Browse our collection of papers in
Computing Science

Select number of records per page:  

C/C/610. Design and creation of VBank application

WORDS:
1300
DATE:
2016
PRICE:
19.99 GBP

The paper reports on the design and creation of a banking application VBank in Java that lets customers create multiple bank accounts and make deposit and withdrawal transactions on these accounts. VBank’s architecture is described, services provided by the VBank system are explained detailing their functions. The paper has no references.

 

KEYWORDS: Design, creation, VBank, application,

 

C/C/608. Open-closed principle in object oriented programming

WORDS:
4550
DATE:
2016
PRICE:
49.99 GBP

The paper looks at the open-closed principle of object oriented programming. System’s behaviour is examined discussing the goals of software system that conform to the open-closed principle, i.e. composition, delegation, low coupling, high cohesion, etc. Mutability of an object is explained defining the concept of an immutable class, providing relevant examples, and outlining advantages and disadvantages of an immutable class.

 

KEYWORDS: Open-closed, object, programming, software,

 

C/C/607. Methods of artificial intelligence and robotics

WORDS:
1050
DATE:
2016
PRICE:
19.99 GBP

The paper looks at the methods of artificial intelligence modelling providing explanations of k-nearest neighbour regression using Euclidean distance (KNN), performance measures (i.e. naïve model, correlation coefficient, mean squared error and negative log likelihood) and covariance function (i.e. squared exponential function and neural covariance function).

 

KEYWORDS: Artificial, intelligence, robotics, modelling,

 

C/C/584. Quality of video transmission over IP networks

WORDS:
6400
DATE:
2015
PRICE:
69.99 GBP

The paper looks at the quality of video transmission over Internet Protocol (IP) networks examining Quality of Service (QoS) mechanisms, outlining key quality metrics, etc. Video transmission through compression is analysed identifying constraints of IP networks. Literature is reviewed on developments in video quality transmission over IP networks. A conceptual framework is proposed for a video compression project that can improve the quality of transmission.

 

KEYWORDS: Quality, video, transmission, IP networks,

 

C/C/579. Critical view on programming language COBOL

WORDS:
1350
DATE:
2015
PRICE:
19.99 GBP

The paper looks at the programming language COBOL (Common Business Oriented Language) outlining its drawbacks, merits, limitations, current relevance and possible applications.

 

KEYWORDS: Critical, programming, language, COBOL,

 

C/C/576. Dissertation. Storage and retrieval of online video information

WORDS:
21850
DATE:
2015
PRICE:
219.99 GBP

The dissertation looks at the storage of video information and its retrieval from the database. Literature is reviewed on the architecture of data storage servers, the features of large-scale and multi-resolution servers, networking architecture, video streaming technologies, storage and retrieval mechanisms for video data, etc. A prototype is developed for an online video sharing system that can be used as an online library of lectures and video information shared by students, faculties, lecturers, etc. The dissertation uses secondary sources and computer technologies available for the prototype implementation. Conclusions are made about the importance of video sharing and the video on demand system assessing techniques that were used in the process of its development.

 

KEYWORDS: Dissertation, storage, retrieval, online, video information,

 

C/C/564. Data mining techniques

WORDS:
1000
DATE:
2015
PRICE:
19.99 GBP

The paper looks at the data mining technique of K Nearest Neighbour (KNN) and its extensions, i.e. K Best Cluster Based Neighbour (KB-CB-N) and K-Hybrid Clustered Based Nearest and Farthest Neighbours (K-HCB-NFN) arguing that the latter improve the accuracy of prediction decisions and result in better performance.

 

KEYWORDS: Data mining,

 

C/M/3675. Analysis of tasks for PHP development project

WORDS:
1450
DATE:
2014
PRICE:
19.99 GBP

The paper reports on the management of a project related to PHP hypertext preprocessor development. The methods of project management (PM) are detailed explaining tasks and stages of the work. The learning outcomes of the extended mini project are discussed.

 

KEYWORDS: Reflection, PHP, project, tasks,

 

C/C/556. Computer security protection systems

WORDS:
580
DATE:
2014
PRICE:
9.99 GBP

The paper looks at the mechanisms of security used by information systems, i.e. signature based detention, model checking, data mining, malware-tracking, etc. The paper has no references.

 

KEYWORDS: Computer, security, protection,

 

C/C/547. Parallel computer systems and limitations to their performance

WORDS:
1450
DATE:
2014
PRICE:
19.99 GBP

The paper looks at the factors that limit the performance of parallel computer systems (PCS). The concept of PCS is defined, their advantages are outlined, the measurements of PCS performance are examined including speedup, efficiency, power weight, process scheduling and granularity. The importance of accurate measurement of PCS performance is highlighted.

 

KEYWORDS: Parallel computer systems, limitations,

 

C/C/521. From keyboard to computer screen: presentation notes

WORDS:
1050
DATE:
2014
PRICE:
19.99 GBP

The paper offers notes for a 13-slide presentation of the study “From keyboard to computer screen” providing information on the internal components of the computer and core computer concepts, i.e. central processing unit (CPU), memory, binary machine code, computer system, etc. The processing of a signal received from the keyboard is detailed tracing its route to the screen.

 

KEYWORDS: Presentation, notes, keyboard, computer screen,

 

C/EC/496. Computer forensic certifications: analysis of survey data

WORDS:
7450
DATE:
2013
PRICE:
79.99 GBP

The paper presents a chapter from the dissertation on current computer forensic certifications that best match the requirements of the forensic experts. The chapter includes the description of the research methodology and the quantitative and qualitative analysis of the data obtained from an online questionnaire-based survey of computer forensic professionals’ views about the elements required in the field of computer forensics. Conclusions are made on the basis of the survey findings.

 

KEYWORDS: Computer, forensic, certifications, survey,

 

C/C/495. Computer forensics certifications as benchmark of current certifications: project specification

WORDS:
2350
DATE:
2013
PRICE:
29.99 GBP

The paper offers a project specification (PS) and design of the research into computer forensics certifications. The difference between PS and the original research proposal is explained, current requirements in the field of computer forensics certifications are examined, literature is reviewed on the importance of standards and certifications focusing on computer forensics certifications. The questions of the research are outlined supplying information about required resources and methodologies. A project plan is presented.

 

KEYWORDS: Computer forensics, certifications, benchmark, project specification,

 

C/M/3322. String operations in Mike & Co UK

WORDS:
1250
DATE:
2013
PRICE:
19.99 GBP

The paper looks at the application of string operations (SO) in data structures and algorithms of medium-sized companies using a case study of Mike & Co UK. The company’s use of SO is examined and evaluated discussing their applications in customer service, stock of goods, employee management, sales, etc.

 

KEYWORDS: String operations, SO, Mike & Co UK,

 

C/C/480. Dissertation outline. Computer forensics certifications: current issues

WORDS:
630
DATE:
2013
PRICE:
9.99 GBP

The paper presents an outline of the dissertation on the current issues of computer forensics certifications. The aim and question of the research are formulated, the topics and sources of the literature review are defined, the methodology is described.

 

KEYWORDS: Dissertation outline, Computer, forensics, certifications,

 

C/C/428. Exercises in maths for programming

WORDS:
2200
DATE:
2012
PRICE:
29.99 GBP

The paper provides solutions to exercises in maths and programming based on the use of the LU-Crout decomposition method and the Gauss-Seidel method. The paper has no references.

 

KEYWORDS: Maths, programming,

 

C/C/391. Optical fibre communications: problems and solutions

WORDS:
1400
DATE:
2012
PRICE:
19.99 GBP

The paper presents solutions to several problems on optical fibre communications providing calculations and explanations of RMS value, pulse broadening, dispersion compensation, bias voltage, etc. The paper has no references.

 

KEYWORDS: Optical fibre communications,

 

C/C/388. Proposal. Layered Security Architecture for Wireless Sensor Networks

WORDS:
2050
DATE:
2012
PRICE:
29.99 GBP

The paper offers a proposal for the development of a layered approach to the security architecture of Wireless Sensor Networks (WSN) prone to security threats and attacks. The background and objectives of the proposed research are outlined, research methodology is described, its timescale is indicated.

 

KEYWORDS: Proposal, Layered Security Architecture, Wireless Sensor Networks, WSN,

 

C/C/318. Dissertation. An analysis of biometric technology and fingerprint technology

WORDS:
9600
DATE:
2011
PRICE:
99.99 GBP

This dissertation focuses on biometric technology, and aims to discuss fingerprint technology. The objectives are to examine how biometric authentication technology is beginning to transform the user authentication process and what problems may arise from developing such technology, to identify benefits and possible drawbacks from using biometric technologies for the user authentication purposes, and to investigate current practice of the biometric authentication in the UK. The review of literature provides a detailed overview of biometrics, and examines the use of biometrics in the UK. This section is followed by the research methodology, which details the approach the study has taken as well as the data collection methods used. The findings from the data collection methods are detailed and discussed. The conclusion section discusses the objectives set, and provides recommendations.

 

KEYWORDS: Dissertation, biometric technology, fingerprint technology, biometric authentication technology!,

 

C/C/309. A comparative analysis of Java and C++

WORDS:
8050
DATE:
2011
PRICE:
89.99 GBP

This paper focuses on Java and C++ Programming languages and aims to carry out a comparative analysis. The paper begins by providing background information on programming, namely its history and detailed information on Java and C++. The next section of the paper then focuses on Java and examines the programming language, history, characteristics, development, and popularity. The paper then examines the same aspects in relation to the C++ programming language. Examples of C++ and Java implementation are provided, and the paper summaries the pros and cons, as well as the similarities and differences between the two. The two programming languages are compared in relation to syntax, access to memory, memory management, popularity, object orientated programming, and security.

 

KEYWORDS: Java, C++, Programming, memory, memory management, popularity, object orientated programming, security, programming language,

 

C/C/290. An examination of video conferencing

WORDS:
3750
DATE:
2011
PRICE:
39.99 GBP

This paper evaluates video conferencing and the technology surrounding it. The paper presents the background to video conferencing and aims to examine literature that suggests that it is a technology that is a viable alternative to face to face and telephone communication.

 

KEYWORDS: video conferencing, technology, face to face, telephone, communication,

 

C/C/250. The informatic needs of a computer business

WORDS:
1600
DATE:
2011
PRICE:
19.99 GBP

This paper discusses the concept of informatics, which relates to computer science and information management. This is examined in reference to the needs of a small business dealing with the buying and selling of computer accessories. The paper begins by discussing data collection, which is the first attribute of informatics, and this section assesses aspects concerning suppliers, customers and operational functions regarding the supply chain. Data interpretation, retrieving information, segregation, and utilising are all further aspects of informatics. The paper then focuses on ERP application, discussing ways in which it can be incorporated into computer businesses, and this is done through use of McKinsey’s 7S’s framework.

 

KEYWORDS: Informatics, computer science, information management, data collection, suppliers, customers, supply chain, Data interpretation, retrieving information, segregation, utilising, ERP, McKinsey’s 7S’s framework.,

 

C/C/233. Examination of the implementation of school fingerprint security

WORDS:
1800
DATE:
2010
PRICE:
19.99 GBP

This paper presents a proposal for a new system for school fingerprint security, which aims to offer better security for children and peace of mind to parents. The paper begins by outlining fingerprint biometrics, detailing the history, concept, hardware, software, and business application. The paper then outlines how the system would work, followed by an evaluation of the advantages of the system. Data protection and other legislations are discussed in relation to the system, followed by the steps that need to be taken before implementation of the systems. Conclusions are made regarding the cost of the system and parental reaction.

 

KEYWORDS: school fingerprint security, children, biometrics, data protection!,

 

C/M/1678. Presentation. Evaluation of fingerprint recognition systems in school

WORDS:
1
ADD-ONS:
11 Slides
DATE:
2010
PRICE:
19.99 GBP

This presentation focuses on school fingerprint recognition system. Information is given about biometrics, focusing evaluating face, iris and finger print recognition. Further information is given regarding finger print recognition, like the biometrics regarding it and them system at schools, and the presentation concludes by detailing the advantages of this system.

 

KEYWORDS: Presentation, school, finger print recognition, face recognition, iris recognition, biometrics,

 

C/C/205. Solution of Boltzmann Sigmoid equation using Solver tool

WORDS:
560
DATE:
2010
PRICE:
9.99 GBP

The paper presents the solution of Boltzmann Sigmoid equation using Excel Solver tool and explaining a step by step procedure of finding and calculating the needed parameters, values and data.

 

KEYWORDS: Boltzmann Sigmoid, Solver tool,