نتایج جستجو برای: period of concealment
تعداد نتایج: 21175160 فیلتر نتایج به سال:
In this paper, the problem of spatial error concealment for real-time applications is addressed. The proposed method can be categorized in exemplar-based error concealment approaches. In this category, a patch of corrupted pixels are replaced by another patch of the image that contains correct pixels. For splitting the erroneous block to different patches, a novel context-dependent exemplar-bas...
In this work, JPEG2000 error resilience options and error concealment strategies are discussed and evaluated. Error resilience options and error concealment strategies have been employed to mimic attacks against selective / partial JPEG2000 encryption schemes. Thus the security evaluation of these selective / partial encryption schemes relies on the proper working of the JPEG2000 error concealm...
Identifying factors influencing a species' ecological niche and demography is a prerequisite for species conservation. However, our understanding of the interplay between demographic rates and biotic/abiotic factors is still poor for most species of conservation concern. We evaluated relevance of eight hypotheses relating to timing of breeding, temporal nest exposure, nest concealment, topograp...
Background & Aim: Randomized clinical trials (RCTs) are studies which are able to provide the most valid evidence to compare various interventions in health research. Biases can affect the quality of research and ultimately make the results of a study invalid. One of the most important biases is selection bias. The best way to reduce selection bias is the use of random allocation. The aim of th...
Many advanced video transmission techniques rely on per−packet distortion estimates. To compute reliable estimates, however, the decoder inner workings, including the concealment module used in case of packet losses, should be fully known at the encoder. This paper explores the effects on video distortion estimation of encoder−side erroneous assumptions about the concealment technique used by t...
INTRODUCTION Self-concealment reflects uncomfortable feelings, thoughts, and information people have about themselves that they avoid telling others (Larson & Chastain, 1990). According to Larson and Chastain (1990) these secrets range from the slightly embarrassing to the very distressing with an individual's most traumatic experiences often concealed. Parental attitudes including those involv...
Error concealment methods have become very important in particular when transmitting video streams over error prone wireless links. Often a retransmission of corrupted sequences is not possible and thus the receiver has to make the best out of the received stream. The contributions of this article are the following: firstly, a performance comparison of various error concealment strategies (stra...
The MPEG-2 compression algorithm, due to the use of variable length coding, is very sensitive to channel disturbances. A single bit error during transmission leads to noticeable degradation of the decoded sequence quality in that part or entire slice information is lost until the next resynchronization point is reached. Error concealment (EC) methods are employed at the decoder side to deal wit...
We introduce model-based schemes for error concealment of networked video. We build appearance models for specific objects in the scene and use these models to replenish any lost information. Due to the models being designed specific to the object, they are able to capture the statistical variations in the object appearance more effectively, thereby leading to better error concealment performan...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید