36 research outputs found

    Multiple description coding technique to improve the robustness of ACELP based coders AMR-WB

    Get PDF
    In this paper, a concealment method based on multiple-description coding (MDC) is presented, to improve speech quality deterioration caused by packet loss for algebraic code-excited linear prediction (ACELP) based coders. We apply to the ITU-T G.722.2 coder, a packet loss concealment (PLC) technique, which uses packetization schemes based on MDC. This latter is used with two new designed modes, which are modes 5 and 6 (18,25 and 19,85 kbps, respectively). We introduce our new second-order Markov chain model with four states in order to simulate network losses for different loss rates. The performance measures, with objective and subjective tests under various packet loss conditions, show a significant improvement of speech quality for ACELP based coders. The wideband perceptual evaluation of speech quality (WB-PESQ), enhanced modified bark spectral distortion (EMBSD), mean opinion score (MOS) tests and MUltiple Stimuli with Hidden Reference and Anchor (MUSHRA) for speech extracted from TIMIT database confirm the efficiency of our proposed approach and show a considerable enhancement in speech quality compared to the embedded algorithm in the standard ITU-T G.722.2

    A novel approach to emergency management of wireless telecommunication system

    Get PDF
    The survivability concerns the service continuity when the components of a system are damaged. This concept is especially useful in the emergency management of the system, as often emergencies involve accidents or incident disasters which more or less damage the system. The overall objective of this thesis study is to develop a quantitative management approach to the emergency management of a wireless cellular telecommunication system in light of its service continuity in emergency situations – namely the survivability of the system. A particular wireless cellular telecommunication system, WCDMA, is taken as an example to ground this research.The thesis proposes an ontology-based paradigm for service management such that the management system contains three models: (1) the work domain model, (2) the dynamic model, and (3) the reconfiguration model. A powerful work domain modeling tool called Function-Behavior-Structure (FBS) is employed for developing the work domain model of the WCDMA system. Petri-Net theory, as well as its formalization, is applied to develop the dynamic model of the WCDMA system. A concept in engineering design called the general and specific function concept is applied to develop a new approach to system reconfiguration for the high survivability of the system. These models are implemented along with a user-interface which can be used by emergency management personnel. A demonstration of the effectiveness of this study approach is included.There are a couple of contributions with this thesis study. First, the proposed approach can be added to contemporary telecommunication management systems. Second, the Petri Net model of the WCDMA system is more comprehensive than any dynamic model of the telecommunication systems in literature. Furthermore, this model can be extended to any other telecommunication system. Third, the proposed system reconfiguration approach, based on the general and specific function concept, offers a unique way for the survivability of any service provider system.In conclusion, the ontology-based paradigm for a service system management provides a total solution to service continuity as well as its emergency management. This paradigm makes the complex mathematical modeling of the system transparent to the manager or managerial personnel and provides a feasible scenario of the human-in-the-loop management

    A-Interface Over Internet Protocol For User-Plane Connection Optimization In GSM/EDGE Radio Access Network

    Get PDF
    This thesis will cover a detailed study about the main motivations and benefits from using IP as a transport protocol for specifically A-interface in GERAN for Circuit Switched User-Plane (CS-UP) connection, in addition to the required protocols. The main study in this document will be around Real Time Protocol (RTP), Real Time Control Protocol (RTCP) negotiation for RTP packets multiplexing, for both cases, with and without RTP header compression. The focus will be about the communication between the Base Station Controller (BSC) and the Media GateWay (MGW), the bandwidth gain in accordance to the multiplexing delay for processing and buffering, the voice Quality of Service (QoS) and some other parameters

    Utilizing DSP for IP telephony applications in mobile terminals

    Get PDF
    TÀssÀ diplomityössÀ etsitÀÀn ja mÀÀritellÀÀn optimaalinen ohjelmistoarkkitehtuuri reaaliaikaisen puheenkoodauksen mahdollistamiseksi mobiilin laitteen Internet-puheluohjelmistossa. Arkkitehtuurille asetettiin vaatimus, jonka mukaan puhelu ja siihen liittyvÀ puheen reaaliaikaisuus ei saa rajoittaa tai liikaa kuormittaa laitteen muuta toiminnallisuutta. TyössÀ kÀytetty mobiili laite tarjoaa mahdollisuuden hyödyntÀÀ kahta prosessoria. Toinen prosessoreista on tarkoitettu yleisille kÀyttöjÀrjestelmille sekÀ ohjelmistoille ja toinen signaalinkÀsittelyoperaatioille. Suunniteltu arkkitehtuuri yhdistÀÀ nÀiden kahden prosessorin toiminnallisuuden ja mahdollistaa reaaliaikaisen puheenkoodauksen (sekÀ toisto ettÀ ÀÀnitys) mobiliisissa laitteessa. Arkkitehtuuri toteutettiin ja sen suorituskykyÀ arvioitiin erilaisilla mittauksilla ja parametreilla. Havaittiin, ettÀ toteutus suoriutuu erinomaisesti sille asetetuista vaatimuksista. Todettiin myös, ettÀ kÀytettÀessÀ ainoastaan laitteen yhtÀ prosessoria reaaliaikavaatimus ei tÀyty. TÀmÀ johtuu puhekoodekin matemaattisesta kompleksisuudesta ja laitteen rajoitetuista ominaisuuksista. Työn aikana jÀtettiin kaksi patenttihakemusta.In this thesis, an optimal software architecture is studied and defined for enabling a real-time speech coding scheme in an Internet telephony application of a mobile terminal. According to a requirement set for the architecture, a phone call and the related real-time speech coding shall not limit or overload other functionality of the terminal. The mobile terminal utilized in this thesis provides a potential to take advantage of the efficiency of a dual core processor. One of the processors is designed for general purpose operating systems, and the other one for signal processing operations. The designed software architecture combines the functionality of these processors and enables real-time speech coding (both playback and capture) in the device. The architecture was implemented and its performance was evaluated with different measurements and parameters. It was observed that the implementation outperforms the requirements set. It was also confirmed that the performance of the general purpose processor is inadequate for real-time operations with the chosen speech coder/decoder. Two patent applications were filed by the author during the writing of this thesis

    Improved Performance of Secured VoIP Via Enhanced Blowfish Encryption Algorithm

    Get PDF
    Both the development and the integration of efficient network, open source technology, and Voice over Internet Protocol (VoIP) applications have been increasingly important and gained quick popularity due to new rapidly emerging IP-based network technology. Nonetheless, security and privacy concerns have emerged as issues that need to be addressed. The privacy process ensures that encryption and decryption methods protect the data from being alternate and intercept, a privacy VoIP call will contribute to private and confidential conversation purposes such as telebanking, telepsychiatry, health, safety issues and many more. Hence, this study had quantified VoIP performance and voice quality under security implementation with the technique of IPSec and the enhancement of the Blowfish encryption algorithm. In fact, the primary objective of this study is to improve the performance of Blowfish encryption algorithm. The proposed algorithm was tested with varying network topologies and a variety of audio codecs, which contributed to the impact upon VoIP network. A network testbed with seven experiments and network configurations had been set up in two labs to determine its effects on network performance. Besides, an experimental work using OPNET simulations under 54 experiments of network scenarios were compared with the network testbed for validation and verification purposes. Next, an enhanced Blowfish algorithm for VoIP services had been designed and executed throughout this research. From the stance of VoIP session and services performance, the redesign of the Blowfish algorithm displayed several significant effects that improved both the performance of VoIP network and the quality of voice. This finding indicates some available opportunities that could enhance encrypted algorithm, data privacy, and integrity; where the balance between Quality of Services (QoS) and security techniques can be applied to boost network throughput, performance, and voice quality of existing VoIP services. With that, this study had executed and contributed to a threefold aspect, which refers to the redesign of the Blowfish algorithm that could minimize computational resources. In addition, the VoIP network performance was analysed and compared in terms of end-to-end delay, jitter, packet loss, and finally, sought improvement for voice quality in VoIP services, as well as the effect of the designed enhanced Blowfish algorithm upon voice quality, which had been quantified by using a variety of voice codecs

    Final report on the evaluation of RRM/CRRM algorithms

    Get PDF
    Deliverable public del projecte EVERESTThis deliverable provides a definition and a complete evaluation of the RRM/CRRM algorithms selected in D11 and D15, and evolved and refined on an iterative process. The evaluation will be carried out by means of simulations using the simulators provided at D07, and D14.Preprin

    Apprentissage automatique pour le codage cognitif de la parole

    Get PDF
    Depuis les annĂ©es 80, les codecs vocaux reposent sur des stratĂ©gies de codage Ă  court terme qui fonctionnent au niveau de la sous-trame ou de la trame (gĂ©nĂ©ralement 5 Ă  20 ms). Les chercheurs ont essentiellement ajustĂ© et combinĂ© un nombre limitĂ© de technologies disponibles (transformation, prĂ©diction linĂ©aire, quantification) et de stratĂ©gies (suivi de forme d'onde, mise en forme du bruit) pour construire des architectures de codage de plus en plus complexes. Dans cette thĂšse, plutĂŽt que de s'appuyer sur des stratĂ©gies de codage Ă  court terme, nous dĂ©veloppons un cadre alternatif pour la compression de la parole en codant les attributs de la parole qui sont des caractĂ©ristiques perceptuellement importantes des signaux vocaux. Afin d'atteindre cet objectif, nous rĂ©solvons trois problĂšmes de complexitĂ© croissante, Ă  savoir la classification, la prĂ©diction et l'apprentissage des reprĂ©sentations. La classification est un Ă©lĂ©ment courant dans les conceptions de codecs modernes. Dans un premier temps, nous concevons un classifieur pour identifier les Ă©motions, qui sont parmi les attributs Ă  long terme les plus complexes de la parole. Dans une deuxiĂšme Ă©tape, nous concevons un prĂ©dicteur d'Ă©chantillon de parole, qui est un autre Ă©lĂ©ment commun dans les conceptions de codecs modernes, pour mettre en Ă©vidence les avantages du traitement du signal de parole Ă  long terme et non linĂ©aire. Ensuite, nous explorons les variables latentes, un espace de reprĂ©sentations de la parole, pour coder les attributs de la parole Ă  court et Ă  long terme. Enfin, nous proposons un rĂ©seau dĂ©codeur pour synthĂ©tiser les signaux de parole Ă  partir de ces reprĂ©sentations, ce qui constitue notre derniĂšre Ă©tape vers la construction d'une mĂ©thode complĂšte de compression de la parole basĂ©e sur l'apprentissage automatique de bout en bout. Bien que chaque Ă©tape de dĂ©veloppement proposĂ©e dans cette thĂšse puisse faire partie d'un codec Ă  elle seule, chaque Ă©tape fournit Ă©galement des informations et une base pour la prochaine Ă©tape de dĂ©veloppement jusqu'Ă  ce qu'un codec entiĂšrement basĂ© sur l'apprentissage automatique soit atteint. Les deux premiĂšres Ă©tapes, la classification et la prĂ©diction, fournissent de nouveaux outils qui pourraient remplacer et amĂ©liorer des Ă©lĂ©ments des codecs existants. Dans la premiĂšre Ă©tape, nous utilisons une combinaison de modĂšle source-filtre et de machine Ă  Ă©tat liquide (LSM), pour dĂ©montrer que les caractĂ©ristiques liĂ©es aux Ă©motions peuvent ĂȘtre facilement extraites et classĂ©es Ă  l'aide d'un simple classificateur. Dans la deuxiĂšme Ă©tape, un seul rĂ©seau de bout en bout utilisant une longue mĂ©moire Ă  court terme (LSTM) est utilisĂ© pour produire des trames vocales avec une qualitĂ© subjective Ă©levĂ©e pour les applications de masquage de perte de paquets (PLC). Dans les derniĂšres Ă©tapes, nous nous appuyons sur les rĂ©sultats des Ă©tapes prĂ©cĂ©dentes pour concevoir un codec entiĂšrement basĂ© sur l'apprentissage automatique. un rĂ©seau d'encodage, formulĂ© Ă  l'aide d'un rĂ©seau neuronal profond (DNN) et entraĂźnĂ© sur plusieurs bases de donnĂ©es publiques, extrait et encode les reprĂ©sentations de la parole en utilisant la prĂ©diction dans un espace latent. Une approche d'apprentissage non supervisĂ© basĂ©e sur plusieurs principes de cognition est proposĂ©e pour extraire des reprĂ©sentations Ă  partir de trames de parole courtes et longues en utilisant l'information mutuelle et la perte contrastive. La capacitĂ© de ces reprĂ©sentations apprises Ă  capturer divers attributs de la parole Ă  court et Ă  long terme est dĂ©montrĂ©e. Enfin, une structure de dĂ©codage est proposĂ©e pour synthĂ©tiser des signaux de parole Ă  partir de ces reprĂ©sentations. L'entraĂźnement contradictoire est utilisĂ© comme une approximation des mesures subjectives de la qualitĂ© de la parole afin de synthĂ©tiser des Ă©chantillons de parole Ă  consonance naturelle. La haute qualitĂ© perceptuelle de la parole synthĂ©tisĂ©e ainsi obtenue prouve que les reprĂ©sentations extraites sont efficaces pour prĂ©server toutes sortes d'attributs de la parole et donc qu'une mĂ©thode de compression complĂšte est dĂ©montrĂ©e avec l'approche proposĂ©e.Abstract: Since the 80s, speech codecs have relied on short-term coding strategies that operate at the subframe or frame level (typically 5 to 20ms). Researchers essentially adjusted and combined a limited number of available technologies (transform, linear prediction, quantization) and strategies (waveform matching, noise shaping) to build increasingly complex coding architectures. In this thesis, rather than relying on short-term coding strategies, we develop an alternative framework for speech compression by encoding speech attributes that are perceptually important characteristics of speech signals. In order to achieve this objective, we solve three problems of increasing complexity, namely classification, prediction and representation learning. Classification is a common element in modern codec designs. In a first step, we design a classifier to identify emotions, which are among the most complex long-term speech attributes. In a second step, we design a speech sample predictor, which is another common element in modern codec designs, to highlight the benefits of long-term and non-linear speech signal processing. Then, we explore latent variables, a space of speech representations, to encode both short-term and long-term speech attributes. Lastly, we propose a decoder network to synthesize speech signals from these representations, which constitutes our final step towards building a complete, end-to-end machine-learning based speech compression method. The first two steps, classification and prediction, provide new tools that could replace and improve elements of existing codecs. In the first step, we use a combination of source-filter model and liquid state machine (LSM), to demonstrate that features related to emotions can be easily extracted and classified using a simple classifier. In the second step, a single end-to-end network using long short-term memory (LSTM) is shown to produce speech frames with high subjective quality for packet loss concealment (PLC) applications. In the last steps, we build upon the results of previous steps to design a fully machine learning-based codec. An encoder network, formulated using a deep neural network (DNN) and trained on multiple public databases, extracts and encodes speech representations using prediction in a latent space. An unsupervised learning approach based on several principles of cognition is proposed to extract representations from both short and long frames of data using mutual information and contrastive loss. The ability of these learned representations to capture various short- and long-term speech attributes is demonstrated. Finally, a decoder structure is proposed to synthesize speech signals from these representations. Adversarial training is used as an approximation to subjective speech quality measures in order to synthesize natural-sounding speech samples. The high perceptual quality of synthesized speech thus achieved proves that the extracted representations are efficient at preserving all sorts of speech attributes and therefore that a complete compression method is demonstrated with the proposed approach

    Radio Communications

    Get PDF
    In the last decades the restless evolution of information and communication technologies (ICT) brought to a deep transformation of our habits. The growth of the Internet and the advances in hardware and software implementations modiïŹed our way to communicate and to share information. In this book, an overview of the major issues faced today by researchers in the ïŹeld of radio communications is given through 35 high quality chapters written by specialists working in universities and research centers all over the world. Various aspects will be deeply discussed: channel modeling, beamforming, multiple antennas, cooperative networks, opportunistic scheduling, advanced admission control, handover management, systems performance assessment, routing issues in mobility conditions, localization, web security. Advanced techniques for the radio resource management will be discussed both in single and multiple radio technologies; either in infrastructure, mesh or ad hoc networks
    corecore