influence maximization in social networks

Get Complete Project Material File(s) Now! » social influence analysis applications Influence propagation studies have found applications in various fields. From studying human, animal or even plant epidemics [78, 92, 133] to viral marketing [99], social media analytics [161], spread...

Side-Channel Security Evaluation & Methodologies

Get Complete Project Material File(s) Now! » Advanced Encryption Standard (AES) In Secret-key cryptography, the Advanced Encryption Standard (AES) [105], also known as Rijndael, is a famous block-cipher too, which is designed by Joan Daemen and Vincent Rijmen. AES is...

Multicast scenario with linearly degraded multicast channels

Get Complete Project Material File(s) Now! » SoftCast: A joint source-channel coding scheme Source-channel separation theorem tells us that in point-to-point communication we can perform source coding and channel coding separately. However, in the broadcast scenario, a joint source-channel coding...

Color formation process in digital camera

Get Complete Project Material File(s) Now! » Manual selection of masks These approaches require the user to select manually the areas of occlusion in the images [CPT03] or in the frames of videos [PSB05] where the pixel information will be...

Integration of full Safety and Security Features into Autonomous Vehicle Model

Get Complete Project Material File(s) Now! » Security modeling and verification in the mapping phase As to be discussed in Chapter 3, most security modeling describes the detailed implementation of security protocols, and takes place in the last phases of...

Access technology and emulation technique

Get Complete Project Material File(s) Now! » Live video streaming In the case of live video streaming, the source is producing the media while the user asks for it. The main goal is therefore to minimize the latency between the...

A Practical Evaluation of Higher-order MIMO Block Detection 

Get Complete Project Material File(s) Now! » INTERFERENCE MANAGEMENT The performance limits of current mobile networks in relation to spectral efficiency and reliability will be constrained by interference-limited scenarios arising from widespread HetNet deployments [33]. The received signal at the...

Data-driven evaluation of SAR information extraction methods 

Get Complete Project Material File(s) Now! » Fundamentals of SAR RADAR is an acronym used for RAdar Detection And Ranging. It refers to a method developed for target acquisitions and distance measurements by means of radio or microwave measurements. A...

Magnetic Resonance Imaging background 

Get Complete Project Material File(s) Now! » Image contrast and acquisition parameters An MRI contrast consists of transcoding the acquired NMR signal into gray levels. It reflects the relaxation times and spin density differences between the image tissues. The main...

Satellite image interpretation 

Get Complete Project Material File(s) Now! » Considering the distance to target object The fuzzy landscape defined by Equation 2.10 is adequate when the size of the target object is comparable to the size of the concavity. However, when this...