Chemical Masking

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Masking redux. I: An optimized masking method.

This is the first in a series of two papers on masking. The objective of these papers is to develop a masking protocol that provides valid measures of threshold and is, in general, faster than the plateau method. In this paper, a masking method is developed that can replace the traditional plateau method in most masking situations. This new method is optimized to require fewer masking levels th...

متن کامل

Masking redux. II: A recommended masking protocol.

This is the second in a series of two papers on masking. The objective of these papers is to develop a masking protocol that provides valid measures of threshold and is, in general, faster than the plateau method. In the first paper, a masking method was presented that can replace the traditional plateau method in most masking situations. This new method is optimized to require fewer masking le...

متن کامل

Matrix Masking

where A is a matrix that operates on the n cases, B is a matrix that operates on the p variables, and C is a matrix that adds perturbations or noise. Matrix masking includes a wide variety of standard approaches to SDL: (i) adding noise, i.e., theC in matrix masking transformation of equation [1]; (ii) releasing a subset of observations (delete rows from Z), i.e., sampling; (iii) cell suppressi...

متن کامل

Masking by object substitution: dissociation of masking and cuing effects.

In a newly discovered form of visual masking, a target stimulus is masked by 4 flanking dots if their offset is delayed relative to the target (V. Di Lollo, J. T. Enns, & R. A. Rensink, 2000). In Di Lollo et al. (2000), the dot pattern also cued the relevant target and therefore required deliberate attention. In the present Experiments 2-6, a central arrow cued 1 of 2 letters for an E/F discrim...

متن کامل

Public-key Encryption with Masking Public-key Encryption with Masking

Timed-release encryption, first mentioned by May [12] and discussed by Rivest, Shamir, and Wanger [15], is a cryptographic primitive which enables us to “send a message into the future.” We take a simple approach, called public-key encryption with masking, in order to realize this requirement. In our model, the sender first encrypts a plaintext and “masks” the ciphertext, then send it the recei...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Nature

سال: 1971

ISSN: 0028-0836,1476-4687

DOI: 10.1038/230194a0