Showing 457–468 of 2025 results

  • Breast Cancer Histopathology Image Analysis: A Review

    Breast Cancer Histopathology Image Analysis: A Review

    0 out of 5
    4,500

    Breast Cancer Histopathology Image Analysis: A Review Abstract?Breast Cancer Histopathology Image Analysis: A Review. This paper presents an overview of methods that have been proposed < Final Year Projects > for the analysis of breast cancer histopathology images. This research area has become particularly relevant with the advent of whole slide imaging (WSI) scanners, which…

  • Java Projects—Data Mining

    Bridging the vocabulary gap

    0 out of 5
    4,500

    Bridging the vocabulary gap Abstract?Bridging the vocabulary gap. The vocabulary gap between health seekers and providers has hindered the cross-system operability and the inter-user reusability. To bridge this gap, this paper presents a novel scheme to code the medical records by jointly utilizing local mining and global learning approaches, which are tightly linked and mutually…

  • Bridging the Vocabulary Gap between Health Seekers and Healthcare Knowledge

    Bridging the Vocabulary Gap between Health Seekers and Healthcare Knowledge

    0 out of 5
    4,500

    Bridging the Vocabulary Gap between Health Seekers and Healthcare Knowledge Abstract? Bridging the Vocabulary Gap between Health Seekers and Healthcare Knowledge. The vocabulary gap between health seekers and providers has hindered the cross-system operability and the inter-user < Final Year Projects 2016 > reusability. To bridge this gap, this paper presents a novel scheme to…

  • Bridging the Vocabulary Gap between Health Seekers and Healthcare Knowledge

    Bridging the Vocabulary Gap between Health Seekers and Healthcare Knowledge

    0 out of 5
    4,500

    Bridging the Vocabulary Gap between Health Seekers and Healthcare Knowledge Abstract?Bridging the Vocabulary Gap between Health Seekers and Healthcare Knowledge. The vocabulary gap between health seekers and providers has hindered the cross-system operability and the inter-user reusability. To bridge this gap,this paper presents a novel scheme to code the medical records by jointly utilizing local…

  • Matlab_Dip

    BRINT: Binary Rotation Invariant and NoiseTolerant Texture Classification

    0 out of 5
    4,500

    BRINT: Binary Rotation Invariant and NoiseTolerant Texture Classification Abstract? BRINT: Binary Rotation Invariant and NoiseTolerant Texture Classification. In this paper, we propose a simple, efficient, yet robust multiresolution approach to texture classification?binary rotation invariant and noise tolerant (BRINT). The proposed approach is very fast to build, very compact while remaining robust to illumination variations, rotation…

  • Java Projects — Cloud Computing

    Budget-Driven Scheduling Algorithms for Batches of MapReduce Jobs in Heterogeneous Clouds

    0 out of 5
    4,500

    Budget-Driven Scheduling Algorithms for Batches of MapReduce Jobs in Heterogeneous Clouds Abstract?Budget-Driven Scheduling Algorithms for Batches of MapReduce Jobs in Heterogeneous Clouds. In this paper, we consider task-level scheduling algorithms with respect to budget and deadline constraints for a batch of MapReduce jobs on a set of provisioned heterogeneous (virtual) machines in cloud platforms. The…

  • Bug navigator management system

    Bug navigator management system

    0 out of 5
    3,500

    Bug navigator management system Abstract?Bug navigator management system. A bug navigation system or defect tracking system is a software application that keeps track of reported software bugs in software development projects. It may be regarded as a type of issue < Final Year Projects 2016 > tracking system. Many bug tracking systems, such as those…

  • Java Projects—Data Mining

    Building a Scalable Database-Driven Reverse Dictionary

    0 out of 5
    4,500

    Building a Scalable Database-Driven Reverse Dictionary   Abstract? Building a Scalable Database-Driven Reverse Dictionary. we describe the design and implementation of a reverse dictionary. Unlike a traditional forward dictionary, which maps from words to their definitions, a reverse dictionary takes a user input phrase describing the desired concept, and returns a set of candidate words…

  • Building a Scalable Database-Driven Reverse Dictionary

    Building a Scalable Database-Driven Reverse Dictionary

    0 out of 5
    4,500

    Building a Scalable Database-Driven Reverse Dictionary Abstract? Building a Scalable Database-Driven Reverse Dictionary. We describe the design and implementation of a reverse dictionary. Unlike a traditional forward dictionary, which < Final Year Projects 2016 > maps from words to their definitions, a reverse dictionary takes a user input phrase describing the desired concept, and returns…

  • Java Project

    Building a Scalable System for Stealthy P2P-Botnet Detection

    0 out of 5
    4,500

    Building a Scalable System for Stealthy P2P-Botnet Detection Abstract?Building a Scalable System for Stealthy P2P-Botnet Detection. Peer-to-peer (P2P) botnets have recently been adopted by botmasters for their resiliency against take-down efforts. Besides being harder to take down, modern botnets tend to be stealthier in the way they perform malicious activities, making current detection approaches ineffective….

  • Java Projects—Data Mining

    Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation

    0 out of 5
    4,500

    Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation Abstract?With the wide deployment of public cloud computing infrastructures, using clouds to host data query services has become an appealing solution for the advantages on scalability and cost-saving. However, some data might be sensitive that the data owner does not want to…

  • Java Projects — Cloud Computing

    Building Optimized Web Browser Using Cache Services In Cloud Computing

    0 out of 5
    4,500

    Building Optimized Web Browser Using Cache Services In Cloud Computing   Abstract?Security has become a major concern for mobile devices when mobile users browsing malicious websites. Existed security solutions may rely on human factors to achieve a good result against phishing websites and SSL Strip-based Man-In-The-Middle (MITM) attack. < Final Year Project > This paper…

End of content

End of content