منابع مشابه
Response method in audiometry.
PURPOSE This study compared the speed, false-alarm rate, and participant preference of different response methods (raising a hand, pushing a response button, and giving an oral response) for measuring pure-tone thresholds. METHOD Thirty female university students with normal hearing participated. Response method order was randomly assigned to 6 different groups. Air-conduction thresholds were...
متن کاملMasking redux. I: An optimized masking method.
This is the first in a series of two papers on masking. The objective of these papers is to develop a masking protocol that provides valid measures of threshold and is, in general, faster than the plateau method. In this paper, a masking method is developed that can replace the traditional plateau method in most masking situations. This new method is optimized to require fewer masking levels th...
متن کاملIn-situ audiometry: How close is it to conventional audiometry?
Technology in the hearing aid industry is ever changing. One of the many features that may improve accuracy of hearing aid fi ttings and patients ’ satisfaction is the inception of in-situ audiometry, which allows the clinician to measure hearing thresholds with a hearing aid in the patient ’ s ear. Objective : The present study aimed to investigate the validity of in-situ audiometry measured w...
متن کاملA Rational Unsharp Masking Method for TV Applications
In this paper, we present an Unsharp Masking-based approach for edge enhancing for TV application. The proposed scheme enhances the true details, limits the overshoot near sharp edges and attenuates the temporal artifacts which are visible in an image sequence. Simulations show that the processed sequence presents sharp edges which make it more pleasant to the human eye. Moreover, the amount of...
متن کاملA Sound Method for Switching between Boolean and Arithmetic Masking
Since the announcement of the Differential Power Analysis (DPA) by Paul Kocher and al., several countermeasures were proposed in order to protect software implementations of cryptographic algorithms. In an attempt to reduce the resulting memory and execution time overhead, a general method was recently proposed, consisting in “masking” all the intermediate data. This masking strategy is possibl...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Journal of the Acoustical Society of America
سال: 1969
ISSN: 0001-4966
DOI: 10.1121/1.1972292