The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to solve the multi-UAV cooperative path planning problem of low-altitude penetration, the paper proposes an improved Multi-agent Coevolutionary Algorithm (IMACEA), which introduces co-evolution mechanism based on Multi-agent Genetic Algorithm(MAGA) to find the optimal solution of multi-objective optimization problem by combing the agents' perception and response capabilities of environment,...
Erasure control coding has been exploited in communication networks with an aim to improve the end-to-end performance of data delivery across the network. To address the concerns over the strengths and constraints of erasure coding schemes in this application, we examine the performance limits of two erasure control coding strategies, forward erasure recovery and adaptive erasure recovery. Our investigation...
This paper will look at the benefits and limitations of content distribution using Forward Error Correction (FEC) in conjunction with the Transmission Control Protocol (TCP). FEC can be used to reduce the number of retransmissions which would usually result from a lost packet. The requirement for TCP to deal with any losses is then greatly reduced. There are however side-effects to using FEC as a...
A fragile software watermarking scheme for integrity verification of software is proposed in this paper. The algorithm uses the idea of semantic-preserving code substitution for embedding the watermark. With the system, the generated watermark relates closely to the content of software, and the scheme has highly sensitive to different types of attacks. Furthermore, both watermark generating controlled...
With the development of the Internet, getting information through browsing Web pages has become a popular way. How to protect the integrity of a Web page is an urgent problem. As an effective method, a novel fragile watermarking scheme for tamper-proof of Web pages is proposed in this paper for solving the problem. In our scheme, the watermarks that are related to the content of the original Web page...
In this paper, a robust H.264/AVC video transmission system over lossy packet network is investigated and implemented. The H.264/AVC standard has defined a new data partition scheme which can be used to perform unequal loss protection (ULP) in video transmission systems. However, few actual implementation and experiments which integrate data partition and loss protection algorithms have been reported...
We investigate the performance of an experimental wireless relay sensor network comprising a source node, a destination node and dedicated relay nodes. Two relaying algorithms, dynamic relaying and fixed relaying, are tested to find out to what extent the relaying algorithms could bring any benefit to a wireless sensor network. A simple scheme is applied at transmit nodes to eliminate the need for...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.