نتایج جستجو برای: zone of concealment

تعداد نتایج: 21173899  

2003
Christoffer Rødbro Mads Græsbøll Christensen Søren Vang Andersen Søren Holdt Jensen

In this paper we consider the problem of packet loss concealment for Voice over IP (VoIP). The speech signal is compressed at the transmitter using a sinusoidal coding scheme working at 8 kbit/s. At the receiver, packet loss concealment is carried out working directly on the quantized sinusoidal parameters, based on time-scaling of the packets surrounding the missing ones. Subjective listening ...

Journal: :JASIST 2017
Syavash Nobarany Kellogg S. Booth

Design of peer-review support systems is shaped by the policies that define and govern the process of peer review. An important component of these are policies that deal with anonymity: the rules that govern the concealment and transparency of information related to identities of the various stakeholders (authors, reviewers, editors, and others) involved in the peer-review process. Anonymity po...

2012
Xiao Pan Ding Xiaoxia Du Du Lei Chao Super Hu Genyue Fu Guopeng Chen

The neural basis of self and identity has received extensive research. However, most of these existing studies have focused on situations where the internal representation of the self is consistent with the external one. The present study used fMRI methodology to examine the neural correlates of two different types of identity conflict: identity faking and concealment. Participants were present...

2000
André Kaup

A mandatory requirement for future wireless multimedia communication is the availability of error resilient media codecs. This work discusses error detection and concealment techniques for a layered scalable video decoder, based on the SNR scalability option of the H.263 standard. A concealment method is proposed which uses error frequency and error location statistics for efficient hiding of t...

Journal: :International journal of psychology and educational studies 2023

With the COVID-19 pandemic, people have become inclined to seek online counseling help in addition face-to-face counseling. For individuals who need mental health services, social-physical isolation and quarantine decisions rendered a necessity rather than an option. In this process, needing services may avoid seeking due their self-concealment tendencies or inadequate self-perceived social sup...

2006
YUK YING CHUNG LEO LI FAN CHEN ZENG ZHENG XIAOMING CHEN

The transmission errors in H.264 may propagate in the temporal direction. Errors in intra-coded picture (I-frame) will propagate into the associated P-B frame if they are in the same Group Of Picture (GOP). Therefore it is important to detect errors in the I-frame rather than in the P-B frame. This paper proposes and demonstrates an effective technique of Error-Resilient Coding based on bit-err...

Journal: :IEEE Trans. Consumer Electronics 2000
Myeong-Hoon Jo Woo-Jin Song

We present a novel error-concealment method for MPEG-2 video decoders. Imperfect transmission of block-based compressed images may result in loss of blocks, making image degradation inevitable. In the hybrid error-concealment method, both spatial and temporal error concealment repair the damaged regions through adaptive interpolation in the respective domains. In order for the hybrid method to ...

2013
Bong-Ki Lee Chungsoo Lim Jihwan Park Joon-Hyuk Chang

In this paper, we propose an improved adaptive muting method using a sigmoid function for the packet loss concealment algorithm of ITU-T G.722 Recommendation. The packet loss concealment algorithm performs an adaptive muting to prevent the generation of unnecessary noise during packet loss recovery. While muting is linearly and discontinuously performed according to packet errors, our muting ap...

Journal: :IEEE Trans. Circuits Syst. Video Techn. 2001
Tamer Shanableh Mohammed Ghanbari

Video streaming over a hostile environment such as the Internet, where the available bandwidth varies in time, requires the source to adjust its transmission rate dynamically. Moreover, inevitable packet losses cannot be totally avoided and, hence, the video-streaming schemes should be complemented with appropriate error concealment techniques. In this paper, we highlight the vitality of the bi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید