نتایج جستجو برای: zone of concealment zoc

تعداد نتایج: 21173903  

ژورنال: حیات 2016
جانانی, لیلا, محمدی, مینا,

Background & Aim: Randomized clinical trials (RCTs) are studies which are able to provide the most valid evidence to compare various interventions in health research. Biases can affect the quality of research and ultimately make the results of a study invalid. One of the most important biases is selection bias. The best way to reduce selection bias is the use of random allocation. The aim of th...

Journal: :Journal of the European Optical Society: Rapid Publications 2007

2005
Fabio De Vito Juan Carlos De Martin

Many advanced video transmission techniques rely on per−packet distortion estimates. To compute reliable estimates, however, the decoder inner workings, including the concealment module used in case of packet losses, should be fully known at the encoder. This paper explores the effects on video distortion estimation of encoder−side erroneous assumptions about the concealment technique used by t...

Journal: :Addictive behaviors 2015
Jessica D Hartman Julie A Patock-Peckham William R Corbin Jonathan R Gates Robert F Leeman Jeremy W Luk Kevin M King

INTRODUCTION Self-concealment reflects uncomfortable feelings, thoughts, and information people have about themselves that they avoid telling others (Larson & Chastain, 1990). According to Larson and Chastain (1990) these secrets range from the slightly embarrassing to the very distressing with an individual's most traumatic experiences often concealed. Parental attitudes including those involv...

Journal: :Elektrotechnik und Informationstechnik 2012
Luca Superiori Olivia Nemethova Markus Rupp

Error concealment methods have become very important in particular when transmitting video streams over error prone wireless links. Often a retransmission of corrupted sequences is not possible and thus the receiver has to make the best out of the received stream. The contributions of this article are the following: firstly, a performance comparison of various error concealment strategies (stra...

1997
Sofia Tsekeridou Ioannis Pitas

The MPEG-2 compression algorithm, due to the use of variable length coding, is very sensitive to channel disturbances. A single bit error during transmission leads to noticeable degradation of the decoded sequence quality in that part or entire slice information is lost until the next resynchronization point is reached. Error concealment (EC) methods are employed at the decoder side to deal wit...

2014
Marco Fink Udo Zölzer

A major problem in low-latency Audio over IP transmission is the unpredictable impact of the underlying network, leading to jitter and packet loss. Typically, error concealment strategies are employed at the receiver to counteract audible artifacts produced by missing audio data resulting from the mentioned network characteristics. Known concealment methods tend to achieve only unsatisfactory a...

Journal: :IEEE Trans. Circuits Syst. Video Techn. 2002
Deepak S. Turaga Tsuhan Chen

We introduce model-based schemes for error concealment of networked video. We build appearance models for specific objects in the scene and use these models to replenish any lost information. Due to the models being designed specific to the object, they are able to capture the statistical variations in the object appearance more effectively, thereby leading to better error concealment performan...

2010
Po-Kang Lin Chuen-Ching Wang Chien-Hsiang Hong

The MPEG-2 video compression standard is commonly used in real-time video transmission. In real-time video transmission, a little bit error can cause huge data lost in the video sequence. The errors and data loss degrade the quality of video. The error concealment method is useful to overcome the errors in the broken slice of MPEG-2. In this paper, we present an efficient error concealment algo...

2006
MA RAN ZHANG ZHAO-YANG AN PING

Error concealment on the end of decoder, which makes use of the correctly received video data to conceal the lost video, does not need any redundancy data and has no impact to bandwidth of network. A new concealment method based on multiple motion predictions is proposed here. In this paper, motion vectors in the past and/or future frames are used to achieve the current motion vectors when the ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید