Filters
Error concealment in Motion JPEG2000 using wavelet transform
. Error concealment methods do not correct bit errors, but they correct the damaging of image. The time method is based on the wavelet transform and works with the LL sub-band coefficient. In this method we replace...
JA - Elektronika a optoelektronika, elektrotechnika
- 2008 •
- D
Rok uplatnění
D - Stať ve sborníku
Error concealment methods for Motion JPEG2000
. They are exist error concealment methods which are minimize visual image errors in MotionJPEG2000 format. As a primary method the LL subband method is selected, the next methods are filtration method...
JA - Elektronika a optoelektronika, elektrotechnika
- 2007 •
- Jx
Rok uplatnění
Jx - Nezařazeno - Článek v odborném periodiku (Jimp, Jsc a Jost)
Intrusion Detection, Attack Concealement
Intrusion; detection; concealement; camouflage; hacker...
IN - Informatika
- 2004 •
- D
Rok uplatnění
D - Stať ve sborníku
DNA-inspired information concealing- a survey
Information concealing based on DNA structure is proposed. A conjecture on a role of the repeats in DNA is proposed: it is suggested that the repeats are important for the security: DNA is deposit of concealed genetic information....
BD - Teorie informace
- 2010 •
- Jx
Rok uplatnění
Jx - Nezařazeno - Článek v odborném periodiku (Jimp, Jsc a Jost)
Possible solutions to the civil protection by the concealment under the Czech republic conditions
The paper deals with the possibilities of increasing the effectivity and development of the sphere of civil protection by the concealment from the consequences Republic conditions. The method of solving, planning and managing the ci...
IN - Informatika
- 2011 •
- D
Rok uplatnění
D - Stať ve sborníku
Experiments with Packet Loss Concealment in VoIP
Not available...
JA - Elektronika a optoelektronika, elektrotechnika
- 2005 •
- D
Rok uplatnění
D - Stať ve sborníku
Detection of anonymous participants of shares transaction
The paper describes the methods used to conceal true owners of assets and methods to conceal parties of property transfers which using stock or similar types of financial instruments or stock companies or similar t...
AH - Ekonomie
- 2015 •
- Jx •
- Link
Rok uplatnění
Jx - Nezařazeno - Článek v odborném periodiku (Jimp, Jsc a Jost)
Výsledek na webu
Concealed ballistic vest
The concealed ballistic vest (hereinafter referred to as the vest) is intended for use by armed security escorts in transport as a means of individual ballistic protection worn concealed under clothing. The vest is primarily intende...
Other engineering and technologies
- 2020 •
- Gfunk
Rok uplatnění
Gfunk - Funkční vzorek
Improvised shelters - projecting methodology and chosen aspects of building materials
This paper introduces the solution of civil protection by the concealment within territorial units of the municipality with extended jurisdiction of the city of Zlín in the Czech Republic. The methods for improvised shelters evaluat...
IN - Informatika
- 2011 •
- D
Rok uplatnění
D - Stať ve sborníku
How Effective is the Registration of Sales?
Main topics of the document: registration of sales; concealed revenues; estimates; shadow economy...
Finance
- 2017 •
- Jost •
- Link
Rok uplatnění
Jost - Ostatní články v recenzovaných periodicích
Výsledek na webu
- 1 - 10 out of 214 169