Browse our collection of papers in
Computing Science

Select number of records per page:  

C/C/547. Parallel computer systems and limitations to their performance

WORDS:
1450
DATE:
2014
PRICE:
19.99 GBP

The paper looks at the factors that limit the performance of parallel computer systems (PCS). The concept of PCS is defined, their advantages are outlined, the measurements of PCS performance are examined including speedup, efficiency, power weight, process scheduling and granularity. The importance of accurate measurement of PCS performance is highlighted.

 

KEYWORDS: Parallel computer systems, limitations,

 

C/C/521. From keyboard to computer screen: presentation notes

WORDS:
1050
DATE:
2014
PRICE:
19.99 GBP

The paper offers notes for a 13-slide presentation of the study “From keyboard to computer screen” providing information on the internal components of the computer and core computer concepts, i.e. central processing unit (CPU), memory, binary machine code, computer system, etc. The processing of a signal received from the keyboard is detailed tracing its route to the screen.

 

KEYWORDS: Presentation, notes, keyboard, computer screen,

 

C/EC/496. Computer forensic certifications: analysis of survey data

WORDS:
7450
DATE:
2013
PRICE:
79.99 GBP

The paper presents a chapter from the dissertation on current computer forensic certifications that best match the requirements of the forensic experts. The chapter includes the description of the research methodology and the quantitative and qualitative analysis of the data obtained from an online questionnaire-based survey of computer forensic professionals’ views about the elements required in the field of computer forensics. Conclusions are made on the basis of the survey findings.

 

KEYWORDS: Computer, forensic, certifications, survey,

 

C/C/495. Computer forensics certifications as benchmark of current certifications: project specification

WORDS:
2350
DATE:
2013
PRICE:
29.99 GBP

The paper offers a project specification (PS) and design of the research into computer forensics certifications. The difference between PS and the original research proposal is explained, current requirements in the field of computer forensics certifications are examined, literature is reviewed on the importance of standards and certifications focusing on computer forensics certifications. The questions of the research are outlined supplying information about required resources and methodologies. A project plan is presented.

 

KEYWORDS: Computer forensics, certifications, benchmark, project specification,

 

C/M/3322. String operations in Mike & Co UK

WORDS:
1250
DATE:
2013
PRICE:
19.99 GBP

The paper looks at the application of string operations (SO) in data structures and algorithms of medium-sized companies using a case study of Mike & Co UK. The company’s use of SO is examined and evaluated discussing their applications in customer service, stock of goods, employee management, sales, etc.

 

KEYWORDS: String operations, SO, Mike & Co UK,

 

C/C/480. Dissertation outline. Computer forensics certifications: current issues

WORDS:
630
DATE:
2013
PRICE:
9.99 GBP

The paper presents an outline of the dissertation on the current issues of computer forensics certifications. The aim and question of the research are formulated, the topics and sources of the literature review are defined, the methodology is described.

 

KEYWORDS: Dissertation outline, Computer, forensics, certifications,

 

C/C/428. Exercises in maths for programming

WORDS:
2200
DATE:
2012
PRICE:
29.99 GBP

The paper provides solutions to exercises in maths and programming based on the use of the LU-Crout decomposition method and the Gauss-Seidel method. The paper has no references.

 

KEYWORDS: Maths, programming,

 

C/C/391. Optical fibre communications: problems and solutions

WORDS:
1400
DATE:
2012
PRICE:
19.99 GBP

The paper presents solutions to several problems on optical fibre communications providing calculations and explanations of RMS value, pulse broadening, dispersion compensation, bias voltage, etc. The paper has no references.

 

KEYWORDS: Optical fibre communications,

 

C/C/388. Proposal. Layered Security Architecture for Wireless Sensor Networks

WORDS:
2050
DATE:
2012
PRICE:
29.99 GBP

The paper offers a proposal for the development of a layered approach to the security architecture of Wireless Sensor Networks (WSN) prone to security threats and attacks. The background and objectives of the proposed research are outlined, research methodology is described, its timescale is indicated.

 

KEYWORDS: Proposal, Layered Security Architecture, Wireless Sensor Networks, WSN,

 

C/C/318. Dissertation. An analysis of biometric technology and fingerprint technology

WORDS:
9600
DATE:
2011
PRICE:
99.99 GBP

This dissertation focuses on biometric technology, and aims to discuss fingerprint technology. The objectives are to examine how biometric authentication technology is beginning to transform the user authentication process and what problems may arise from developing such technology, to identify benefits and possible drawbacks from using biometric technologies for the user authentication purposes, and to investigate current practice of the biometric authentication in the UK. The review of literature provides a detailed overview of biometrics, and examines the use of biometrics in the UK. This section is followed by the research methodology, which details the approach the study has taken as well as the data collection methods used. The findings from the data collection methods are detailed and discussed. The conclusion section discusses the objectives set, and provides recommendations.

 

KEYWORDS: Dissertation, biometric technology, fingerprint technology, biometric authentication technology!,

 

C/C/309. A comparative analysis of Java and C++

WORDS:
8050
DATE:
2011
PRICE:
89.99 GBP

This paper focuses on Java and C++ Programming languages and aims to carry out a comparative analysis. The paper begins by providing background information on programming, namely its history and detailed information on Java and C++. The next section of the paper then focuses on Java and examines the programming language, history, characteristics, development, and popularity. The paper then examines the same aspects in relation to the C++ programming language. Examples of C++ and Java implementation are provided, and the paper summaries the pros and cons, as well as the similarities and differences between the two. The two programming languages are compared in relation to syntax, access to memory, memory management, popularity, object orientated programming, and security.

 

KEYWORDS: Java, C++, Programming, memory, memory management, popularity, object orientated programming, security, programming language,

 

C/C/290. An examination of video conferencing

WORDS:
3750
DATE:
2011
PRICE:
39.99 GBP

This paper evaluates video conferencing and the technology surrounding it. The paper presents the background to video conferencing and aims to examine literature that suggests that it is a technology that is a viable alternative to face to face and telephone communication.

 

KEYWORDS: video conferencing, technology, face to face, telephone, communication,

 

C/C/250. The informatic needs of a computer business

WORDS:
1600
DATE:
2011
PRICE:
19.99 GBP

This paper discusses the concept of informatics, which relates to computer science and information management. This is examined in reference to the needs of a small business dealing with the buying and selling of computer accessories. The paper begins by discussing data collection, which is the first attribute of informatics, and this section assesses aspects concerning suppliers, customers and operational functions regarding the supply chain. Data interpretation, retrieving information, segregation, and utilising are all further aspects of informatics. The paper then focuses on ERP application, discussing ways in which it can be incorporated into computer businesses, and this is done through use of McKinsey’s 7S’s framework.

 

KEYWORDS: Informatics, computer science, information management, data collection, suppliers, customers, supply chain, Data interpretation, retrieving information, segregation, utilising, ERP, McKinsey’s 7S’s framework.,

 

C/C/233. Examination of the implementation of school fingerprint security

WORDS:
1800
DATE:
2010
PRICE:
19.99 GBP

This paper presents a proposal for a new system for school fingerprint security, which aims to offer better security for children and peace of mind to parents. The paper begins by outlining fingerprint biometrics, detailing the history, concept, hardware, software, and business application. The paper then outlines how the system would work, followed by an evaluation of the advantages of the system. Data protection and other legislations are discussed in relation to the system, followed by the steps that need to be taken before implementation of the systems. Conclusions are made regarding the cost of the system and parental reaction.

 

KEYWORDS: school fingerprint security, children, biometrics, data protection!,

 

C/M/1678. Presentation. Evaluation of fingerprint recognition systems in school

WORDS:
1
ADD-ONS:
11 Slides
DATE:
2010
PRICE:
19.99 GBP

This presentation focuses on school fingerprint recognition system. Information is given about biometrics, focusing evaluating face, iris and finger print recognition. Further information is given regarding finger print recognition, like the biometrics regarding it and them system at schools, and the presentation concludes by detailing the advantages of this system.

 

KEYWORDS: Presentation, school, finger print recognition, face recognition, iris recognition, biometrics,

 

C/C/205. Solution of Boltzmann Sigmoid equation using Solver tool

WORDS:
560
DATE:
2010
PRICE:
9.99 GBP

The paper presents the solution of Boltzmann Sigmoid equation using Excel Solver tool and explaining a step by step procedure of finding and calculating the needed parameters, values and data.

 

KEYWORDS: Boltzmann Sigmoid, Solver tool,

 

C/LI/51. Is the comprehensive use of language restricted to humans?

WORDS:
2200
DATE:
2010
PRICE:
29.99 GBP

The paper looks at the academic and scientific debate about whether language is a characteristic unique to humans, or whether certain animals or even artificial intelligence can meaningfully communicate. The paper attempts to define language, using the terms applied by researchers, Hockett and Parisi, who saw language as an innate and learned expression, vocally or through gesture, producing the reciprocation and understanding of specialised, meaningful and arbitrary information. The research addresses the possibility that other species are able to use language – with examples from the studies of monkey and ape communication by Arbib, Liebal and Pika (2008). Other research has examined whether artificial intelligence could comprehensively use language. Studies by Lin and Kraus (2010) argue that, to some extent, a type of computer programme used as a training tool for real-life negotiators, can proficiently “talk” to humans.

