University Degree: Computer Science
Meet the team of inpirational teachers who mark our essays
427 University Degree Computer Science essays
- Marked by Teachers essays 2
file sharing. In this article, I will investigate the situation of file sharing in the UK, and also analyse how persistent sharers may expect to be prosecuted under the Copyright, Designs and Patents Act 1988, as well as other legislation, in the future. The earliest form of file sharing gained popularity in 1998. Released under the name Napster, and developed by Shawn Fanning (an American university student at the time), the service offered users P2P music sharing. The term 'Peer-to-Peer' refers to the way in which content is exchanged.
- Essay length: 3810 words
Cisc v risc. To begin this assignment , I will outline the definition of cisc and risc . Cisc stands for complex instruction set computing and Risc stands for reduced instruction set computing . these two concepts are both types of instruction sets used
in 1970 the main component of a computer was the cpu , which could be the size of a large fridge and was attended by lab technicians. The thought of compressing a cpu down to the size of a small silicone chip was a far fetched concept back then . computers in them days were rewired to perform calculations but three mathematicians John von newman , J.presper Eckert and John Mauchly thought of an idea of storing the instruction set of these calculations .
- Essay length: 3112 words
So our crew decided to create a web site about that, help people understand what is drifting, how everything works. index.html Index page has latest news and information about drifting, events and videos. This page holds most important updates and whatever happens in our website sidew.html This page will hold all information about new events and their timetables, places and prices for entering. videos.html Videos will contain just visual information about drifting, cars, people and events. This page holds a videos flash files and players from other web pages.
- Essay length: 2558 words
(John Sammons, 2012) Forensic technologies are designed to prepare and extract evidence from a seized computer system. The basic method of preserving, detecting and obtaining the electronic evidences was described in. This extraction is performed in such a manner to satisfy the requirements of the courts. Typically, the data that resides on the fixed drive of a system has been erased or otherwise altered in order to protect incriminating information. First of all the investigator has to ensure that system is secure and all the data is safe.
- Essay length: 1560 words
Phong Shading and Gouraud Shading The standard reflection model in computer graphics that compromises between acceptable results and processing cost is the Phong model.
However, once the light radiates from the surface, it does so equally in all directions. It is diffuse lighting that best defines the shape of 3D objects. The reflection is due to molecular interaction between the incident light and the surface material. A surface reflects coloured light when illuminated by white light and the coloured reflected light is due to diffuse reflection. A surface that is a perfect diffuser scatters light equally in all directions. This means that the amount of reflected light seen by the viewer does not depend on the viewer's position. Specular - as with diffuse lighting, the light comes from a point source, but with specular lighting, it is reflected more
- Essay length: 2557 words
Measurement of Processors Performance report. In the experiment, a testing code was developed in C Programming Language. The design involved filling up each memory hierarchy level with data, then by noting down the time taken to access each level, the ban
In the memory hierarchy, each level is distinguished by the response time with the top-most level being the fastest. In most computers, this level is the processor registers which are often accessed in one CPU clock cycle. The next level is the Level 1 (L1) Cache, which is temporally and physically closest to the main processor. The third level is usually the Level 2 (L2) Cache and the forth level is the main memory . We conducted an experiment to measure the data transfer rate between these memory levels and the results are presented and analyzed in this report.
- Essay length: 2428 words
The aim of this project is to develop a web-based control laboratory to serve undergraduate students in the Department of Electrical and Computer Systems Engineering at The University of Auckland.
It will also save a lot of equipment being use at a time and laboratory instructors. With all these benefits from the web-based laboratory, the Department of Electrical and Computer Engineering at the University of Auckland has decided to propose a research project which develops a web-based control laboratory. The developed web-based control laboratory will benefit the undergraduate students within the department. During the development of the web-based control laboratory, it has been considered that both software and hardware designs are necessarily. This report will discuss the background of traditional laboratory versus web-based laboratory in Section 2; Section 3 will define the project objectives and requirements.
- Essay length: 2165 words
The project explains various algorithms that are exercised to recognize the characters present on the California Car License Plate. One of them is Template Matching algorithm that has an ability to store the information of a particular size template in th
Once this was established, the design was transferred on the TI's video development platform DM6437 DVDP for testing and performance analysis. The earlier mentioned algorithmic steps were written in C programming language and demonstration of the project was successfully presented on the TI's DSP board EVM320DM6437. _______________________, Committee Chair Jing Pang, Ph.D. _______________________ Date ACKNOWLEDGMENTS I would sincerely like to thank Dr. Jing Pang for providing me a wonderful opportunity to work on this project, which provided a great exposure to the field of image and video processing.
- Essay length: 12882 words
Expert Systems possess knowledge acquired in practice and which cannot be found in literature or acquired in any other way, but which is invaluable to a business success of a firm or a financial institution. Therefore, the first and the most important advantage and purpose of creating ES is to make the domain knowledge of an expert accessible to a wider circle of people. This would ensure business existence and survival when the expert and his knowledge of doing the work are no longer available to the company.
- Essay length: 2741 words
Information systems development literature review. Since the 1960s Methodologies, Frameworks, Approaches and CASE tools have evolved providing more effective and efficient strategies intended for systems development.
Through utilising a wide variety of resources a clear succint description of these has been provided, delineating philosophies and stating techniques adopted convey within table 2.1-1 located within appendix A. 2.2 Structured Methods Refering to appendix A JSD, SSADM, YSM, Merise and IE can be described as structured approaches. Structured approaches provide "...the concepts for structured programming...applied to analysis and design, and techniques (such as data flow diagramming)..." Avison, D.E & Fitzgerald, G. (2003). Enabling a meticulous, methodological process in which information systems can be developed involving a number of stages.
- Essay length: 14222 words
TCP wireshark. This assignment will investigate the behaviour of TCP (Transmission Control Protocol). The application well suited for this assignment is Wireshark, it has the features suitable for this assignment and enables me to output the relevant grap
I will be using the POST method rather than the GET method as I will be transferring a large amount of data from my computer to another computer. Wireshark will be running during this time to obtain the trace of the TCP segments sent and received from my computer. A first look at the captured trace 1. What is the IP address and TCP port number used by the client computer (source) that is transferring the file to gaia.cs.umass.edu? IP address (source): 192.168.1.102 TCP port: 1161 2.
- Essay length: 1748 words
Geometric Brownian Motion. The aim of this project is to gain an understanding of the Monte Carlo simulation method (Value-at-Risk measure) and to create a user-friendly piece of software that will allow investors to determine the potential risk a chosen
The user friendly software will be created to allow trouble-free navigation throughout the process of finding out how risky a stock can be. The software will also be designed to alert users of any errors that have been made through VBA coding and functions available. Chapter 2: Background A simulation model will be used in this project in order to generate an estimation of a future stock price. However, there are many simulation models used within the financial sector in order to determine potential future stock prices.
- Essay length: 6360 words
To report an infringement of a copyright or other intellectual property right (for example, trademark) user can fill out an automated IP infringement form. This form is the fastest way to report any type of infringement. GOOGLE Google strongly supports intellectual property and copyright law, which are essential to both rewarding creators and supporting the free flow of information. Intellectual property (IP) laws are essential for ensuring that innovators are rewarded for their work and that incentives exist for people and companies to develop new ideas, technologies, and products. Intellectual property rights are not absolute.
- Essay length: 3425 words
Standardized Hardware and Software Several business issues faced the GTAA in trying to implement the common use approach. Air Canada was the dominant carrier at Pearson airport with over 60% of the airport's traffic. As the dominant carrier, Air Canada feared the loss of any competitive advantage it might have due to exclusive use of its gates (which could form a barrier against competitors). There was also a fear of losing self-sufficiency. Since Air Canada felt that its IT network was already superior to those of its competitors, they perceived the common use approach as "leveling the playing field" and did not see any advantage in going to this approach.
- Essay length: 4266 words
Systems Modelling and Simulation - Prey predator model. The goal of this experiment is to model the population dynamics of animals both predator and prey when they are present in an environment.
and the death rate of the predator. Assumptions: 1. The forest is large and the preys are born and die continuously. 2. There is no shortage of food. At time t, the prey population is x. After time t+?t, the prey population is given by : x+ no of prey born in time ?t- no of natural prey deaths in time ?t. The rate of growth during interval ?t is : (x +?x-x)/(t+?t-t) Taking lim ?x/?t= dx/dt. ?t-->0 Thus we are assuming that the number of preys is large enough to support a continuous death and birth rates.
- Essay length: 1200 words
Linux memory management. Linux uses demand paging where the virtual pages are only loaded into physical memory when needed by the process. Swapping occurs when a process needs to bring data from the virtual memory to the physical memory,
Each of these pages has a page frame number (PFN). Linux uses demand paging where the virtual pages are only loaded into physical memory when needed by the process. Swapping occurs when a process needs to bring data from the virtual memory to the physical memory, if there is no space available an old page is swapped out of memory to bring in the new one. Linux the Least Recently Used (LRU) technique to efficiently choose pages which are to be removed from the system.
- Essay length: 694 words
- Essay length: 3000 words
MAKING WAP COMPETE WITH WWW : An Approach To Bring Web Services To Mobile Platform With High Flexibility.
In ten years, we have quickly reached the point where we can no longer afford to consider devices in isolation, but must take into account the larger social and contextual factors surrounding mobile device use". As WAP services are launched in countries all over the world, some people are getting their first experiences of Mobile Internet. There is an incredible activity among WML developers today, and everyone wants to jump on the bandwagon. Still one can hear some HTML-developers being grumpy about abandoning their favorite markup language, and learning a new one that is extremely unforgiving to syntax errors.
- Essay length: 2434 words
This paper firstly aims to argue precisely about various points of view about cookies and secondly intends to examine and debate concerning Internet users' idea, way of thinking, their likely requests and also their level of awareness about cookies. Literature review While electronic commerce has grown rapidly in recent years, most of marketing-website owners are trying to raise their awareness about customer convenience and behavior. It is obvious that if marketers have adequate information about their consumers such as preferred goods and some data about their identity, it can help them to promote their business and also help them to maintain their customers.
- Essay length: 3780 words
IT Security. In this practical we focus on digital signing based on RSA and ElGamal. We also look at the Digital Signature Standard and the use of hashing when signing.
Determine if Bob should accept the signed message as valid. Solution. Bob checks by computing 5444 (mod 5023) = 4678 and also ybbg (mod p) =3796229422943740 = 728. So no, Bob should not accept the message as being validly signed by Alice. C. The questions in this section deal with attacking the El Gamal scheme. 1. In this case, Oscar, the attacker, uses Alice's scheme set-up parameters p = 5023, a = 5 and y = 5a = 3796. Oscar picks random , r1 = 205 and r2 = 1021.
- Essay length: 973 words
laser printers, except that they combine four different toner colors. Color laser printers can also be used as a regular black and white laser printer. LED/LCD printers are types of electro photographic printers that are identical to laser printers in most ways. Both LCD (liquid crystal display) and LED (light-emitting diode) printers use a light source instead of a laser to create an image on a drum. In most contexts, "laser printer" covers LCD and LED printers as well. The print process is almost identical, but LED printers use Light Emitting Diodes to charge the drum, and the other uses Liquid Crystals.
- Essay length: 1250 words
FILE IF IT IS READABLE 19 17 PROGRAM TO COUNT THE WRITABLE FILES OF A PWD 20 18 PROGRAM TO READ A FILENAME AND SHOW THE CONTENTS OF A READABLE FILE IF THE NAME IS OF A DIRECTORY FILE OR SHOW THE CONTENTS IF IT IS A NORMAL FILE OTHERWISE IF IT IS A BLOCK SPECIAL OR CHARACTER SPECIAL FILE THEN SHOW THAT IT IS A SPECIAL FILE 21 -:PROGRAM TO ADD AND MULTIPLY TWO NUMBERS:- SOURCE CODE echo Enter the value of A: read A echo Enter the value of B: read B C = 'expr $A+ $B' echo
- Essay length: 2019 words
Training Booking System with ASP. I believe I have displayed the knowledge required by both of these, in as such as showing that on the client-side you can do things like form validation and changing the appearance of the HTML and CSS.
If not, an error is displayed. Bookings Page - This redirects you back to the Login page if you are not logged in, otherwise gives you the option to either go onto the View Bookings page or the Logout page. - On this page you have the ability to add a trainee, which is done by entering a first name and a last name (these must be valid names, else an error is displayed). Also booking a trainee onto a course; this is done by selecting a course from a drop down menu and then selecting one or more trainees from a select box and confirming it.
- Essay length: 2509 words
Electrical sockets must not be overloaded iv. There must be adequate space around the machine v. Heating and ventilation must be suitable vi. Lighting must be suitable with no glare or reflections vii. Table must be strong enough to support the computers i 2. WORK AREA A well arranged computer work area could enhance the user's comfort during computer experience and his productivity. The computer work area should have enough space to accommodate the user. It should also permit full range of motions that will be involved in carry out the task. Adequate space should be provided for the equipments that make up the computer units Figure 1 WORKING AREA i Overcrowding of computer work area should be avoided.
- Essay length: 2585 words
On the server side there is the encrypted table (cf. table 2 page 1). Table 2: Representation of the encrypted table When you look at the encrypted table, the only things that you can use are the distribution of the tuples into the differ- 1 This example are largely inspided from the example 1 of  page 721 and of the examples of the section 2 of  pages 217 and 218. ent buckets and/or the relations between the partitions of the columns.
- Essay length: 4449 words