• Title/Summary/Keyword: Digital Voice

Search Result 384, Processing Time 0.027 seconds

Effects of PSK Modulation Methods in Underwater Acoustic Communication (PSK 변조방식이 수중통신에 미치는 영향에 관한 연구)

  • Cho, Jin-Soo;Jung, Seung-Back;Shim, Tae-Bo
    • The Journal of the Acoustical Society of Korea
    • /
    • v.26 no.7
    • /
    • pp.366-374
    • /
    • 2007
  • In underwater wireless communication, needs for long distance communication using the high frequency are surpassing ones of short range communication by ultrasonic wave, and demands for transmitting and receiving various data such as voice or high resolution image data are increasing as well. In this work, we studied the effects on the real underwater communication depending on the difference of digital modulation methods. Simulation shows that only the performance of GMSK among many other PSK based modulation schemes(BPSK, QPSK, MSK, GMSK) is significant. Test condition simulates the oceanographic conditions along the 207-survey line, 15Km south of Busan and SNR is maintained 35dB or below. Simulated tests are composed of both transmitting image data($3{\times}10^5$ pixel, 4 bit per pixel) and voice communication($10^{-2}$BER, channel capacity of 1Kbps). Test results show that there are gain of about 7 seconds in transmission time in image transmission case, where channel capacity for BPSK, QPSK, and MSK and for GMSK were 65 Kbps and 45 Kbps, respectively and gain of about 8Km in distances in voice communication case.

A Scalable Management Method for Asterisk-based Internet Telephony System (확장성을 고려한 Asterisk 기반 인터넷 전화 관리 방법)

  • Ha, Eun-Yong
    • Journal of Digital Convergence
    • /
    • v.12 no.8
    • /
    • pp.235-242
    • /
    • 2014
  • Internet telephony is an Internet service which supports voice telephone using VoIP technology on the IP-based Internet. It has some advantages in that voice telephone services can be accompanied with multimedia services such as video communication and messaging services. In this paper we suggested an Asterisk-based Internet telephony system which can be easily scalable. Most current systems use text files to manage their configuration: SIP users, dialplans, IVR service and etc. But we designed the management system which introduces database tables for efficiency and scalability. It also supports web-based functions developed by using Asterisk, Apache, MySQL, jQuery, PHP and open source softwares.

A Study on LMS-MPC Method Considering Low Bit Rate (Low Bit Rate을 고려한 LMS-MPC 방식에 관한 연구)

  • Lee, See-Woo
    • Journal of Digital Convergence
    • /
    • v.10 no.5
    • /
    • pp.233-238
    • /
    • 2012
  • In a speech coding system using excitation source of voiced and unvoiced, it would be a distortion of speech waveform in case of exist a voiced and an unvoiced consonants in a frame. To solve this problem, this paper present a method of LMS-MPC uses individual pitch and LMS(Least Mean Square). I evaluate the MPC and LMS-MPC using LMS. As a result, SNRseg of LMS-MPC was improved 1.5dB for female voice and 1.3dB for male voice respectively. Compared to the MPC, SNRseg of LMS-MPC has been improved that I was able to control the distortion of the speech waveform finally. And so, I expect to be able to this method for cellular phone and smart phone using excitation source of low bit rate.

The Design and Implementation of VDL M2 Data Link Software (VDL M2 데이터 링크 소프트웨어 설계 및 구현)

  • Kim, Hyoun-Kyoung;Yang, Kwang-Jik;Kim, Tae-Sik;Bae, Joong-Won
    • Aerospace Engineering and Technology
    • /
    • v.7 no.2
    • /
    • pp.11-20
    • /
    • 2008
  • The current air-to-ground communication between aircraft pilots and ground controllers is done by voice communication and text-based data communication. International Civil Aviation Organization (ICAO) suggested the digital data communication techniques to improve accuracy and effectiveness of the current air-to-ground communication. As one of them, VDL M2, a VHF band digital data communication link, is expected to substitute the voice communication and text-based ACARS data communication. In this paper, the software design and implementation of the VDL M2 system developed by Korea Aerospace Research Institute.

  • PDF

Implementation of Information Access Embedded System for the Blind People (시각 장애인을 위한 정보접근 임베디드 시스템의 구현)

  • Kim, Si-Woo;Lee, Jae-Kyun;Lee, Chae-Wook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.2C
    • /
    • pp.167-172
    • /
    • 2008
  • Since a 2-dimensional (2D) bar code can retrieve data and information quickly, it is widely used and recognized as a useful tool for many industrial applications. However, the information capacity of the 2D bar code is still limited. Recently the analog-digital code (AD code), which has the largest storage capacity yet contained in a code, has been developed, thereby expanding the bar code's application range because it overcomes the limitation of data capacity. In this paper, we present the AD code and implement an effective embedded system which can transform text information into voice using the 2D AD code and Text To Speech (TTS). This voice information can also be transmitted to blind people as well as the old by capturing the AD code on paper or in books.

Selective Speech Feature Extraction using Channel Similarity in CHMM Vocabulary Recognition (CHMM 어휘인식에서 채널 유사성을 이용한 선택적 음성 특징 추출)

  • Oh, Sang Yeon
    • Journal of Digital Convergence
    • /
    • v.11 no.10
    • /
    • pp.453-458
    • /
    • 2013
  • HMM Speech recognition systems have a few weaknesses, including failure to recognize speech due to the mixing of environment noise other voices. In this paper, we propose a speech feature extraction methode using CHMM for extracting selected target voice from mixture of voices and noises. we make use of channel similarity and correlate relation for the selective speech extraction composes. This proposed method was validated by showing that the average distortion of separation of the technique decreased by 0.430 dB. It was shown that the performance of the selective feature extraction is better than another system.

A Study on the DAISY Service Interface for the Print-Disabled (독서장애인을 위한 DAISY 서비스 인터페이스 구성에 관한 연구)

  • Bae, Kyung-Jae
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.22 no.3
    • /
    • pp.173-188
    • /
    • 2011
  • This research intended to identify empirical recommendations for designing the DAISY service interface and used a case-based method. The case of this research was LG Digital Talking Book Library(http://voice.lg.or.kr) of LG Sangnam Library. A group of experts evaluated the current DAISY interface serviced by the web. After evaluation, major recommendations were suggested and these recommendations were used to develop the new DAISY Interface. Major recommendations were consideration of the reading flow of the screen-reader program, prevention of perception as an error about the time delay, development of web-based software, support for convenient functions and prevention of shortcut key overlap and so on.

Traffic Capacity Analysis of the Digital Switching System (전전자 교환기의 트래픽 용량 분석)

  • Lee, Gang-Won;Park, Yeon-Gi;Seo, Jae-Jun
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.13 no.2
    • /
    • pp.17-34
    • /
    • 1987
  • Modern telecommunication switching systems are SPC (Stored Program Control) machines handling voice, data and other kinds of traffic, in an environment which tends to be fully digital switching and transmission. The throughput of such systems is determined by the real time capacity of its centralized or distributed control processors and by the traffic capacity of the switching network. Designers must verify the traffic and call processing capacity of the switching system and check its performance under traffic load before it is put into service. Verification of traffic and call processing capacity of switching systems is one of the problems treated by teletraffic studies; teletraffic studies are based on stochastic process, queueing theory, simulations and other quantitative methods of decision making. This paper reviews the general methodologies to evaluate the throughput and performance of the digital switching system. TDX-10, which is a fully digital switching system under development in ETRI, is employed to give illustrative examples of the methodologies discussed in this paper.

  • PDF

Performance Evaluation of Multiplexing Algorithms with Both Delay and Loss Priorities in ATM Networks (ATM 통신망에서의 지연 및 손실 우선순위를 갖는 다중화 알고리즘의 성능 평가)

  • 전용희
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.19 no.5
    • /
    • pp.842-856
    • /
    • 1994
  • The various services that a broadband integrated services digital network (B-ISDN) carries, have a wide range of delay, delay jitter and cell loss probability requirements. Design of appropriate control schemes for B-ISDN is an extremely important and challenging problem. In this paper, we proposed multiplexing algorithm with both delay and loss priorities in order to satisfy the diverse requirements. For the implementation of cell lose priority, we assumed that voice cells are generated as non-discardable(i.e., high priority) and discardable (i.e., low priotity)cells. The low priority voice cell may be discarded inside the network if congestion occurs. The cell dropping scheme is shown to reduce cell losses as well as delays for both voice and data. Such a load shedding scheme is expected to improve significantly utilization of B-ISDN.

  • PDF

A Closer Look on Challenges and Security Risks of Voice Over Internet Protocol Infrastructures

  • Omari, Ahmed H. Al;Alsariera, Yazan A.;Alhadawi, Hussam S.;Albawaleez, Mahmoud A.;Alkhliwi, Sultan S.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.175-184
    • /
    • 2022
  • Voice over Internet Protocol (VoIP) has grown in popularity as a low-cost, flexible alternative to the classic public switched telephone network (PSTN) that offers advanced digital features. However, additional security vulnerabilities are introduced by the VoIP system's flexibility and the convergence of voice and data networks. These additional challenges add to the normal security challenges that a VoIP system's underlying IP data network infrastructure confront. As a result, the VoIP network adds to the complexity of the security assurance task faced by businesses that use this technology. It's time to start documenting the many security risks that a VoIP infrastructure can face, as well as analyzing the difficulties and solutions that could help guide future efforts in research & development. We discuss and investigate the challenges and requirements of VoIP security in this research. Following a thorough examination of security challenges, we concentrate on VoIP system threats, which are critical for present and future VoIP deployments. Then, towards the end of this paper, some future study directions are suggested. This article intends to guide future scholars and provide them with useful guidance.