32 research outputs found

    Priority Based Pre-emptive Task Scheduling for Android Operating System

    Full text link
    Android mobile operating system which is based on Linux Kernel 2.6, has open source license and adaptability to user driven applications. As all other operating systems it has all the basic features like process scheduling, memory management, process management etc associated with it. Any mobile platform works smoothly when the process scheduling is performed in a proper way. Ideal platform is that in which no resource conflict occurs. Thus scheduling in every manner is essential for the operating system to adapt itself with the requirement of a particular application. In this paper, priority based pre-emptive task scheduling is proposed for the SMS application. The idea is to define High priority to required contacts, for ex. Contact numbers of parents or teachers will be given High priority. If in case, any SMS from these High priority contacts is received, the application would flash the SMS on the active screen and redirect this High priority SMS to the Priority Inbox.Comment: Pages: 5 Figures : 1

    Image Optimization and Prediction

    Full text link
    Image Processing, Optimization and Prediction of an Image play a key role in Computer Science. Image processing provides a way to analyze and identify an image .Many areas like medical image processing, Satellite images, natural images and artificial images requires lots of analysis and research on optimization. In Image Optimization and Prediction we are combining the features of Query Optimization, Image Processing and Prediction . Image optimization is used in Pattern analysis, object recognition, in medical Image processing to predict the type of diseases, in satellite images for predicting weather forecast, availability of water or mineral etc. Image Processing, Optimization and analysis is a wide open area for research .Lots of research has been conducted in the area of Image analysis and many techniques are available for image analysis but, a single technique is not yet identified for image analysis and prediction .our research is focused on identifying a global technique for image analysis and Prediction.Comment: Pages: 08 Figures: 02, Proceedings of International Conferences CAAM-09 BITS, Durg, India, 10 Jan 200

    Speech: A Challenge to Digital Signal Processing Technology for Human-to-Computer Interaction

    Full text link
    This software project based paper is for a vision of the near future in which computer interaction is characterized by natural face-to-face conversations with lifelike characters that speak, emote, and gesture. The first step is speech. The dream of a true virtual reality, a complete human-computer interaction system will not come true unless we try to give some perception to machine and make it perceive the outside world as humans communicate with each other. This software project is under development for listening and replying machine (Computer) through speech. The Speech interface is developed to convert speech input into some parametric form (Speech-to-Text) for further processing and the results, text output to speech synthesis (Text-to-Speech)Comment: Pages: 06 Figures : 06. arXiv admin note: text overlap with arXiv:1305.1429, arXiv:1305.142

    Test Model for Text Categorization and Text Summarization

    Full text link
    Text Categorization is the task of automatically sorting a set of documents into categories from a predefined set and Text Summarization is a brief and accurate representation of input text such that the output covers the most important concepts of the source in a condensed manner. Document Summarization is an emerging technique for understanding the main purpose of any kind of documents. This paper presents a model that uses text categorization and text summarization for searching a document based on user query.Comment: Pages: 07 Figures : 0

    An Algorithm to Improve Performance over Multihop Wireless Mesh Network

    Full text link
    Transmission Control Protocol (TCP) is the dominant reliable transport protocol utilized in the Internet. Improving the performance of TCP associated with the presence of multi-hop is one of the research challenges in wireless mesh networks. Wireless mesh networks have large round trip time variations and these variations are dependent on the number of hops. In wireless mesh network, when congestion loss and wireless loss are co-existed the number of packets dropped increases and will have adverse effects on TCP and its congestion control mechanism which leads to low throughput. Here we have designed a new TCP scheme for multi-hop wireless mesh networks, by modifying the sender side congestion control functionality of TCP NewReno, which is tuned towards improving the performance of TCP. The simulation results show that TCP SAC has higher performance than TCP NewReno, Reno, Sack and Vegas in multi-hop wireless mesh networks.Comment: Pages: 05 Figures: 0

    Security Issues In Speech Watermarking for Information Transmission

    Full text link
    The secure transmission of speech information is a significant issue faced by many security professionals and individuals. By applying voice-encryption technique any kind of encrypted sensitive speech data such as password can be transmitted. But this has the serious disadvantage that by means of cryptanalysis attack encrypted data can be compromised. Increasing the strength of encryption/decryption results in an associated increased in the cost. Additional techniques like stenography and digital watermarking can be used to conceal information in an undetectable way in audio data. However this watermarked audio data has to be send through unreliable media and an eavesdropper might get hold of secret message and can also determine the identity of a speaker who is sending the information since human voice contains information based on its characteristics such as frequency, pitch, and energy. This paper proposes Normalized Speech Watermarking technique. Speech signal is normalized to hide the identity of the speaker who is sending the information and then speech watermarking technique is applied on this normalized signal that contains the message (password) so that what information is transmitted should not be unauthorizedly revealed.Comment: Pages: 10 Figures: 5, Conference Procedings, AMOC 2011, Advances in Modeling, Optimization and Computin

    Speech Enhancement Modeling Towards Robust Speech Recognition System

    Full text link
    Form about four decades human beings have been dreaming of an intelligent machine which can master the natural speech. In its simplest form, this machine should consist of two subsystems, namely automatic speech recognition (ASR) and speech understanding (SU). The goal of ASR is to transcribe natural speech while SU is to understand the meaning of the transcription. Recognizing and understanding a spoken sentence is obviously a knowledge-intensive process, which must take into account all variable information about the speech communication process, from acoustics to semantics and pragmatics. While developing an Automatic Speech Recognition System, it is observed that some adverse conditions degrade the performance of the Speech Recognition System. In this contribution, speech enhancement system is introduced for enhancing speech signals corrupted by additive noise and improving the performance of Automatic Speech Recognizers in noisy conditions. Automatic speech recognition experiments show that replacing noisy speech signals by the corresponding enhanced speech signals leads to an improvement in the recognition accuracies. The amount of improvement varies with the type of the corrupting noise.Comment: Pages: 04; Conference Proceedings International Conference on Advance Computing (ICAC-2008), Indi

    Speech based Password Protected Cyber Applications

    Full text link
    Whenever we think of cyber applications, we visualize the model that gives the idea that we are sitting in front of computer at home or workplace connected to internet and performing all the work that generally we have to go and do on a specific place for example e-shopping, e-banking, e-education etc. In case of e-shopping, we view all the products on the computer screen with all details by a single mouse click, select the product and do all further money transaction through net. When we think of security, is it 100% secure? No, not at all because though it is password protected, the password is a text base secrete code that can be open. Therefore this paper is concentrated on preparation of speech based password protected applications.Comment: Pages: 04 Figures : 0

    Interference-Aware Channel Assignment for Maximizing Throughput in WMN

    Full text link
    Wireless Mesh network (WMN) is dynamically self-organizing and self-configured, with the nodes in the network automatically establishing an ad-hoc network and maintaining the mesh connectivity. The ability to use multiple-radios and multiple channels can be cashed to increase aggregate throughput of wireless mesh network. Thus the efficient use of available interfaces and channels without interference becomes the key factor. In this paper we propose, interference aware clustered based channel assignment schemes which minimizes the interference and increases throughput. In our proposed scheme we have given priority to minimize interference from nearby mesh nodes in interference range than maximizing channel diversity. We simulated our proposed work using NS-3 and results show that our scheme improves network performance than BFSCA and Distributed Greedy CA.Comment: Pages: 12 Figures: 11 Tables: 01, International Journal on AdHoc Networking Systems (IJANS), Vol. 1, No. 1, June 201

    Opportunities & Challenges In Automatic Speech Recognition

    Full text link
    Automatic speech recognition enables a wide range of current and emerging applications such as automatic transcription, multimedia content analysis, and natural human-computer interfaces. This paper provides a glimpse of the opportunities and challenges that parallelism provides for automatic speech recognition and related application research from the point of view of speech researchers. The increasing parallelism in computing platforms opens three major possibilities for speech recognition systems: improving recognition accuracy in non-ideal, everyday noisy environments; increasing recognition throughput in batch processing of speech data; and reducing recognition latency in realtime usage scenarios. This paper describes technical challenges, approaches taken, and possible directions for future research to guide the design of efficient parallel software and hardware infrastructures.Comment: Pages: 05 Figures : 01 Proceedings of the International Conference BEATS 2010, NIT Jalandhar, INDI
    corecore