Envelope filter sequence to delete blinks and overshoots
نویسندگان
چکیده
منابع مشابه
Envelope filter sequence to delete blinks and overshoots
BACKGROUND Eye movements have been used in control interfaces and as indicators of somnolence, workload and concentration. Different techniques can be used to detect them: we focus on the electrooculogram (EOG) in which two kinds of interference occur: blinks and overshoots. While they both draw bell-shaped waveforms, blinks are caused by the eyelid, whereas overshoots occur due to target local...
متن کاملThe Right to Delete
Most of us have incidents in our past that we'd rather leave there, but that is increasingly difficult in a world teeming with devices and services that capture our words and actions and record them indefinitely. Instead of organically being forgotten, records of the past increasingly persist in digital storage unless and until they are deleted by someone. Should an individual have the right to...
متن کاملHow to Delete a Secret
This paper discusses the secure data erasure problem and introduces a new Proof of Deletion protocol, which assures secure data deletion in a way that any independent third party can verify cryptographically. The use of cryptography in data deletion is not new, but previous solutions are unsatisfactory as they merely return a single bit: whether the deletion is successful. However, this single ...
متن کاملOvershoots and undershoots of Lévy Processes
We obtain a new fluctuation identity for a general Lévy process giving a quintuple law describing the time of first passage, the time of the last maximum before first passage, the overshoot, the undershoot and the undershoot of the last maximum. With the help of this identity, we revisit the results of Klüppelberg, Kyprianou and Maller [Ann. Appl. Probab. 14 (2004) 1766–1801] concerning asympto...
متن کاملDuty to Delete on Non-Volatile Memory
We firstly suggest new cache policy applying the duty to delete invalid cache data on Non-volatile Memory (NVM). This cache policy includes generating random data and overwriting the random data into invalid cache data. Proposed cache policy is more economical and effective regarding perfect deletion of data. It is ensure that the invalid cache data in NVM is secure against malicious hackers.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: BioMedical Engineering OnLine
سال: 2015
ISSN: 1475-925X
DOI: 10.1186/s12938-015-0046-0