Bridging the Vocabulary Gap between Health Seekers and Healthcare Knowledge Abstract? Bridging the Vocabulary Gap between Health Seekers and Healthcare Knowledge. The vocabulary gap between health seekers and providers has hindered the cross-system operability and the inter-user < Final Year Projects 2016 > reusability. To bridge this gap, this paper presents a novel scheme to…
Bridging the Vocabulary Gap between Health Seekers and Healthcare Knowledge Abstract?Bridging the Vocabulary Gap between Health Seekers and Healthcare Knowledge. The vocabulary gap between health seekers and providers has hindered the cross-system operability and the inter-user reusability. To bridge this gap,this paper presents a novel scheme to code the medical records by jointly utilizing local…
BRINT: Binary Rotation Invariant and NoiseTolerant Texture Classification Abstract? BRINT: Binary Rotation Invariant and NoiseTolerant Texture Classification. In this paper, we propose a simple, efficient, yet robust multiresolution approach to texture classification?binary rotation invariant and noise tolerant (BRINT). The proposed approach is very fast to build, very compact while remaining robust to illumination variations, rotation…
Bug navigator management system Abstract?Bug navigator management system. A bug navigation system or defect tracking system is a software application that keeps track of reported software bugs in software development projects. It may be regarded as a type of issue < Final Year Projects 2016 > tracking system. Many bug tracking systems, such as those…
Building a Scalable Database-Driven Reverse Dictionary Abstract? Building a Scalable Database-Driven Reverse Dictionary. We describe the design and implementation of a reverse dictionary. Unlike a traditional forward dictionary, which < Final Year Projects 2016 > maps from words to their definitions, a reverse dictionary takes a user input phrase describing the desired concept, and returns…
Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation Abstract?With the wide deployment of public cloud computing infrastructures, using clouds to host data query services has become an appealing solution for the advantages on scalability and cost-saving. However, some data might be sensitive that the data owner does not want to…
BURSE: A Bursty andSelf-Similar Workload Generator for Cloud Computing Abstract? BURSE: A Bursty andSelf-Similar Workload Generator for Cloud Computing. As two of the most important characteristics of workloads, burstiness and self-similarity are gaining more and more attention. Workload generation, which is a key technique for performance analysis and simulations, has also attracted an increasing interest…
By-Passing Infected Areas in Wireless Sensor Networks Using BPR Abstract? By-Passing Infected Areas in Wireless Sensor Networks Using BPR. Abnormalities in sensed data streams indicate the spread of malicious attacks, hardware failure and software corruption among the different nodes in a wireless sensor network. These factors of node infection can affect generated and incoming data…
Byzantine failiure using control zones Abstract?Byzantine failiure using control zones.We consider the problem of reliably broadcasting messages in a network where some nodes are likely to fail. We consider the most general failure model: the Byzantine model, where the failing nodes have an arbitrary behavior, and may actively try to destabilize the network. We focus…
Campus automation Abstract?Campus automation With the development of digital campus in university, many new requirements to Office Automation (OA) system are put forward. Design of a new OA system based on modern digital campus platform was presented in this paper. The key points between digital campus platform and application system integration technology were discussed in…
CEDAR: A Low-Latency and Distributed Strategy for Packet Recovery in Wireless Networks Abstract? Underlying link-layer protocols of well-established wireless networks that use the conventional ?store-and-forward? design paradigm cannot provide highly sustainable reliability and stability in wireless communication, which introduce signi?cant barriers and setbacks in scalability and deployments of wireless networks. In this paper, we propose…
Channel Estimation/Equalization with Adaptive Modulation and Coding over Multipath Faded Channels for WiMAX Abstract? Channel Estimation/Equalization with Adaptive Modulation and Coding over Multipath Faded Channels for WiMAX. Different order modulations combined with different coding schemes, allow sending more bits per symbol, thus achieving higher throughputs and better spectral efficiencies. However, it must also be noted…