All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Filters

214 169 (0,341s)

Result

Error concealment in Motion JPEG2000 using wavelet transform

. Error concealment methods do not correct bit errors, but they correct the damaging of image. The time method is based on the wavelet transform and works with the LL sub-band coefficient. In this method we replace...

JA - Elektronika a optoelektronika, elektrotechnika

  • 2008
  • D
Result

Error concealment methods for Motion JPEG2000

. They are exist error concealment methods which are minimize visual image errors in MotionJPEG2000 format. As a primary method the LL subband method is selected, the next methods are filtration method...

JA - Elektronika a optoelektronika, elektrotechnika

  • 2007
  • Jx
Result

Intrusion Detection, Attack Concealement

Intrusion; detection; concealement; camouflage; hacker...

IN - Informatika

  • 2004
  • D
Result

DNA-inspired information concealing- a survey

Information concealing based on DNA structure is proposed. A conjecture on a role of the repeats in DNA is proposed: it is suggested that the repeats are important for the security: DNA is deposit of concealed genetic information....

BD - Teorie informace

  • 2010
  • Jx
Result

Possible solutions to the civil protection by the concealment under the Czech republic conditions

The paper deals with the possibilities of increasing the effectivity and development of the sphere of civil protection by the concealment from the consequences Republic conditions. The method of solving, planning and managing the ci...

IN - Informatika

  • 2011
  • D
Result

Experiments with Packet Loss Concealment in VoIP

Not available...

JA - Elektronika a optoelektronika, elektrotechnika

  • 2005
  • D
Result

Detection of anonymous participants of shares transaction

The paper describes the methods used to conceal true owners of assets and methods to conceal parties of property transfers which using stock or similar types of financial instruments or stock companies or similar t...

AH - Ekonomie

  • 2015
  • Jx
  • Link
Result

Concealed ballistic vest

The concealed ballistic vest (hereinafter referred to as the vest) is intended for use by armed security escorts in transport as a means of individual ballistic protection worn concealed under clothing. The vest is primarily intende...

Other engineering and technologies

  • 2020
  • Gfunk
Result

Improvised shelters - projecting methodology and chosen aspects of building materials

This paper introduces the solution of civil protection by the concealment within territorial units of the municipality with extended jurisdiction of the city of Zlín in the Czech Republic. The methods for improvised shelters evaluat...

IN - Informatika

  • 2011
  • D
Result

How Effective is the Registration of Sales?

Main topics of the document: registration of sales; concealed revenues; estimates; shadow economy...

Finance

  • 2017
  • Jost
  • Link
  • 1 - 10 out of 214 169