This note introduces the two main user adjustments of a video monitor, BRIGHTNESS and CONTRAST . I explain the effect that these controls have on picture reproduction, and I explain how to set them. This note applies to computer monitors, studio video monitors, and television receivers.
标签: adjustments BRIGHTNESS introduces CONTRAST
上传时间: 2016-11-13
上传用户:xyipie
2.Uniformity / CONTRAST Software(Ca200Sample_CONTRAST.exe) provides Measurement of uniformity for chromaticity, luminance etc. and CONTRAST. Measuring points are 3x3 or 5x5 spots (CA210样本程序)
标签: Sample_CONTRAST Measurement Uniformity uniformity
上传时间: 2014-01-16
上传用户:无聊来刷下
Abstract: Counterfeiting as an international industry covers virtually everything made or manufactured,from auto parts to purses and watches to prescription drugs. In CONTRAST to other counterfeit items, the
上传时间: 2013-12-13
上传用户:阿谭电器工作室
自制51编程器 I have build my own programmer. This device can program the AT89C51 and works with it. So it can easily be adapted to programming other devices by itself. The Atmel Flash devices are ideal for developing, since they can be reprogrammed easy, often and fast. You need only 1 or 2 devices in low cost plastic case for developing. In CONTRAST you need 10 or more high cost windowed devices if you must develop with EPROM devices (e.g. Phillips 87C751).
标签: programmer program device build
上传时间: 2015-05-11
上传用户:sdq_123
寻找函数的全局极小值,global minimization of CONTRAST function with random restarts the data are assumed whitened (i.e. with identity covariance matrix). The output is such that Wopt*x are the independent sources.
上传时间: 2013-12-15
上传用户:康郎
The kernel-ica package is a Matlab program that implements the Kernel ICA algorithm for independent component analysis (ICA). The Kernel ICA algorithm is based on the minimization of a CONTRAST function based on kernel ideas. A CONTRAST function measures the statistical dependence between components, thus when applied to estimated components and minimized over possible demixing matrices, components that are as independent as possible are found.
标签: independent kernel-ica implements algorithm
上传时间: 2014-01-17
上传用户:yiwen213
This paper presents a novel technique to increase the quality of medical images based on Histogram Equalization. In the proposed method first we have applied a noise reduction method and then we apply some suitable preprocessing on histogram of the medical images and after that histogram equalization has been applied on the new histogram. Our proposed method in despite of its simplicity has better results in compare to other usual methods based on histogram equalization. The quality of resulted images after applying our proposed methods has been tested on a database (medical images) with a confirmed criterion by viewer. Also we have considered a mathematical criterion for comparing our proposed algorithm with other available methods for CONTRAST enhancement. Results show the better efficiency of the proposed method.
标签: Histogram technique increase presents
上传时间: 2017-04-20
上传用户:VRMMO
The aip file contains few Matlab routines for 1D line scan analysis, 1D scaling, 2D scaling, image brightness or CONTRAST variation routine and rouitne for finding area between zero cossings of 1D times series.
标签: scaling contains analysis routines
上传时间: 2014-01-19
上传用户:xmsmh
Abstract—In the future communication applications, users may obtain their messages that have different importance levels distributively from several available sources, such as distributed storage or even devices belonging to other users. This scenario is the best modeled by the multilevel diversity coding systems (MDCS). To achieve perfect (information-theoretic) secrecy against wiretap channels, this paper investigates the fundamental limits on the secure rate region of the asymmetric MDCS (AMDCS), which include the symmetric case as a special case. Threshold perfect secrecy is added to the AMDCS model. The eavesdropper may have access to any one but not more than one subset of the channels but know nothing about the sources, as long as the size of the subset is not above the security level. The question of whether superposition (source separation) coding is optimal for such an AMDCS with threshold perfect secrecy is answered. A class of secure AMDCS (S-AMDCS) with an arbitrary number of encoders is solved, and it is shown that linear codes are optimal for this class of instances. However, in CONTRAST with the secure symmetric MDCS, superposition is shown to be not optimal for S-AMDCS in general. In addition, necessary conditions on the existence of a secrecy key are determined as a design guideline.
标签: Fundamental Limits Secure Class on of
上传时间: 2020-01-04
上传用户:kddlas
Mobile and wireless application development has come a long way in the past few years. It has progressed beyond the hype of wireless Web applications for consumers to the reality of high-value mobile applications for corporate users. Opportunities abound for creating new mobile and wireless applications that provide vital benefits to any business. A sampling of these benefits includes increased worker productivity, reduced processing costs, heightened accuracy, and competitive advantage. In CONTRAST is the concern that developing mobile and wireless applications will involve many new technologies and concepts that many corporate developers are still learning to use.
标签: Essentials Wireless Mobile Design and
上传时间: 2020-05-30
上传用户:shancjb