 

KEYWORDS: Language, communication, animal communication, artificial intelligence,

 

C/C/46. Biometrics and Database Technology

WORDS:
900
DATE:
2008
PRICE:
9.99 GBP

The paper looks at the biometric systems (BS) used for identifying a person's identity outlining the key biometric characteristics, describing database management systems (DBMS) required by BS, and addressing the problems related to the use of database in biometric system. The relationship between biometric science and database development techniques is described giving coverage to the current research in the area.

 

KEYWORDS: Biometric systems, database management,

 

C/C/62. Anti-Spam methods: critical review

WORDS:
2800
DATE:
2008
PRICE:
29.99 GBP

The paper examines spam filtering methods including the method of spam filtering based on the analysis of text information embedded in images, and the method that collects user preference information to formulate the rules in the formal language using Boolean logic simplification. Hypotheses on the concept of spam are critically reviewed, the drawbacks of the methods are identified.

 

KEYWORDS: User Preference, Spam, Anti-Spam Mail System,

 

C/C/45. Comparison of Wireless Local Area Network (WLAN) comparison with other Networks: LAN and WAN

WORDS:
1500
DATE:
2007
PRICE:
19.99 GBP

The paper examines the methods of computer network designs focusing on the features of WLAN and comparing it to LAN (Local Area Network) and WAN (Wide Area Network).

 

KEYWORDS: Computer network, WLAN, LAN, WAN,

 

S/C/55. Fault Tolerance by duplication: an explanation

WORDS:
1500
DATE:
2007
PRICE:
19.99 GBP

The paper examines the concept of 'fault tolerance', or the ability of a system to recover after a failure, focusing on fault tolerance by duplication, i.e. redundancy, diversity, etc. The case of fault tolerance in a California hospital computer system is discussed.

 

KEYWORDS: fault tolerance, duplication,

 

S/C/57. SQL and its interactions with the programming languages

WORDS:
1000
DATE:
2007
PRICE:
19.99 GBP

The paper examines the role of Structured Query Language (SQL) databases in programming analyzing its interactions with the programming languages of Visual Basic, C++ and Java. Examples of these interactions are presented.

 

KEYWORDS: Structured Query Language, SQL, Java, Visual Basic, C++,

 

S/C/61. Java program applications

WORDS:
5000
DATE:
2007
PRICE:
59.99 GBP

The paper reports on a series of tasks related to Java program applications analysing the structures used in programming, providing a step-by-step analysis of the process, and calculating the miles per gallon ratio for several tanks of petrol. Java, programming

 

KEYWORDS: Java, programming,

 

S/C/64. Advanced Database's Oracle tuning techniques and testing

WORDS:
5000
DATE:
2007
PRICE:
59.99 GBP

The paper examines the methods of optimising Oracle focusing on the use of index clustering in a database. Experiments are conducted to test relationships between the depttom and emptom tables and compare an unoptimised database to an index clustered database. Conclusions are made about the benefits and drawbacks of clustering.

 

KEYWORDS: Oracle, database, clustering,

 

C/C/30. Red Ink Productions ? Instant Messaging Systems: An Implementation of an instant messaging system in a company, with accompanying documentation

WORDS:
4700
DATE:
2007
PRICE:
49.99 GBP

Open source (free) software licensed under the GPL was taken and modified to implement an instant messaging at a company called Red Ink Productions. The Jabber server free software, Openfire was used and the Jabber client Exodus, also free software was modified to suit the requirements of the company. Documentation accompanying the software began with an introduction to current instant messaging systems, including a description of the protocols and languages used in the design of current instant messaging systems. Then the design and architecture of the Jabber instant messaging system is described in detail, with the help of a UML use-case diagram. The advantages of the Jabber system are also described. This is followed by a description of the customisations made to the software, and a test plan and documentation on the test plan results. A comprehensive user guide is also provided, which includes a technical user guide for server installation and client user guide for end users who includes detailed screenshots. Then an evaluation is done of the entire process that the author went through in installing the system at the company's premises, followed by a critique of the entire process the author went through in the development of the system.

 

KEYWORDS: Instant messaging, Java, Exodus, Openfire, Jabber, open source, free software, open sou,