46 research outputs found

    Priority Based Pre-emptive Task Scheduling for Android Operating System

    Full text link
    Android mobile operating system which is based on Linux Kernel 2.6, has open source license and adaptability to user driven applications. As all other operating systems it has all the basic features like process scheduling, memory management, process management etc associated with it. Any mobile platform works smoothly when the process scheduling is performed in a proper way. Ideal platform is that in which no resource conflict occurs. Thus scheduling in every manner is essential for the operating system to adapt itself with the requirement of a particular application. In this paper, priority based pre-emptive task scheduling is proposed for the SMS application. The idea is to define High priority to required contacts, for ex. Contact numbers of parents or teachers will be given High priority. If in case, any SMS from these High priority contacts is received, the application would flash the SMS on the active screen and redirect this High priority SMS to the Priority Inbox.Comment: Pages: 5 Figures : 1

    Speech: A Challenge to Digital Signal Processing Technology for Human-to-Computer Interaction

    Full text link
    This software project based paper is for a vision of the near future in which computer interaction is characterized by natural face-to-face conversations with lifelike characters that speak, emote, and gesture. The first step is speech. The dream of a true virtual reality, a complete human-computer interaction system will not come true unless we try to give some perception to machine and make it perceive the outside world as humans communicate with each other. This software project is under development for listening and replying machine (Computer) through speech. The Speech interface is developed to convert speech input into some parametric form (Speech-to-Text) for further processing and the results, text output to speech synthesis (Text-to-Speech)Comment: Pages: 06 Figures : 06. arXiv admin note: text overlap with arXiv:1305.1429, arXiv:1305.142

    Test Model for Text Categorization and Text Summarization

    Full text link
    Text Categorization is the task of automatically sorting a set of documents into categories from a predefined set and Text Summarization is a brief and accurate representation of input text such that the output covers the most important concepts of the source in a condensed manner. Document Summarization is an emerging technique for understanding the main purpose of any kind of documents. This paper presents a model that uses text categorization and text summarization for searching a document based on user query.Comment: Pages: 07 Figures : 0

    Image Optimization and Prediction

    Full text link
    Image Processing, Optimization and Prediction of an Image play a key role in Computer Science. Image processing provides a way to analyze and identify an image .Many areas like medical image processing, Satellite images, natural images and artificial images requires lots of analysis and research on optimization. In Image Optimization and Prediction we are combining the features of Query Optimization, Image Processing and Prediction . Image optimization is used in Pattern analysis, object recognition, in medical Image processing to predict the type of diseases, in satellite images for predicting weather forecast, availability of water or mineral etc. Image Processing, Optimization and analysis is a wide open area for research .Lots of research has been conducted in the area of Image analysis and many techniques are available for image analysis but, a single technique is not yet identified for image analysis and prediction .our research is focused on identifying a global technique for image analysis and Prediction.Comment: Pages: 08 Figures: 02, Proceedings of International Conferences CAAM-09 BITS, Durg, India, 10 Jan 200

    An Algorithm to Improve Performance over Multihop Wireless Mesh Network

    Full text link
    Transmission Control Protocol (TCP) is the dominant reliable transport protocol utilized in the Internet. Improving the performance of TCP associated with the presence of multi-hop is one of the research challenges in wireless mesh networks. Wireless mesh networks have large round trip time variations and these variations are dependent on the number of hops. In wireless mesh network, when congestion loss and wireless loss are co-existed the number of packets dropped increases and will have adverse effects on TCP and its congestion control mechanism which leads to low throughput. Here we have designed a new TCP scheme for multi-hop wireless mesh networks, by modifying the sender side congestion control functionality of TCP NewReno, which is tuned towards improving the performance of TCP. The simulation results show that TCP SAC has higher performance than TCP NewReno, Reno, Sack and Vegas in multi-hop wireless mesh networks.Comment: Pages: 05 Figures: 0

    Speech Enhancement Modeling Towards Robust Speech Recognition System

    Full text link
    Form about four decades human beings have been dreaming of an intelligent machine which can master the natural speech. In its simplest form, this machine should consist of two subsystems, namely automatic speech recognition (ASR) and speech understanding (SU). The goal of ASR is to transcribe natural speech while SU is to understand the meaning of the transcription. Recognizing and understanding a spoken sentence is obviously a knowledge-intensive process, which must take into account all variable information about the speech communication process, from acoustics to semantics and pragmatics. While developing an Automatic Speech Recognition System, it is observed that some adverse conditions degrade the performance of the Speech Recognition System. In this contribution, speech enhancement system is introduced for enhancing speech signals corrupted by additive noise and improving the performance of Automatic Speech Recognizers in noisy conditions. Automatic speech recognition experiments show that replacing noisy speech signals by the corresponding enhanced speech signals leads to an improvement in the recognition accuracies. The amount of improvement varies with the type of the corrupting noise.Comment: Pages: 04; Conference Proceedings International Conference on Advance Computing (ICAC-2008), Indi

    Security Issues In Speech Watermarking for Information Transmission

    Full text link
    The secure transmission of speech information is a significant issue faced by many security professionals and individuals. By applying voice-encryption technique any kind of encrypted sensitive speech data such as password can be transmitted. But this has the serious disadvantage that by means of cryptanalysis attack encrypted data can be compromised. Increasing the strength of encryption/decryption results in an associated increased in the cost. Additional techniques like stenography and digital watermarking can be used to conceal information in an undetectable way in audio data. However this watermarked audio data has to be send through unreliable media and an eavesdropper might get hold of secret message and can also determine the identity of a speaker who is sending the information since human voice contains information based on its characteristics such as frequency, pitch, and energy. This paper proposes Normalized Speech Watermarking technique. Speech signal is normalized to hide the identity of the speaker who is sending the information and then speech watermarking technique is applied on this normalized signal that contains the message (password) so that what information is transmitted should not be unauthorizedly revealed.Comment: Pages: 10 Figures: 5, Conference Procedings, AMOC 2011, Advances in Modeling, Optimization and Computin

    Speech based Password Protected Cyber Applications

    Full text link
    Whenever we think of cyber applications, we visualize the model that gives the idea that we are sitting in front of computer at home or workplace connected to internet and performing all the work that generally we have to go and do on a specific place for example e-shopping, e-banking, e-education etc. In case of e-shopping, we view all the products on the computer screen with all details by a single mouse click, select the product and do all further money transaction through net. When we think of security, is it 100% secure? No, not at all because though it is password protected, the password is a text base secrete code that can be open. Therefore this paper is concentrated on preparation of speech based password protected applications.Comment: Pages: 04 Figures : 0

    Secure Transmission of Password Using Speech Watermarking

    Full text link
    Internet is one of the most valuable resources for information communication and retrievals. Most multimedia signals today are in digital formats. The digital data can be duplicated and edited with great ease which has led to a need for data integrity and protection of digital data. The security requirements such as integrity or data authentication can be met by implementing security measures using digital watermarking techniques. In this paper a blind speech watermarking algorithm that embeds the watermark signal data in the musical (sequence) host signal by using frequency masking is used. A different logarithmic approach is proposed. In this regard a logarithmic function is first applied to watermark data. Then the transformed signal is embedded to the converted version of host signal which is obtained by applying Fast Fourier transform method. Finally using inverse Fast Fourier Transform and antilogarithmic function watermark signal is retrieved.Comment: Pages: 4 Figures: 7, International Journal of Computer Science and Technology (IJCST) Vol.2, Issue 3, September 201

    Speech Enhancement Using Pitch Detection Approach For Noisy Environment

    Full text link
    Acoustical mismatch among training and testing phases degrades outstandingly speech recognition results. This problem has limited the development of real-world nonspecific applications, as testing conditions are highly variant or even unpredictable during the training process. Therefore the background noise has to be removed from the noisy speech signal to increase the signal intelligibility and to reduce the listener fatigue. Enhancement techniques applied, as pre-processing stages; to the systems remarkably improve recognition results. In this paper, a novel approach is used to enhance the perceived quality of the speech signal when the additive noise cannot be directly controlled. Instead of controlling the background noise, we propose to reinforce the speech signal so that it can be heard more clearly in noisy environments. The subjective evaluation shows that the proposed method improves perceptual quality of speech in various noisy environments. As in some cases speaking may be more convenient than typing, even for rapid typists: many mathematical symbols are missing from the keyboard but can be easily spoken and recognized. Therefore, the proposed system can be used in an application designed for mathematical symbol recognition (especially symbols not available on the keyboard) in schools.Comment: Pages: 06 Figures : 0
    corecore