نتایج جستجو برای: concealment
تعداد نتایج: 2484 فیلتر نتایج به سال:
Abstract In order to assure the concealment by cryptographic protocols, it is an effective measure prove in a formal logical system. contemporary context of protocol, has be proved using probability theory. There are several concepts One them Bayesian concealment. This study proposes system secret sharing scheme.
introduction: electrophysiological studies have demonstrated a relationship between aging and atrioventricular (av) nodal conduction and refractoriness. the aim of the present study was to determine the effects of nodal aging on dynamic av nodal field potential recording during atrial fibrillation (af) in rabbit. methods: two groups of male new zealand rabbits (neonatal 2-week-olds and adult 12...
In this paper, the problem of spatial error concealment for real-time applications is addressed. The proposed method can be categorized in exemplar-based error concealment approaches. In this category, a patch of corrupted pixels are replaced by another patch of the image that contains correct pixels. For splitting the erroneous block to different patches, a novel context-dependent exemplar-bas...
In this work, JPEG2000 error resilience options and error concealment strategies are discussed and evaluated. Error resilience options and error concealment strategies have been employed to mimic attacks against selective / partial JPEG2000 encryption schemes. Thus the security evaluation of these selective / partial encryption schemes relies on the proper working of the JPEG2000 error concealm...
INTRODUCTION Self-concealment reflects uncomfortable feelings, thoughts, and information people have about themselves that they avoid telling others (Larson & Chastain, 1990). According to Larson and Chastain (1990) these secrets range from the slightly embarrassing to the very distressing with an individual's most traumatic experiences often concealed. Parental attitudes including those involv...
Many advanced video transmission techniques rely on per−packet distortion estimates. To compute reliable estimates, however, the decoder inner workings, including the concealment module used in case of packet losses, should be fully known at the encoder. This paper explores the effects on video distortion estimation of encoder−side erroneous assumptions about the concealment technique used by t...
We introduce model-based schemes for error concealment of networked video. We build appearance models for specific objects in the scene and use these models to replenish any lost information. Due to the models being designed specific to the object, they are able to capture the statistical variations in the object appearance more effectively, thereby leading to better error concealment performan...
A major problem in low-latency Audio over IP transmission is the unpredictable impact of the underlying network, leading to jitter and packet loss. Typically, error concealment strategies are employed at the receiver to counteract audible artifacts produced by missing audio data resulting from the mentioned network characteristics. Known concealment methods tend to achieve only unsatisfactory a...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید