نتایج جستجو برای: zone of concealment
تعداد نتایج: 21173899 فیلتر نتایج به سال:
In this paper we consider the problem of packet loss concealment for Voice over IP (VoIP). The speech signal is compressed at the transmitter using a sinusoidal coding scheme working at 8 kbit/s. At the receiver, packet loss concealment is carried out working directly on the quantized sinusoidal parameters, based on time-scaling of the packets surrounding the missing ones. Subjective listening ...
Design of peer-review support systems is shaped by the policies that define and govern the process of peer review. An important component of these are policies that deal with anonymity: the rules that govern the concealment and transparency of information related to identities of the various stakeholders (authors, reviewers, editors, and others) involved in the peer-review process. Anonymity po...
The neural basis of self and identity has received extensive research. However, most of these existing studies have focused on situations where the internal representation of the self is consistent with the external one. The present study used fMRI methodology to examine the neural correlates of two different types of identity conflict: identity faking and concealment. Participants were present...
A mandatory requirement for future wireless multimedia communication is the availability of error resilient media codecs. This work discusses error detection and concealment techniques for a layered scalable video decoder, based on the SNR scalability option of the H.263 standard. A concealment method is proposed which uses error frequency and error location statistics for efficient hiding of t...
With the COVID-19 pandemic, people have become inclined to seek online counseling help in addition face-to-face counseling. For individuals who need mental health services, social-physical isolation and quarantine decisions rendered a necessity rather than an option. In this process, needing services may avoid seeking due their self-concealment tendencies or inadequate self-perceived social sup...
The transmission errors in H.264 may propagate in the temporal direction. Errors in intra-coded picture (I-frame) will propagate into the associated P-B frame if they are in the same Group Of Picture (GOP). Therefore it is important to detect errors in the I-frame rather than in the P-B frame. This paper proposes and demonstrates an effective technique of Error-Resilient Coding based on bit-err...
We present a novel error-concealment method for MPEG-2 video decoders. Imperfect transmission of block-based compressed images may result in loss of blocks, making image degradation inevitable. In the hybrid error-concealment method, both spatial and temporal error concealment repair the damaged regions through adaptive interpolation in the respective domains. In order for the hybrid method to ...
In this paper, we propose an improved adaptive muting method using a sigmoid function for the packet loss concealment algorithm of ITU-T G.722 Recommendation. The packet loss concealment algorithm performs an adaptive muting to prevent the generation of unnecessary noise during packet loss recovery. While muting is linearly and discontinuously performed according to packet errors, our muting ap...
Video streaming over a hostile environment such as the Internet, where the available bandwidth varies in time, requires the source to adjust its transmission rate dynamically. Moreover, inevitable packet losses cannot be totally avoided and, hence, the video-streaming schemes should be complemented with appropriate error concealment techniques. In this paper, we highlight the vitality of the bi...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید