forsoplus.com Today's Opening Times 10:30 - 17:00 (BST)

Computer Science Dissertation Examples

Search to find a specific computer science dissertation or browse from the list below:

Proactive and Reactive MANET Protocols Analysis

Ad hoc network Abstract A mobile ad hoc network (MANET) is consisting of wireless mobile nodes. The communication of these mobile nodes is carried out...

MapReduce for Distributed Computing

1.) Introduction A distributed computing system can be defined as a collection of processors interconnected by a communication network such that each processor has its own...

Visual Information Encryption by D-H Key Agreement

Visual Information Encryption by D-H Key Agreement and Visual Cryptography Abstract Visual cryptography provides secured digital transmission which is used only for one time. In order to...

H.264 Video Streaming System on Embedded Platform

ABSTRACT The adoption of technological products like digital television and video conferencing has made video streaming an active research area. This report presents the integration of a...

Analysis of the Security Management Market in Hong Kong

The Security Management Industry INTRODUCTION Security management is the combination of hardware, software, and services that normalizes, aggregates, correlates, and visualizes data from disparate security products. Security...

Impact of the Technological Revolution

1 INTRODUCTION The role of technological revolution has touched every aspect of people's lives from shopping to banking. The changes have great impact on services quality...

Effects of Social Networking on Everyday Life

ABSTRACT Today, the most popular and common topic of many discussions are social networking websites. The Internet connected us, made ​​us even more available, and brought...

Security Issues in Peer-to-peer Networking

ACKNOWLEDGEMENTS: The interest in the field of networking, driven me to take the computer networking as my course in M.Sc. there are many different types of...

Development for an Reliable Internet Service Application

Reliable internet service Abstract The ultimate aim of our project is to provide the design and development for an reliable internet service application which workable...

Public Class Login Form in VB

Private Sub Button2_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles okButton2.Click Try mappDB.UserName = usernameTextBox.Text : mappDB.Password = passwordTextBox.Text Call mappDB.connect() MainForm.Show() Catch ex As Exception Call showError(ex.Message) End Try End Sub Private...

Design of 4 Line Private Exchange Box

INTRODUCTION 1.0 INTRODUCTION Private branch exchange system (PBXs) operates as a connection within private organizations usually a business. Because they incorporate telephones, the general term "extension" is...

Practices of Agile Methods in Project Management

Abstract This paper describes the practices of agile methods from the viewpoint of project management. The project management techniques are complex processes that require the understanding and...

Analysis of Performance Appraisal System

ABSTRACT This article examines the Performance Appraisal System of Opsonin Pharma Ltd. It discusses one previous format of performance appraisal and the current performance appraisal. Author...

Password Management System Advantages and Disadvantages

Project Aim: Passwords management is an important aspect of computer security, it’s the front line of protection for user terminals and it is by far the...

Optical Character Recognition (OCR)

INTRODUCTION 1.1. Optical Character Recognition: Optical Character Recognition (OCR) is the mechanical or electronic interpretation, reading of images of handwritten, typewritten or printed text (usually captured by...

Concepts of Object Oriented Techniques with OO Issues

Abstract Object-oriented frameworks offer reuse at a high design level promising several benefits to the development of complex systems. This paper sought to 1) define the...

Mobile Messaging System Development for Higher Education

Overview Mobiles are one of the most versatile electronics in the present scenario. It constantly keeps us connected with our near ones even when we are...

Mobile Ad Hoc Networks MANET

Abstract Mobile Ad Hoc Network (MANET) is a wireless network capable of autonomous operation. MANET routing has no fixed base station and hence nodes in the...

Characteristics of Java Language

Chapter 2 Literature review About Java:- Initially java language is named as "Oak" in 1991, which is designed for the consumer electronic appliances. Later in 1995 the...

Analysis of Botnet Security Threats

CHAPTER 1 INTRODUCTION 1.1 Introduction During the last few decades, we have seen the dramatically rise of the Internet and its applications to the point which they have...

Intelligent Software Agent

Chapter 1 Intelligent Software Agent 1.1 Intelligent Agent An Agent can be defined as follows: “An Agent is a software thing that knows how to do things...

Incident Handling on Cloud Computing

Introduction Cloud Computing Cloud computing provides people the way to share distributed resources and services that belong to different organizations or sites.As cloud computing allocate the divided...

Human Resource Management System for Resume Processing

Introduction 1.1 Purpose of the System The main aim of is HUMAN RESOURCE MANAGEMENT SYSTEM is automating the resume processing for organization that is applied by the...

Evolution of Smart Homes

I. Introduction Smart homes, the next gigantic leap in the field of home automation, have become an emerging research field in last few decades. Research on...

Six Thinking Hats Model for Learning Tool

Abstract The aim of this project is to implement an effective discussion tool by using six thinking hats model as the mechanism. There is a need...

Computer Forensics Investigation and Techniques

Introduction I am the student of International Advanced Diploma in Computer Studies (IADCS). In this course, I have to do Compute Forensic assignment. The assignment title...

Identifying Clusters in High Dimensional Data

“Ask those who remember, are mindful if you do not know).” (Holy Qur'an, 6:43) Removal Of Redundant Dimensions To Find Clusters In N-Dimensional Data Using Subspace...

HTML and Javascript Tutorial

HTML Basic Document <html> <head> <title>Document name goes here</title> </head> <body> Visible text goes here </body> </html> Heading Elements <h1>Largest Heading</h1> <h2> . . . </h2> <h3> . . . </h3> <h4> . . . </h4> <h5> . ....

Biometric Technologies: Advantages and Disadvantages

Abstract There have two aims of this project. Firstly is to provide an objective analysis of available biometric technologies, to identify their strengths and weaknesses and to...

Design of Internet Service Application on WAP Device

Abstract The ultimate aim of our project is to provide the design and development for an reliable internet service application which workable on the WAP enabled...

Service Oriented Architecture (SOA) Design

Introduction Objective The goal of a Service Oriented Architecture (SOA) is to achieve reusable assets in an agile manner that is aligned with the business needs of...

Get help with your dissertation
Find out more
Build Time: 0.0018 Seconds