We analyze the sources of polarization transformation for single photons in a Space-to-Earth quantum communication link, particularly the satellite pointing system, giving an estimate of the effect and discussing poss...
详细信息
For H.264/SVC, different layers or frames have different order of precedence according to their importance on video quality and the decoding process. Network should provide more protection for high priority layers or ...
详细信息
For H.264/SVC, different layers or frames have different order of precedence according to their importance on video quality and the decoding process. Network should provide more protection for high priority layers or frames when SVC stream is transmitted over IP network. This paper proposes an active queue management algorithm based on priority dropping and PID algorithm, called PID_PD, which first drops the least important packets when network congestion arises. PID_PD implements differentiated service in IP layer to provide high quality video for end user. In addition, PID_PD does not create a side effect for the performance of control system. In this paper, we use BCC (Binomial Congestion Control) as source rate control protocol. BCC and PID_PD form a close-loop control system. By using a classic control theoretic approach to analyze the stability of the close-loop system, we present a method to decide the PID_PD parameters. Simulation shows PID_PD can protect important video data well, lower the disturbance of background flow, and decrease the packet loss rate of SVC flow.
It is important for students getting suitable feedback information when either they are doing or completing a learning activity. This research tries to know what kind of feedback message is really useful to students. ...
详细信息
It is important for students getting suitable feedback information when either they are doing or completing a learning activity. This research tries to know what kind of feedback message is really useful to students. For this purpose, this paper develops a workable e-learning environment with feedback mechanism to gather the learning effects of students with different kinds of feedbacks. The experiment involves five fifth-grade classes and divides five classes into three different groups. The students in the control group have no feedback and students in the other two groups have different kinds of feedback messages. The analysis of experiment data contains two parts: the first one evaluates the feedback efficiencies for all groups;and, then all students will be separated into three clusters based on their academic achievement in order to do further analysis.
It has become a trend to integrate automatic industries via Internet and wireless applications over network. Along with the advancement of technology development, research on wireless applications and remote control h...
详细信息
Scheduling through wireless shared channels is a very challenging problem because of each user's link-state variations through time. The challenge lies in the support of the quality of service (QoS) of each user u...
详细信息
ISBN:
(纸本)9783800729616
Scheduling through wireless shared channels is a very challenging problem because of each user's link-state variations through time. The challenge lies in the support of the quality of service (QoS) of each user under the uncertainty of channel behavior. This problem becomes even more difficult for some of the 2.5G and 3.5G network architectures (e.g EDGE,HSDPA, HDR) where the supported transmission rate can take multiple values and the channel can not be modeled by the traditional ON-OFF model. In this paper we propose Expo-pred-wei, a new scheduling algorithm, which take advantage of the channel variations in order to maximize the total cell throughput and at the same time to preserve, in an efficient way, a minimum QoS for each user. In contrast to other proposed algorithms, our algorithm exhibits very good performance in a wide set of traffic scenarios including Real-Time (RT) or Non-Real-Time (NRT) traffic as well as mixed RT and NRT traffic.
To improve management of the main water resource in Egypt, the River Nile, the Aswan High Dam was constructed and fully operated between 1964 and 1971 aiming to control the floods and fluctuation in water provisioning...
详细信息
Many models have been proposed to analyze the performance of the IEEE 802.11 distributed coordination function (DCF) and the IEEE 802.11e enhanced distributed coordination function (EDCA) under saturation condition. T...
详细信息
In order to improve the detection of malicious tampering images, it is necessary to decrease the fragility of hidden watermarks, even for digital images which have been incidentally distorted. In this paper, we propos...
详细信息
ISBN:
(纸本)9078677015
In order to improve the detection of malicious tampering images, it is necessary to decrease the fragility of hidden watermarks, even for digital images which have been incidentally distorted. In this paper, we propose a new invariant semi-fragile digital watermarking technique based on eigenvalues and eigenvectors of real symmetric matrix generated by the four pixel pairs. A signature bit for detecting the malicious tampering of an image is generated using the dominant eigenvector. And the multi-rings Zernike transform (MRZT) is proposed to achieve geometric invariance based on the fuzzy C-means and Zernike moment. The MRZT method is to the geometric distortions even when the image is under malicious attacks. Experimental results show that this algorithm can resist high quality JPEG compression, and improve the detection performance of various malicious tampering.
A 2D ternary barcode detection system employing a dual threshold method has been developed to increase both detection speed and range. This system, adaptable to any ternary barcode pattern through the subtraction of e...
详细信息
In reconfigurable systems, reconfiguration latency is a very important factor impact the system performance. In this paper, a framework is proposed that integrates the temporal partitioning and physical design phases ...
详细信息
暂无评论