46 research outputs found
Priority Based Pre-emptive Task Scheduling for Android Operating System
Android mobile operating system which is based on Linux Kernel 2.6, has open
source license and adaptability to user driven applications. As all other
operating systems it has all the basic features like process scheduling, memory
management, process management etc associated with it. Any mobile platform
works smoothly when the process scheduling is performed in a proper way. Ideal
platform is that in which no resource conflict occurs. Thus scheduling in every
manner is essential for the operating system to adapt itself with the
requirement of a particular application. In this paper, priority based
pre-emptive task scheduling is proposed for the SMS application. The idea is to
define High priority to required contacts, for ex. Contact numbers of parents
or teachers will be given High priority. If in case, any SMS from these High
priority contacts is received, the application would flash the SMS on the
active screen and redirect this High priority SMS to the Priority Inbox.Comment: Pages: 5 Figures : 1
Speech: A Challenge to Digital Signal Processing Technology for Human-to-Computer Interaction
This software project based paper is for a vision of the near future in which
computer interaction is characterized by natural face-to-face conversations
with lifelike characters that speak, emote, and gesture. The first step is
speech. The dream of a true virtual reality, a complete human-computer
interaction system will not come true unless we try to give some perception to
machine and make it perceive the outside world as humans communicate with each
other. This software project is under development for listening and replying
machine (Computer) through speech. The Speech interface is developed to convert
speech input into some parametric form (Speech-to-Text) for further processing
and the results, text output to speech synthesis (Text-to-Speech)Comment: Pages: 06 Figures : 06. arXiv admin note: text overlap with
arXiv:1305.1429, arXiv:1305.142
Test Model for Text Categorization and Text Summarization
Text Categorization is the task of automatically sorting a set of documents
into categories from a predefined set and Text Summarization is a brief and
accurate representation of input text such that the output covers the most
important concepts of the source in a condensed manner. Document Summarization
is an emerging technique for understanding the main purpose of any kind of
documents. This paper presents a model that uses text categorization and text
summarization for searching a document based on user query.Comment: Pages: 07 Figures : 0
Image Optimization and Prediction
Image Processing, Optimization and Prediction of an Image play a key role in
Computer Science. Image processing provides a way to analyze and identify an
image .Many areas like medical image processing, Satellite images, natural
images and artificial images requires lots of analysis and research on
optimization. In Image Optimization and Prediction we are combining the
features of Query Optimization, Image Processing and Prediction . Image
optimization is used in Pattern analysis, object recognition, in medical Image
processing to predict the type of diseases, in satellite images for predicting
weather forecast, availability of water or mineral etc. Image Processing,
Optimization and analysis is a wide open area for research .Lots of research
has been conducted in the area of Image analysis and many techniques are
available for image analysis but, a single technique is not yet identified for
image analysis and prediction .our research is focused on identifying a global
technique for image analysis and Prediction.Comment: Pages: 08 Figures: 02, Proceedings of International Conferences
CAAM-09 BITS, Durg, India, 10 Jan 200
An Algorithm to Improve Performance over Multihop Wireless Mesh Network
Transmission Control Protocol (TCP) is the dominant reliable transport
protocol utilized in the Internet. Improving the performance of TCP associated
with the presence of multi-hop is one of the research challenges in wireless
mesh networks. Wireless mesh networks have large round trip time variations and
these variations are dependent on the number of hops. In wireless mesh network,
when congestion loss and wireless loss are co-existed the number of packets
dropped increases and will have adverse effects on TCP and its congestion
control mechanism which leads to low throughput. Here we have designed a new
TCP scheme for multi-hop wireless mesh networks, by modifying the sender side
congestion control functionality of TCP NewReno, which is tuned towards
improving the performance of TCP. The simulation results show that TCP SAC has
higher performance than TCP NewReno, Reno, Sack and Vegas in multi-hop wireless
mesh networks.Comment: Pages: 05 Figures: 0
Speech Enhancement Modeling Towards Robust Speech Recognition System
Form about four decades human beings have been dreaming of an intelligent
machine which can master the natural speech. In its simplest form, this machine
should consist of two subsystems, namely automatic speech recognition (ASR) and
speech understanding (SU). The goal of ASR is to transcribe natural speech
while SU is to understand the meaning of the transcription. Recognizing and
understanding a spoken sentence is obviously a knowledge-intensive process,
which must take into account all variable information about the speech
communication process, from acoustics to semantics and pragmatics. While
developing an Automatic Speech Recognition System, it is observed that some
adverse conditions degrade the performance of the Speech Recognition System. In
this contribution, speech enhancement system is introduced for enhancing speech
signals corrupted by additive noise and improving the performance of Automatic
Speech Recognizers in noisy conditions. Automatic speech recognition
experiments show that replacing noisy speech signals by the corresponding
enhanced speech signals leads to an improvement in the recognition accuracies.
The amount of improvement varies with the type of the corrupting noise.Comment: Pages: 04; Conference Proceedings International Conference on Advance
Computing (ICAC-2008), Indi
Security Issues In Speech Watermarking for Information Transmission
The secure transmission of speech information is a significant issue faced by
many security professionals and individuals. By applying voice-encryption
technique any kind of encrypted sensitive speech data such as password can be
transmitted. But this has the serious disadvantage that by means of
cryptanalysis attack encrypted data can be compromised. Increasing the strength
of encryption/decryption results in an associated increased in the cost.
Additional techniques like stenography and digital watermarking can be used to
conceal information in an undetectable way in audio data. However this
watermarked audio data has to be send through unreliable media and an
eavesdropper might get hold of secret message and can also determine the
identity of a speaker who is sending the information since human voice contains
information based on its characteristics such as frequency, pitch, and energy.
This paper proposes Normalized Speech Watermarking technique. Speech signal is
normalized to hide the identity of the speaker who is sending the information
and then speech watermarking technique is applied on this normalized signal
that contains the message (password) so that what information is transmitted
should not be unauthorizedly revealed.Comment: Pages: 10 Figures: 5, Conference Procedings, AMOC 2011, Advances in
Modeling, Optimization and Computin
Speech based Password Protected Cyber Applications
Whenever we think of cyber applications, we visualize the model that gives
the idea that we are sitting in front of computer at home or workplace
connected to internet and performing all the work that generally we have to go
and do on a specific place for example e-shopping, e-banking, e-education etc.
In case of e-shopping, we view all the products on the computer screen with all
details by a single mouse click, select the product and do all further money
transaction through net. When we think of security, is it 100% secure? No, not
at all because though it is password protected, the password is a text base
secrete code that can be open. Therefore this paper is concentrated on
preparation of speech based password protected applications.Comment: Pages: 04 Figures : 0
Secure Transmission of Password Using Speech Watermarking
Internet is one of the most valuable resources for information communication
and retrievals. Most multimedia signals today are in digital formats. The
digital data can be duplicated and edited with great ease which has led to a
need for data integrity and protection of digital data. The security
requirements such as integrity or data authentication can be met by
implementing security measures using digital watermarking techniques. In this
paper a blind speech watermarking algorithm that embeds the watermark signal
data in the musical (sequence) host signal by using frequency masking is used.
A different logarithmic approach is proposed. In this regard a logarithmic
function is first applied to watermark data. Then the transformed signal is
embedded to the converted version of host signal which is obtained by applying
Fast Fourier transform method. Finally using inverse Fast Fourier Transform and
antilogarithmic function watermark signal is retrieved.Comment: Pages: 4 Figures: 7, International Journal of Computer Science and
Technology (IJCST) Vol.2, Issue 3, September 201
Speech Enhancement Using Pitch Detection Approach For Noisy Environment
Acoustical mismatch among training and testing phases degrades outstandingly
speech recognition results. This problem has limited the development of
real-world nonspecific applications, as testing conditions are highly variant
or even unpredictable during the training process. Therefore the background
noise has to be removed from the noisy speech signal to increase the signal
intelligibility and to reduce the listener fatigue. Enhancement techniques
applied, as pre-processing stages; to the systems remarkably improve
recognition results. In this paper, a novel approach is used to enhance the
perceived quality of the speech signal when the additive noise cannot be
directly controlled. Instead of controlling the background noise, we propose to
reinforce the speech signal so that it can be heard more clearly in noisy
environments. The subjective evaluation shows that the proposed method improves
perceptual quality of speech in various noisy environments. As in some cases
speaking may be more convenient than typing, even for rapid typists: many
mathematical symbols are missing from the keyboard but can be easily spoken and
recognized. Therefore, the proposed system can be used in an application
designed for mathematical symbol recognition (especially symbols not available
on the keyboard) in schools.Comment: Pages: 06 Figures : 0