نتایج جستجو برای: concealment

تعداد نتایج: 2484  

Journal: :Japan Journal of Industrial and Applied Mathematics 2021

Abstract In order to assure the concealment by cryptographic protocols, it is an effective measure prove in a formal logical system. contemporary context of protocol, has be proved using probability theory. There are several concepts One them Bayesian concealment. This study proposes system secret sharing scheme.

Journal: :physiology and pharmacology 0
vahid khori golestan cardiovascular research center, golestan university of medical science saed saleki golestan cardiovascular research center, golestan university of medical science aref salehi golestan cardiovascular research center, golestan university of medical science alimohammad alizadeh tehran university of medical science mona pourabouk golestan cardiovascular research center, golestan university of medical science fakhri badaghabadi golestan cardiovascular research center, golestan university of medical science

introduction: electrophysiological studies have demonstrated a relationship between aging and atrioventricular (av) nodal conduction and refractoriness. the aim of the present study was to determine the effects of nodal aging on dynamic av nodal field potential recording during atrial fibrillation (af) in rabbit. methods: two groups of male new zealand rabbits (neonatal 2-week-olds and adult 12...

Journal: :Journal of the European Optical Society: Rapid Publications 2007

Journal: :Computers & Electrical Engineering 2009
Mani Ranjbar Shohreh Kasaei

In this paper, the problem of spatial error concealment for real-time applications is addressed. The proposed method can be categorized in exemplar-based error concealment approaches. In this category, a patch of corrupted pixels are replaced by another patch of the image that contains correct pixels. For splitting the erroneous block to different patches, a novel context-dependent exemplar-bas...

2009
Thomas Stütz Andreas Uhl

In this work, JPEG2000 error resilience options and error concealment strategies are discussed and evaluated. Error resilience options and error concealment strategies have been employed to mimic attacks against selective / partial JPEG2000 encryption schemes. Thus the security evaluation of these selective / partial encryption schemes relies on the proper working of the JPEG2000 error concealm...

Journal: :Addictive behaviors 2015
Jessica D Hartman Julie A Patock-Peckham William R Corbin Jonathan R Gates Robert F Leeman Jeremy W Luk Kevin M King

INTRODUCTION Self-concealment reflects uncomfortable feelings, thoughts, and information people have about themselves that they avoid telling others (Larson & Chastain, 1990). According to Larson and Chastain (1990) these secrets range from the slightly embarrassing to the very distressing with an individual's most traumatic experiences often concealed. Parental attitudes including those involv...

2005
Fabio De Vito Juan Carlos De Martin

Many advanced video transmission techniques rely on per−packet distortion estimates. To compute reliable estimates, however, the decoder inner workings, including the concealment module used in case of packet losses, should be fully known at the encoder. This paper explores the effects on video distortion estimation of encoder−side erroneous assumptions about the concealment technique used by t...

Journal: :IEEE Trans. Circuits Syst. Video Techn. 2002
Deepak S. Turaga Tsuhan Chen

We introduce model-based schemes for error concealment of networked video. We build appearance models for specific objects in the scene and use these models to replenish any lost information. Due to the models being designed specific to the object, they are able to capture the statistical variations in the object appearance more effectively, thereby leading to better error concealment performan...

2014
Marco Fink Udo Zölzer

A major problem in low-latency Audio over IP transmission is the unpredictable impact of the underlying network, leading to jitter and packet loss. Typically, error concealment strategies are employed at the receiver to counteract audible artifacts produced by missing audio data resulting from the mentioned network characteristics. Known concealment methods tend to achieve only unsatisfactory a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید