Get help now

Computer Science

We found 47 free essay samples on Computer Science for you

An Extensive Comparative Study of Cluster Validity Indices

An extensive comparative study of cluster validity indices Olatz Arbelaitz, Ibai Gurrutxagan, Javier Muguerza, Jesu´ sM.Pe´ rez, In˜ igo Perona Department of Computer Architecture and Technology, University of the Basque Country UPV/EHU, Manuel Lardizabal 1, 20018 Donostia, Spain article info Article history: Received 3 February 2012 Received in revised form 26 July 2012 Accepted 31…

Paper samples

Open Document
Pages: 36
Words: 8863

Frame Relay and Leased Lines

In networking there are many options in having data transferred from one location to another. Two of which include frame relay and leased lines. Frame relay is a communication method that transfers data by dividing information into packets and sending them over a virtual network. Frame relay is a difficult process to understand and to…

Computer Science,

Computers,

Innovation,

Technology

Open Document
Pages: 7
Words: 1633

Educational Software Reviews

Titles reviewed here: Elmo’s Computer Phone CD-ROM Suitcase BusyTown Best Christmas Ever Elmo’s Computer Phone Ages: 12 months – 3 years Price: $79.95 Distributor: Hilad 02 9700 9377 Publisher: Comfy Interactive Requirements: 486 DX, Win 95, 8 MB RAM, 4 X CD-ROM Rating: lllll Along with the Comfy keyboard this product is definitely the best…

Computer Science,

Computers,

Technology

Open Document
Pages: 3
Words: 549

The y2K Problem y2K: Nearing Disaster or Minor Computer Flaw

By Pete Conti Imagine that, as you do annually, you are counting the minutes until the New Year arrives. You are watching Dick Clark announce that the countdown will begin soon, and you feel anxious. Finally, as you hear the offbeat 5-4-3-2-1-0, and let out a sigh of relief, something goes wrong. At precisely 12:00…

Computer Science,

Computers,

Innovation,

Technology

Open Document
Pages: 5
Words: 1100

Fedora: A Secure Operating System

Fedora is a popular open source Linux-based operating system. Fedora is designed as a secure, general purpose operating system. The operating system is developed on a six month release cycle, under the guidance of the Fedora Project. Fedora is sponsor by Red Hat. According to the Fedora Project, Fedora is “always free for anyone to…

Computer Science,

Computers

Open Document
Pages: 10
Words: 2278

Image Processing What It Is

Image processing is a method to convert an image into digital form and perform operations on it and in order to get an enhanced image or to extract some useful information from it. It is a type of signal dispensation in which input is image, like video frame or photograph and output may be image…

Computer Science,

Technology

Open Document
Page: 1
Words: 171

Data Integrity in the Database

GURU NANAK COLLEGE ,BUDHLADA SESSION: 2018-19 Assignment of : JAVA PROGRAMMING Topic : Integrity Submitted To: Submitted By: Prof. Rekha Kalra Manpreet Kaur MCA(LE)-2 INTEGRITY Integrity means that uniformity and uniformitarianism. DATA INTEGRITY : Data integrity word is a combination of two words: DATA + INTEGRITY = DATA INTEGRITY. 1.DATA: Facts and statistics which are…

Paper samples

Open Document
Pages: 4
Words: 961

Password-Based Smartcard Authentication Scheme in Network Environments

In various network environments if a user needs to use or control a remote server, the user first needs to pass the authentication scheme of the server. To provide a secure authentication system, password-based methods are often used in many remote log-in servers. Password authentication with smart card is one of the most suitable and…

Computer Science,

Technology

Open Document
Pages: 42
Words: 10469

Text Extraction from Images and IBM Watson Services

SUBMITTED BY SHASHWAT AGRAHARI SECTION D Reg. No: 150905170 [email protected] Roll No: 38 8087007163 Under the Guidance of: Rohit Bhargav Business Owner (IBM) Persistent Systems Ltd. DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING August 2018 ACKNOWLEDGEMENT I would like to thank Mr. Rohit Bhargav, my mentor, for helping me learn and guiding me throughout the course…

Paper samples

Open Document
Pages: 11
Words: 2506

SCONE: A Security Mechanism for Linux Containers against Outside Attacks

Abstract Linux containers is a very important and useful system because of the need for few resources consumption, fast startup times, and high I/O performance especially when it’s compared to virtual machines (VMs) on hypervisors, in multi-tenant environments. This paper is focused on how Linux containers can be secured from attackers who enforced through software…

Computer Science,

Computers

Open Document
Pages: 14
Words: 3336
1 2 5