Tag: Computer Science

The guides below were written by our professional writers, as a learning aid to help you with your studies. If you are looking for help with your studies, we offer a a range of services provided by fully qualified academics in your field of study.

Services

Articles

Implementation of Binary Space Partitioning Algorithm
10th Dec 2019
Introduction: ABSTRACT “BSP”- Binary Space Partitioning is a project which is going to deal with the complexity of space division, Binary Space Partitioning is a method of recursively subdividing a space into ...

Malware and Social Engineering Attacks
10th Dec 2019
Introduction: SOCIAL ENGINEERING ATTACKS While social engineering is closely related with cybersecurity today, it is not restricted to vulnerabilities of computer and network systems. Several established practices...

Processes of Data-Intensive Machine-Learning
10th Dec 2019
Introduction: ABSTRACT Machine learning addresses the vital question of how to construct computers that improve by itself through experience and self-learning. It is one of today’s most rapidly and fast growing ...

Computer Personal Assistant Software Design
10th Dec 2019
Introduction:                                            CHAPTER 1                                        INTRODUCTION  1.1 Introdu...

Role of Cloud Computing in Cyber Resilience
9th Dec 2019
Introduction: Table of Contents Introduction Review of literature Research Problem and Discussion Introduction Cloud computing is being acclaimed as the penultimate answer for the issues of indeterminate traffic ...

HTML and Javascript Tutorial
6th Dec 2019
Introduction: HTML Basic Document Document name goes here Visible text goes here Heading Elements Largest Heading . . . . . . . . . . . . Smallest Heading Text Elements This is a para...

Service Oriented Architecture (SOA) Design
6th Dec 2019
Introduction: Introduction Objective The goal of a Service Oriented Architecture (SOA) is to achieve reusable assets in an agile manner that is aligned with the business needs of the organization. The SOA Reference...

Intelligent Software Agent
6th Dec 2019
Introduction: Chapter 1 Intelligent Software Agent 1.1 Intelligent Agent An Agent can be defined as follows: “An Agent is a software thing that knows how to do things that you could probably do yourself if you ha...

Optical Character Recognition (OCR)
6th Dec 2019
Introduction: INTRODUCTION 1.1. Optical Character Recognition: Optical Character Recognition (OCR) is the mechanical or electronic interpretation, reading of images of handwritten, typewritten or printed text (usua...

Mobile Ad Hoc Networks MANET
6th Dec 2019
Introduction: Abstract Mobile Ad Hoc Network (MANET) is a wireless network capable of autonomous operation. MANET routing has no fixed base station and hence nodes in the network are mobile and self configuring. A ...

Concepts of Object Oriented Techniques with OO Issues
6th Dec 2019
Introduction: Abstract Object-oriented frameworks offer reuse at a high design level promising several benefits to the development of complex systems. This paper sought to 1) define the concepts of object oriented...

Characteristics of Java Language
6th Dec 2019
Introduction: Chapter 2 Literature review About Java:- Initially java language is named as “Oak” in 1991, which is designed for the consumer electronic appliances. Later in 1995 the name was changed to ...

Visual Information Encryption by D-H Key Agreement
6th Dec 2019
Introduction: Visual Information Encryption by D-H Key Agreement and Visual Cryptography Abstract Visual cryptography provides secured digital transmission which is used only for one time. In order to make visual c...

Public Class Login Form in VB
6th Dec 2019
Introduction: Private Sub Button2_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles okButton2.Click Try mappDB.UserName = usernameTextBox.Text : mappDB.Password = passwordTextBox.Text Cal...

Design of 4 Line Private Exchange Box
6th Dec 2019
Introduction: INTRODUCTION 1.0 INTRODUCTION Private branch exchange system (PBXs) operates as a connection within private organizations usually a business. Because they incorporate telephones, the general term R...

Proactive and Reactive MANET Protocols Analysis
6th Dec 2019
Introduction: Ad hoc network Abstract A mobile ad hoc network (MANET) is consisting of wireless mobile nodes. The communication of these mobile nodes is carried out without any centralized control. Routing is a cr...