This note introduces the two main user adjustments of a video monitor,
BRIGHTNESS
and
CONTRAST
. I explain the effect that these controls have
on picture reproduction, and I explain how to set them. This note
applies to computer monitors, studio video monitors, and television
receivers.
2.Uniformity / CONTRAST Software(Ca200Sample_CONTRAST.exe) provides
Measurement of uniformity for chromaticity, luminance etc. and CONTRAST.
Measuring points are 3x3 or 5x5 spots
(CA210樣本程序)
Abstract: Counterfeiting as an international industry covers virtually everything made or manufactured,from auto parts to purses and watches to prescription drugs. In CONTRAST to other counterfeit items, the
自制51編程器
I have build my own programmer. This device can program the AT89C51 and works with it. So it can easily be adapted to programming other devices by itself.
The Atmel Flash devices are ideal for developing, since they can be reprogrammed easy, often and fast. You need only 1 or 2 devices in low cost plastic case for developing. In CONTRAST you need 10 or more high cost windowed devices if you must develop with EPROM devices (e.g. Phillips 87C751).
尋找函數的全局極小值,global minimization of CONTRAST function with random restarts the data are assumed whitened (i.e. with identity covariance matrix). The output is such that Wopt*x are the independent sources.
The kernel-ica package is a Matlab program that implements the Kernel
ICA algorithm for independent component analysis (ICA). The Kernel ICA
algorithm is based on the minimization of a CONTRAST function based on
kernel ideas. A CONTRAST function measures the statistical dependence
between components, thus when applied to estimated components and
minimized over possible demixing matrices, components that are as
independent as possible are found.
This paper presents a novel technique to increase
the quality of medical images based on Histogram
Equalization. In the proposed method first we have
applied a noise reduction method and then we apply
some suitable preprocessing on histogram of the
medical images and after that histogram equalization
has been applied on the new histogram. Our proposed
method in despite of its simplicity has better results in
compare to other usual methods based on histogram
equalization. The quality of resulted images after
applying our proposed methods has been tested on a
database (medical images) with a confirmed criterion
by viewer. Also we have considered a mathematical
criterion for comparing our proposed algorithm with
other available methods for CONTRAST enhancement.
Results show the better efficiency of the proposed
method.
The aip file contains few Matlab routines for 1D line scan analysis, 1D scaling, 2D scaling, image brightness or CONTRAST variation routine and rouitne for finding area between zero cossings of 1D times series.
Abstract—In the future communication applications, users
may obtain their messages that have different importance levels
distributively from several available sources, such as distributed
storage or even devices belonging to other users. This
scenario is the best modeled by the multilevel diversity coding
systems (MDCS). To achieve perfect (information-theoretic)
secrecy against wiretap channels, this paper investigates the
fundamental limits on the secure rate region of the asymmetric
MDCS (AMDCS), which include the symmetric case as a special
case. Threshold perfect secrecy is added to the AMDCS model.
The eavesdropper may have access to any one but not more than
one subset of the channels but know nothing about the sources,
as long as the size of the subset is not above the security level.
The question of whether superposition (source separation) coding
is optimal for such an AMDCS with threshold perfect secrecy
is answered. A class of secure AMDCS (S-AMDCS) with an
arbitrary number of encoders is solved, and it is shown that linear
codes are optimal for this class of instances. However, in CONTRAST
with the secure symmetric MDCS, superposition is shown to
be not optimal for S-AMDCS in general. In addition, necessary
conditions on the existence of a secrecy key are determined as a
design guideline.
Mobile and wireless application development has come a long way in the past few
years. It has progressed beyond the hype of wireless Web applications for consumers
to the reality of high-value mobile applications for corporate users. Opportunities
abound for creating new mobile and wireless applications that provide vital benefits to
any business. A sampling of these benefits includes increased worker productivity,
reduced processing costs, heightened accuracy, and competitive advantage. In CONTRAST
is the concern that developing mobile and wireless applications will involve many new
technologies and concepts that many corporate developers are still learning to use.