73,223 research outputs found
RTP control protocol (RTCP) extended report (XR) block for independent reporting of burst/fgp discard metrics
This document defines an RTP Control Protocol (RTCP) Extended Report
(XR) block that allows the reporting of burst/gap discard metrics
independently of the burst/gap loss metrics for use in a range of RTP
applications
On the optimality of individual entangling-probe attacks against BB84 quantum key distribution
It is shown that an existing method to study ideal individual attacks on the
BB84 QKD protocol using error discard can be adapted to reconciliation with
error correction, and that an optimal attack can be explicitly found. Moreover,
this attack fills Luetkenhaus bound, independently of whether error positions
are leaked to Eve, proving that it is tight. In addition, we clarify why the
existence of such optimal attacks is not in contradiction with the established
``old-style'' theory of BB84 individual attacks, as incorrectly suggested
recently in a news feature.Comment: 12 pages, 3 figure
Evidence for late polynesian colonization of New Zealand: University of Waikato radiocarbon measurements
We present radiocarbon determinations for 271 New Zealand archaeological samples measured at the University of Waikato Radiocarbon Dating Laboratory between 1975 and 1995. A discard protocol is applied to the series and the list culled to winnow the acceptable dates from those that may incorporate error. None of the 221 acceptable Ā¹ā“C determinations older than 600 BP (in the case of terrestrial samples) or 930 BP (in the case of marine and estuarine shell) extends beyond cal AD 1250. This conclusion supports the short chronology model of New Zealand prehistory presented by Anderson (1991)
Discarding in beam trawl fisheries: optimisation of discard sampling, evaluation of reducing technical measures and sensibilisation of the sector
Beam trawling for flatfish is the dominant activity in the Belgian fisheries fleet. This activity is characterised by a considerable environmental impact and a high discard rate of bottom-dwelling fish and benthic invertebrates. international pressure on beam trawl fisheries leading to future European measures to reduce or potentially even ban Research on discard practices is currently conducted in the framework of the National Data Gathering Program, but is mainly focussed on commercial fishes. Data on noncommercial species are mostly lacking. Such data are indispensable to assess the impact of beam trawling on the marine ecosystem, and to develop and maintain an towards non-commercial species requires substantial adaptations of the existing sampling protocols and analysis methods.Future implementation of discard reducing measures or even a discard ban will have a severe impact on the fisheries sector. Therefore, such measures should be anticipated by the sector by the development of more selective fishing gear or alternative fishing techniques. Either way, research on discards should be conducted in close cooperation with Belgian fleet members and the results should be communicated to all interested parties.TOETS is an interdisciplinary project which aims to meet the needs in discard research by: (1) developing a suitable sampling protocol to monitor discards of commercial and non-commercial species; (2) assessing the bycatch reducing effect of beam trawls rigged with different types of technical adaptations; (3) informing the sector concerning bycatch reducing measures and cooperating with the sector during the development of reducing technical adaptations; (4) investigating the discard practices in different fishing grounds (Southern Bight and central North Sea, English Channel, Irish Sea, Celtic Sea, Bay of Biscay) concerning driving forces and discard raising procedures
Improved quality of experience of reconstructed H.264/AVC encoded video sequences through robust pixel domain error detection
The transmission of H.264/AVC encoded sequences over noisy wireless channels generally adopt the error detection capabilities of the transport protocol to identify and discard corrupted slices. All the macroblocks (MBs) within each corrupted slice are then concealed. This paper presents an algorithm that does not discard the corrupted slices but tries to detect those MBs which provide major visual artefacts and then conceal only these MBs. Results show that the proposed solution, based on a set of image-level features and two Support Vector Machines (SVMs), manages to detect 94.6% of those artefacts. Gains in Peak Signal-to-Noise Ratios (PSNR) of up to 5.74 dB have been obtained when compared to the standard H.264/AVC decoder.peer-reviewe
Quantum JPEG
The JPEG algorithm compresses a digital image by filtering its high
spatial-frequency components. Similarly, we introduce a quantum protocol that
uses the quantum Fourier transform to discard the high-frequency qubits of an
image, downsampling it to a lower resolution. This allows to capture, compress
and send images even with limited quantum resources for storage and
communication. We show under which conditions this protocol is advantageous
with respect to its classical counterpart.Comment: 10 pages, 7 figures; [v2] Minor corrections and improvement
Recommended from our members
Analysing the EAP-TLS handshake and the 4-way handshake of the 802.11i standard
The IEEE 802.11i standard has been designed to enhance security in wireless networks. The EAP-TLS handshake aims to provide mutual authentication between supplicant and authentication server, and then derive the Pairwise Master Key (PMK). In the 4 -way handshake the supplicant and the authenticator use PMK to derive a fresh pairwise transient key (PTK). The PMK is not used directly for security while assuming the supplicant and authenticator have the same PMK before running 4- way handshake. In this paper, the EAP-TLS handshake and the 4-way handshake phases have been analysed with a proposed framework using Isabelle tool. In the analysis, we have found a new Denial-of-Service (DoS) attack in the 4-way handshake. The attack prevents the authenticator from receiving message 4 after the supplicant sends it out. This attack forces the authenticator to re-send the message 3 until time out and subsequently to de-authenticate supplicant. This paper has proposed improvements to the 4-way handshake to avoid the Denial-of-Service attack
- ā¦