نتایج جستجو برای: high payload
تعداد نتایج: 2062887 فیلتر نتایج به سال:
Cross-Domain Payload Migration: Space payload development typically occurs over relatively long timelines, given the risks, costs, and other factors. This fact motivates developers to investigate other payloads and platforms, in aviation and terrestrial systems, for example, as a means of gaining experience with stateof-the-art technology and exercising the methods and processes used in enginee...
Real-time distributed groupware often performs poorly when network conditions are not optimal. One approach to improving performance is to first look at the characteristics of the information being exchanged by the system, such as payload size and frequency. However, the diversity of tasks, implementations, and groups makes it is difficult to generalize about groupware characteristics. This pap...
In this paper we describe field trials of an admittance-based Autonomous Loading Controller (ALC) applied to a robotic Load-Haul-Dump (LHD) machine at an underground mine near Örebro, Sweden. The ALC was tuned and field tested by using a 14-tonne capacity Atlas Copco ST14 LHD mining machine in piles of fragmented rock, similar to those found in operational mines. Several relationships between t...
One of the audio watermarking schemes with highest payload published to date is Fallahpour scheme, achieving about 3 kbps [1]. A keybased security improvement to this algorithm is proposed in [2] while significatively maintaining the payload. In this letter, a high throughput and compact hardware architecture for the Security Improved Fallahpour Audio Watermarking Scheme is proposed, demonstrat...
Quick response (QR) code has become one of the more popular two-dimensional barcodes because of its greater data capacity and higher damage resistance. The barcode scanners can easily extract the information hidden in the QR code while scanning the data modules. However, some sensitive data directly stored in QR codes are insecure in real-world QR applications, such as the e-ticket and e-coupon...
Large-scale network services such as data delivery often incorporate new functions by interposing intermediaries on the network. Examples of forwarding intermediaries include rewalls, content routers, protocol converters, caching proxies, and multicast servers. With the move toward network storage, even static Web servers act as intermediaries to forward data from storage to clients. This paper...
Keywords: LSB steganography Stego-image Image steganalysis Hybrid edge detection a b s t r a c t Steganography is the art and science of hiding data into information. The secret message is hidden in such a way that no one can apart from the sender or the intended recipient. The least significant bit (LSB) substitution mechanism is the most common steganographic technique for embedding a secret ...
In this paper a high payload lossless digital image watermarking technique based on Integer Wavelet Transform is proposed. Digital watermarking is the process of embedding the watermark image into a host image which is imperceptible by human visual system. The small deviations in data values are not allowed in certain images for obvious reasons and a potential risk of a person misinterpreting a...
In this paper, we propose two blind adaptive audio watermarking schemes based on complex cepstrum transform (CCT) domain features. In first scheme (SchemeI), each audio segment is divided into two subsets having approximately same statistical mean value using down-sampling method. Since the human auditory system (HAS) is not much sensitive to the minute change of the wavelet high-frequency comp...
Instruments proposed to satisfy measurement objectives of future NASA AOs, and the NRC Decadal Survey missions, will need on-board processing technologies to support autonomy, operations, and science data processing. Traditionally, payload design flows down from measurement objectives, to algorithm design, to realization on a computational platform with limited capabilities. We will describe a ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید