8,106 research outputs found
Transmission of variable bit rate video over an Orwell ring
Asynchronous Transfer Mode (ATM) is fast emerging as the preferred information
transfer technique for future Broadband Integrated Services Digital Networks (BISON),
offering the advantages of both the simplicity of time division circuit switched techniques
and the flexibility of packet switched techniques. ATM networks with their inherent rate
flexibility offer new opportunities for the efficient transmission of real time Variable Bit
Rate (VBR) services over such networks. Since most services are VBR in nature when
efficiently coded, this could in turn lead to a more efficient utilisation of network resources
through statistical multiplexing. Video communication is typical of such a service and could
benefit significantly if supported with VBR video over ATM networks. [Continues.
Revisiting Speech Content Privacy
In this paper, we discuss an important aspect of speech privacy: protecting
spoken content. New capabilities from the field of machine learning provide a
unique and timely opportunity to revisit speech content protection. There are
many different applications of content privacy, even though this area has been
under-explored in speech technology research. This paper presents several
scenarios that indicate a need for speech content privacy even as the specific
techniques to achieve content privacy may necessarily vary. Our discussion
includes several different types of content privacy including recoverable and
non-recoverable content. Finally, we introduce evaluation strategies as well as
describe some of the difficulties that may be encountered.Comment: Accepted to ISCA Security and Privacy in Speech Communication (1st
SPSC Symposium
A Novel Approach for Speech to Text Recognition System Using Hidden Markov Model
Speech recognition is the application of sophisticated algorithms which involve the transforming of the human voice to text. Speech identification is essential as it utilizes by several biometric identification systems and voice-controlled automation systems. Variations in recording equipment, speakers, situations, and environments make speech recognition a tough undertaking. Three major phases comprise speech recognition: speech pre-processing, feature extraction, and speech categorization. This work presents a comprehensive study with the objectives of comprehending, analyzing, and enhancing these models and approaches, such as Hidden Markov Models and Artificial Neural Networks, employed in the voice recognition system for feature extraction and classification
Polar communications: Status and recommendations. Report of the Science Working Group
The capabilities of the existing communication links within the polar regions, as well as between the polar regions and the continental United States, are summarized. These capabilities are placed in the context of the principal scientific disciplines that are active in polar research, and in the context of how scientists both utilize and are limited by present technologies. Based on an assessment of the scientific objectives potentially achievable with improved communication capabilities, a list of requirements on and recommendations for communication capabilities necessary to support polar science over the next ten years is given
Audio Inpainting
(c) 2012 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. Published version: IEEE Transactions on Audio, Speech and Language Processing 20(3): 922-932, Mar 2012. DOI: 10.1090/TASL.2011.2168211
Comparison of CELP speech coder with a wavelet method
This thesis compares the speech quality of Code Excited Linear Predictor (CELP, Federal Standard 1016) speech coder with a new wavelet method to compress speech. The performances of both are compared by performing subjective listening tests. The test signals used are clean signals (i.e. with no background noise), speech signals with room noise and speech signals with artificial noise added. Results indicate that for clean signals and signals with predominantly voiced components the CELP standard performs better than the wavelet method but for signals with room noise the wavelet method performs much better than the CELP. For signals with artificial noise added, the results are mixed depending on the level of artificial noise added with CELP performing better for low level noise added signals and the wavelet method performing better for higher noise levels
Field-programmable gate array design of image encryption and decryption using Chua’s chaotic masking
This article presents a simple and efficient masking technique based on Chua chaotic system synchronization. It includes feeding the masked signal back to the master system and using it to drive the slave system for synchronization purposes. The proposed system is implemented in a field programmable gate array (FPGA) device using the Xilinx system generator tool. To achieve synchronization, the Pecora-Carroll identical cascading synchronization approach was used. The transmitted signal should be mixed or masked with a chaotic carrier and can be processed by the receiver without any distortion or loss. For different images, the security analysis is performed using the histogram, correlation coefficient, and entropy. In addition, FPGA hardware co-simulation based Xilinx Artix7 xc7a100t-1csg324 was used to check the reality of the encryption and decryption of the images
- …