نتایج جستجو برای: content detectability

تعداد نتایج: 419281  

2004
Sang Won Choi Jinsoo Bae

Based on local optimality, a novel sequential detection scheme is proposed in this paper. The performance of the proposed scheme is compared with that of the sequential probability ratio test (SPRT) and truncated SPRT (TSPRT). The proposed scheme is shown to have higher efficiency, lower complexity, and smaller computational requirements than the SPRT at the cost of partially lower detectabilit...

Journal: :Vision Research 1998
Franz Thoss Bengt Bartsch Joachim Stebel

At the subjective threshold, repeated flash test stimuli are perceived by the observer on only 50% of occasions, since the detectability of a single light stimulus fluctuates with time. For the analysis of these fluctuations we have recorded sequences of positive ("seen") and negative ("not seen") responses, stimulating at 10 sec intervals for 50 min. These records, reflecting the time course o...

2009
Qian Luo Derek Mitchell Xi Cheng Krystal Mondillo Daniel Mccaffrey Tom Holroyd Frederick Carver Richard Coppola James Blair

What makes us become aware? A popular hypothesis is that if cortical neurons fire in synchrony at a certain frequency band (gamma), we become aware of what they are representing. We tested this hypothesis adopting brain-imaging techniques with good spatiotemporal resolution and frequency-specific information. Specifically, we examined the degree to which increases in event-related synchronizati...

2014
James M. Whitaker

Steganalysis aims to detect the presence of hidden information, known as steganography, in digital images. Modern detectors rely on machine learning techniques, using features from digital images to classify them as covers or stegos. Often the ability to detect steganography can be improved through a process called calibration. Calibration attempts to establish a reference for cover features in...

2014
EL MUSTAPHA SAID BOULITE LAHCEN MANIAR ROLAND SCHNAUBELT

We introduce polynomial stabilizability and detectability of well-posed systems in the sense that a feedback produces a polynomial stable C0–semigroup. Using these concepts, the polynomial stability of the given C0–semigroup governing the state equation can be characterized via polynomial bounds on the transfer function. We further give sufficient conditions for polynomial stabilizability and d...

Journal: :SIAM J. Control and Optimization 2001
Mikhail Krichman Eduardo D. Sontag Yuan Wang

This work explores Lyapunov characterizations of the input-output-to-state stability (IOSS) property for nonlinear systems. The notion of IOSS is a natural generalization of the standard zero-detectability property used in the linear case. The main contribution of this work is to establish a complete equivalence between the IOSS property and the existence of a certain type of smooth Lyapunov fu...

1994
Yashwant K. Malaiya Naixin Li

This paper analyzes the e ect of input pro le selection on software testing using the concept of fault detectability pro le. It shows that optimality of the input prole during testing depends on factors such as the planned testing e ort and the error detectability pro le. To achieve ultra-reliable software, selecting test input uniformly among di erent input domains is preferred. On the other h...

Journal: :Applied optics 1981
V N Korwar J R Pierce

The extent of picture degradation of speckle, in particular in synthetic aperture radar pictures, has been investigated in the cases where an observer has to detect (a) a small feature immersed in a darker background, and (b) a square wave grating. In each case, a theoretical model is developed for the observer's detection mechanism, and the probability of correct decision is related to relevan...

1994
Michael Naixin Li Yashwant K. Malaiya

This paper analyzes the effect of input profile selection on software testing using the concept of fault detectability profile. It shows that optimality of the input profile during testing depends on factors such as the planned testing effort and the fault detectability profile. To achieve ultra-reliable software, selecting test input uniformly among different input domains is preferred. On the...

2011
Jessica J. Fridrich Jan Kodovský Vojtech Holub Miroslav Goljan

Content-adaptive steganography constrains its embedding changes to those parts of covers that are difficult to model, such as textured or noisy regions. When combined with advanced coding techniques, adaptive steganographic methods can embed rather large payloads with low statistical detectability at least when measured using feature-based steganalyzers trained on a given cover source. The rece...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید