First, it is assumed that the information transmission rate at the re-transmission is reduced into M/n according to the transmission parameter control shown in FIG. 3. At this time, a packet configuration of the re-transmission packet is re-built, as follows, so that the already transmitted ...
Since the vector values of mvd[1] are 0 in this example, step S402 may be omitted and step S404 may be modified so as to set the motion vector predictor to the motion vector (mv[1]=pmv[1][ref_idx[1]][mvp_idx[1]]). Next, the video predictive decoding method in the video ...
It is known to one of ordinary skill in the cryptographic arts that the security of many cryptographic inventions relies upon making certain computational intractability assumptions; for example, one may try to prove that a cryptosystem is secure so long as it is difficult to decompose a specific...