Motivated by recent results in multiple description image coding over wireless networks, we propose a scheme for transmission of multiple descriptions through h
This paper presents an optimization problem about terminal distribution network path, defining the research problem through its distribution operation process,
A digital certificate under Public Key Infrastructure has a defect of Man-in-the-Middle Attack that performs hash collision attacks. In this paper, we propose a
In order to analysis the abnormal vehicle behavior by trajectory fitting effectively, the whole process is divided into three steps: target detection and tracki