledge Design At first, the ontology will be planned in accordance with the methodology of ontology building. Description...

Risk-based Access Control Model for the Internet of Things

Developing an adaptive Risk-based access control model for the Internet of Things Hany F. Atlam a, c Gary B. Wills a, Robert J. Walters a,...

Wireless Local Area Networks and Security Mechanisms

WLAN - Wireless Local Area Network LAN - Local Area Network IEEE - Institute of Electrical and Electronics Engineers WEP - Wired Equivalent Privacy WPA - Wi-Fi Protected...

Developing an Online Banking Application

This report details the importance of securely developing a software and the best practices to implement throughout the development lifecycle. Using the Microsoft Secure...

Mathematical and Physics Concepts in Computer Games

Introduction A two part assignment was distributed and part one was run a simulation of a given differential equation using numerical integration techniques i.e. Euler...

Development of School Software

1.0 INTRODUCTION This Test Plan has been written to communicate the school easy software development and testing procedures with the client. It includes the objectives,...