نتایج جستجو برای: zone of concealment zoc

تعداد نتایج: 21173903  

2015
Akihiko Masuda P. L. Anderson J. W. Wendell Matthew Price A. B. Feinstein Y. Chou Johanna W. Wendell Ying-Yi Chou Amanda B. Feinstein

Consisting of two cross-sectional studies, the present study investigated whether psychological flexibility mediates the relations between self-concealment and negative psychological outcomes. Study 1 examined whether psychological flexibility mediates the relations between self-concealment and emotional distress in stressful interpersonal situations. In addition to replicating results of Study...

Despite data resilient methods against error that are applied on video data in transmitter side, occurringerror along video data transferring for communication channels is inevitable. Error concealment is a useful method for improving the quality of damaged videos in receiver side. In this paper, a fast and hybrid boundary matching algorithm is presented for more accurate estimating of damaged ...

Journal: :Genetics 1963
T DOBZHANSKY A S HUNTER O PAVLOVSKY B SPASSKY B WALLACE

AYR (1954, 1959), CARSON (1955,1956,1959), BROWN (1957), DOBZHANM s ~ ~ (1957 and other publications), TOWNSEND (1952) and others have pointed out that the genetic structures of populations of the same species inhabiting the central and the peripheral parts of the distribution area are likely to be characteristically different on the average. Central populations have, by and large, mastered a g...

2011
Santosh V. Chapaneri T. Wiegand G. J. Sullivan G. S. Yu M. M. K. Liu M. W. Marcellin

In this paper, we propose content-adaptive refined error concealment schemes for video transmission over packet lossy networks. The proposed spatial and temporal error concealment algorithms improve the reconstructed video quality at the common loss rates encountered on the networks. To reduce the computational complexity, the proposed schemes make use of the existing information of Intra predi...

Journal: :Proceedings. Biological sciences 2005
Miguel A Rodríguez-Gironés Luis Santamaría

The plant community within which flower evolution takes place has largely been ignored. We develop two models for the evolution of nectar concealment when flowers are visited by legitimate pollinators and flower parasites. When there is a single plant species, no level of nectar concealment is evolutionarily stable: any population can be invaded by mutants exhibiting a higher level of nectar co...

Journal: :Ecology and evolution 2016
Miranda M Crowell Lisa A Shipley Meghan J Camp Janet L Rachlow Jennifer S Forbey Timothy R Johnson

Small herbivores face risks of predation while foraging and are often forced to trade off food quality for safety. Life history, behaviour, and habitat of predator and prey can influence these trade-offs. We compared how two sympatric rabbits (pygmy rabbit, Brachylagus idahoensis; mountain cottontail, Sylvilagus nuttallii) that differ in size, use of burrows, and habitat specialization in the s...

2009
Tobias Tröger Henning Heiber Andreas Schmitt André Kaup

Digital TV signals being transmitted over errorprone channels often suffer from lost macro blocks or slices. In literature, a wide range of approaches for error concealment is described exploiting spatial and/or temporal references. In 2008, we introduced a new paradigm for error concealment utilizing several representations of a particular TV signal which are available in multi-broadcast-recep...

Journal: :Computers & Electrical Engineering 2009
Mani Ranjbar Shohreh Kasaei

In this paper, the problem of spatial error concealment for real-time applications is addressed. The proposed method can be categorized in exemplar-based error concealment approaches. In this category, a patch of corrupted pixels are replaced by another patch of the image that contains correct pixels. For splitting the erroneous block to different patches, a novel context-dependent exemplar-bas...

2009
Thomas Stütz Andreas Uhl

In this work, JPEG2000 error resilience options and error concealment strategies are discussed and evaluated. Error resilience options and error concealment strategies have been employed to mimic attacks against selective / partial JPEG2000 encryption schemes. Thus the security evaluation of these selective / partial encryption schemes relies on the proper working of the JPEG2000 error concealm...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید