32 research outputs found
Priority Based Pre-emptive Task Scheduling for Android Operating System
Android mobile operating system which is based on Linux Kernel 2.6, has open
source license and adaptability to user driven applications. As all other
operating systems it has all the basic features like process scheduling, memory
management, process management etc associated with it. Any mobile platform
works smoothly when the process scheduling is performed in a proper way. Ideal
platform is that in which no resource conflict occurs. Thus scheduling in every
manner is essential for the operating system to adapt itself with the
requirement of a particular application. In this paper, priority based
pre-emptive task scheduling is proposed for the SMS application. The idea is to
define High priority to required contacts, for ex. Contact numbers of parents
or teachers will be given High priority. If in case, any SMS from these High
priority contacts is received, the application would flash the SMS on the
active screen and redirect this High priority SMS to the Priority Inbox.Comment: Pages: 5 Figures : 1
Image Optimization and Prediction
Image Processing, Optimization and Prediction of an Image play a key role in
Computer Science. Image processing provides a way to analyze and identify an
image .Many areas like medical image processing, Satellite images, natural
images and artificial images requires lots of analysis and research on
optimization. In Image Optimization and Prediction we are combining the
features of Query Optimization, Image Processing and Prediction . Image
optimization is used in Pattern analysis, object recognition, in medical Image
processing to predict the type of diseases, in satellite images for predicting
weather forecast, availability of water or mineral etc. Image Processing,
Optimization and analysis is a wide open area for research .Lots of research
has been conducted in the area of Image analysis and many techniques are
available for image analysis but, a single technique is not yet identified for
image analysis and prediction .our research is focused on identifying a global
technique for image analysis and Prediction.Comment: Pages: 08 Figures: 02, Proceedings of International Conferences
CAAM-09 BITS, Durg, India, 10 Jan 200
Speech: A Challenge to Digital Signal Processing Technology for Human-to-Computer Interaction
This software project based paper is for a vision of the near future in which
computer interaction is characterized by natural face-to-face conversations
with lifelike characters that speak, emote, and gesture. The first step is
speech. The dream of a true virtual reality, a complete human-computer
interaction system will not come true unless we try to give some perception to
machine and make it perceive the outside world as humans communicate with each
other. This software project is under development for listening and replying
machine (Computer) through speech. The Speech interface is developed to convert
speech input into some parametric form (Speech-to-Text) for further processing
and the results, text output to speech synthesis (Text-to-Speech)Comment: Pages: 06 Figures : 06. arXiv admin note: text overlap with
arXiv:1305.1429, arXiv:1305.142
Test Model for Text Categorization and Text Summarization
Text Categorization is the task of automatically sorting a set of documents
into categories from a predefined set and Text Summarization is a brief and
accurate representation of input text such that the output covers the most
important concepts of the source in a condensed manner. Document Summarization
is an emerging technique for understanding the main purpose of any kind of
documents. This paper presents a model that uses text categorization and text
summarization for searching a document based on user query.Comment: Pages: 07 Figures : 0
An Algorithm to Improve Performance over Multihop Wireless Mesh Network
Transmission Control Protocol (TCP) is the dominant reliable transport
protocol utilized in the Internet. Improving the performance of TCP associated
with the presence of multi-hop is one of the research challenges in wireless
mesh networks. Wireless mesh networks have large round trip time variations and
these variations are dependent on the number of hops. In wireless mesh network,
when congestion loss and wireless loss are co-existed the number of packets
dropped increases and will have adverse effects on TCP and its congestion
control mechanism which leads to low throughput. Here we have designed a new
TCP scheme for multi-hop wireless mesh networks, by modifying the sender side
congestion control functionality of TCP NewReno, which is tuned towards
improving the performance of TCP. The simulation results show that TCP SAC has
higher performance than TCP NewReno, Reno, Sack and Vegas in multi-hop wireless
mesh networks.Comment: Pages: 05 Figures: 0
Security Issues In Speech Watermarking for Information Transmission
The secure transmission of speech information is a significant issue faced by
many security professionals and individuals. By applying voice-encryption
technique any kind of encrypted sensitive speech data such as password can be
transmitted. But this has the serious disadvantage that by means of
cryptanalysis attack encrypted data can be compromised. Increasing the strength
of encryption/decryption results in an associated increased in the cost.
Additional techniques like stenography and digital watermarking can be used to
conceal information in an undetectable way in audio data. However this
watermarked audio data has to be send through unreliable media and an
eavesdropper might get hold of secret message and can also determine the
identity of a speaker who is sending the information since human voice contains
information based on its characteristics such as frequency, pitch, and energy.
This paper proposes Normalized Speech Watermarking technique. Speech signal is
normalized to hide the identity of the speaker who is sending the information
and then speech watermarking technique is applied on this normalized signal
that contains the message (password) so that what information is transmitted
should not be unauthorizedly revealed.Comment: Pages: 10 Figures: 5, Conference Procedings, AMOC 2011, Advances in
Modeling, Optimization and Computin
Speech Enhancement Modeling Towards Robust Speech Recognition System
Form about four decades human beings have been dreaming of an intelligent
machine which can master the natural speech. In its simplest form, this machine
should consist of two subsystems, namely automatic speech recognition (ASR) and
speech understanding (SU). The goal of ASR is to transcribe natural speech
while SU is to understand the meaning of the transcription. Recognizing and
understanding a spoken sentence is obviously a knowledge-intensive process,
which must take into account all variable information about the speech
communication process, from acoustics to semantics and pragmatics. While
developing an Automatic Speech Recognition System, it is observed that some
adverse conditions degrade the performance of the Speech Recognition System. In
this contribution, speech enhancement system is introduced for enhancing speech
signals corrupted by additive noise and improving the performance of Automatic
Speech Recognizers in noisy conditions. Automatic speech recognition
experiments show that replacing noisy speech signals by the corresponding
enhanced speech signals leads to an improvement in the recognition accuracies.
The amount of improvement varies with the type of the corrupting noise.Comment: Pages: 04; Conference Proceedings International Conference on Advance
Computing (ICAC-2008), Indi
Speech based Password Protected Cyber Applications
Whenever we think of cyber applications, we visualize the model that gives
the idea that we are sitting in front of computer at home or workplace
connected to internet and performing all the work that generally we have to go
and do on a specific place for example e-shopping, e-banking, e-education etc.
In case of e-shopping, we view all the products on the computer screen with all
details by a single mouse click, select the product and do all further money
transaction through net. When we think of security, is it 100% secure? No, not
at all because though it is password protected, the password is a text base
secrete code that can be open. Therefore this paper is concentrated on
preparation of speech based password protected applications.Comment: Pages: 04 Figures : 0
Interference-Aware Channel Assignment for Maximizing Throughput in WMN
Wireless Mesh network (WMN) is dynamically self-organizing and
self-configured, with the nodes in the network automatically establishing an
ad-hoc network and maintaining the mesh connectivity. The ability to use
multiple-radios and multiple channels can be cashed to increase aggregate
throughput of wireless mesh network. Thus the efficient use of available
interfaces and channels without interference becomes the key factor. In this
paper we propose, interference aware clustered based channel assignment schemes
which minimizes the interference and increases throughput. In our proposed
scheme we have given priority to minimize interference from nearby mesh nodes
in interference range than maximizing channel diversity. We simulated our
proposed work using NS-3 and results show that our scheme improves network
performance than BFSCA and Distributed Greedy CA.Comment: Pages: 12 Figures: 11 Tables: 01, International Journal on AdHoc
Networking Systems (IJANS), Vol. 1, No. 1, June 201
Opportunities & Challenges In Automatic Speech Recognition
Automatic speech recognition enables a wide range of current and emerging
applications such as automatic transcription, multimedia content analysis, and
natural human-computer interfaces. This paper provides a glimpse of the
opportunities and challenges that parallelism provides for automatic speech
recognition and related application research from the point of view of speech
researchers. The increasing parallelism in computing platforms opens three
major possibilities for speech recognition systems: improving recognition
accuracy in non-ideal, everyday noisy environments; increasing recognition
throughput in batch processing of speech data; and reducing recognition latency
in realtime usage scenarios. This paper describes technical challenges,
approaches taken, and possible directions for future research to guide the
design of efficient parallel software and hardware infrastructures.Comment: Pages: 05 Figures : 01 Proceedings of the International Conference
BEATS 2010, NIT Jalandhar, INDI